DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Making human place knowledge digestible by computers. This project aims to develop the tools that will enable people to interact intuitively with computers about places and the relations between places. People understand their environment in a different way to computers; they think of places and their relations, while computers use coordinates and maps. People’s interaction with maps is cognitively costly and error-prone, which is becoming untenable in situations needing time-critical decision m ....Making human place knowledge digestible by computers. This project aims to develop the tools that will enable people to interact intuitively with computers about places and the relations between places. People understand their environment in a different way to computers; they think of places and their relations, while computers use coordinates and maps. People’s interaction with maps is cognitively costly and error-prone, which is becoming untenable in situations needing time-critical decision making. The project will revolutionise the design of information services where computers deal with humans and location in time-critical or stressful situations, including emergency calls, disaster response and local search queries. The uptake of this design by industry will lead to economic benefits as well as a safer society living in a smarter environment.Read moreRead less
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.
Software-defined provisioning of Internet of Things applications in fog computing systems. This project aims to investigate and provide solutions for the realisation of a seemingly integrated Fog Computing (FC) paradigm with cloud environments, networking devices and Internet of Things devices. Fog Computing (FC) is an emerging paradigm with great promises for advancing Information and Communications Technologies. Using interdisciplinary approaches, the project expects to generate new knowledge ....Software-defined provisioning of Internet of Things applications in fog computing systems. This project aims to investigate and provide solutions for the realisation of a seemingly integrated Fog Computing (FC) paradigm with cloud environments, networking devices and Internet of Things devices. Fog Computing (FC) is an emerging paradigm with great promises for advancing Information and Communications Technologies. Using interdisciplinary approaches, the project expects to generate new knowledge for optimising both hardware and software resources of a FC system. Outcomes of this project include practical solutions through building novel mathematical frameworks and optimisation objectives. The project is expected to provide efficient monitoring and control of intelligent spaces, management of urban and rural environments and will have applications in the areas of energy, security, transport and public health.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE110100049
Funder
Australian Research Council
Funding Amount
$600,000.00
Summary
Establishment of the Australian data archive: an integrated research facility for the social sciences and humanities. The Australian data archive will enable Australia's leading researchers to address complex social, economic and environmental problems, leading to the development of evidence based policy. The archive will have an open access policy which will ensure that the general public, media and government and non-government agencies are able to examine the data used by researchers to arriv ....Establishment of the Australian data archive: an integrated research facility for the social sciences and humanities. The Australian data archive will enable Australia's leading researchers to address complex social, economic and environmental problems, leading to the development of evidence based policy. The archive will have an open access policy which will ensure that the general public, media and government and non-government agencies are able to examine the data used by researchers to arrive at their conclusions.Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
TraitCapture: Genomic modelling for plant phenomics under environmental stress. This project aims to develop software to integrate new hyper-spectral and 3D growth models of plant phenomics with population genomics to identify heritable developmental traits across varied environments. Genome wide association studies aim to then be used to identify causal genes. Functional structural plant models incorporating genetic variation will be used to predict growth under simulated stress environments. ....TraitCapture: Genomic modelling for plant phenomics under environmental stress. This project aims to develop software to integrate new hyper-spectral and 3D growth models of plant phenomics with population genomics to identify heritable developmental traits across varied environments. Genome wide association studies aim to then be used to identify causal genes. Functional structural plant models incorporating genetic variation will be used to predict growth under simulated stress environments. The research team unites international industry, the Australian Plant Phenomics Facility, and university statistical geneticists. TraitCapture software will use open standards applicable to both controlled and field environments enabling plant breeders to pre-select adaptive traits to increase crop productivity under environmental stress.Read moreRead less