Providing End-to-End Quality of Service to Internet Applications. Current Internet only supports limited quality of service (QoS) within isolated domains. This project allows critical applications to be deployed over the global Internet. The project employs a programmable architecture for composing services and intelligent software elements for negotiating acceptable QoS responses for individual application flows over multiple administrative domains. The architecture employs DiffServ's aggregati ....Providing End-to-End Quality of Service to Internet Applications. Current Internet only supports limited quality of service (QoS) within isolated domains. This project allows critical applications to be deployed over the global Internet. The project employs a programmable architecture for composing services and intelligent software elements for negotiating acceptable QoS responses for individual application flows over multiple administrative domains. The architecture employs DiffServ's aggregation property to make it scalable for the Internet core. Successful outcomes would open the floodgates, allowing the development and deployment of applications such as high quality videoconferences, live sport broadcasts, remote medical services, network games, real-time on-line educations, and multimedia distributions.
Read moreRead less
Fair Intelligent Quality of Service Control and Path Discovery Mechanisms for Internet Scalable Architectures. Until now the Internet only provides best effort service without guaranteeing the timeliness or actual delivery of data. Quality of Service (QoS) architectures have been proposed but not deployed due to a fundamental problem: either the architecture is not scalable or it does not guarantee end-to-end QoS. The project tackles the problem by introducing mechanisms for network path discove ....Fair Intelligent Quality of Service Control and Path Discovery Mechanisms for Internet Scalable Architectures. Until now the Internet only provides best effort service without guaranteeing the timeliness or actual delivery of data. Quality of Service (QoS) architectures have been proposed but not deployed due to a fundamental problem: either the architecture is not scalable or it does not guarantee end-to-end QoS. The project tackles the problem by introducing mechanisms for network path discovery in the network core. The solution allows an integration of both scalability and end-to-end QoS architectures. The outcomes allow network providers to provision network resources efficiently, to develop competitive Internet-based products; and the service providers to develop quality services such as high quality IP phone, multimedia distributions.
Read moreRead less
High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop paral ....High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop parallel algorithms for traffic analysis and load balancing that can exploit the capacity of these new firewalls. This project provides an excellent opportunity for an Australian company to compete in the growing security market.Read moreRead less
Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses an ....Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses and break-in attempts frequently appear in the world news. A major impediment to confidence in voice-over-IP services is the risk of attacks on its infrastructure, and the potential for using weaknesses in voice-over-IP infrastructure to launch attacks on the existing telephone network.Read moreRead less
C4 - Open Services Architecture. The Internet has seen tremendous growth both in terms of usage and supporting infrastructure. This has resulted in new design problems, due to the heterogeneity of applications, networks, devices and the profile of the user population. The proposed solutions only address problems in isolation, and as a result stifle usability and deployment of the services that can be provided. This project aims to design an open services architecture that will overcome the probl ....C4 - Open Services Architecture. The Internet has seen tremendous growth both in terms of usage and supporting infrastructure. This has resulted in new design problems, due to the heterogeneity of applications, networks, devices and the profile of the user population. The proposed solutions only address problems in isolation, and as a result stifle usability and deployment of the services that can be provided. This project aims to design an open services architecture that will overcome the problems in a integrated fashion and enable the creation network support functions that can be used together and can be incrementally deployed to provide service any-time anywhere seamlessly.Read moreRead less
Robust next-generation detection techniques to defend operational networks against attacks. As networks are fast becoming one of the pillars of our society, network security is essential.
Without good security, networks will be unreliable, more costly, and restricted in the capabilities they can offer. The project will allow advanced anomaly and intrusion detection techniques to be used in the ultra-high speeds of the Internet core. It will provide the groundwork for the attack detection and p ....Robust next-generation detection techniques to defend operational networks against attacks. As networks are fast becoming one of the pillars of our society, network security is essential.
Without good security, networks will be unreliable, more costly, and restricted in the capabilities they can offer. The project will allow advanced anomaly and intrusion detection techniques to be used in the ultra-high speeds of the Internet core. It will provide the groundwork for the attack detection and prevention infrastructure of the future. Read moreRead less
Carrier-scale defence against distributed denial-of-service attacks. Distributed Denial-of-Service (DDoS) attacks are one of the most persistent and damaging threats to services on the Internet. In recent years, there has been widespread use of DDoS attacks for both financial and political advantage by attackers. The challenge for our Australian industry partner (PowerGuard Pty Ltd) is to continue to scale their DDoS defence platform so that it can be used in much higher bandwidth environments, ....Carrier-scale defence against distributed denial-of-service attacks. Distributed Denial-of-Service (DDoS) attacks are one of the most persistent and damaging threats to services on the Internet. In recent years, there has been widespread use of DDoS attacks for both financial and political advantage by attackers. The challenge for our Australian industry partner (PowerGuard Pty Ltd) is to continue to scale their DDoS defence platform so that it can be used in much higher bandwidth environments, such as carriers’ backbone networks, or large government and commercial networks that have multiple high-speed links to the Internet. The results of this project will provide an Australian company with a leading position in this important and growing market. Read moreRead less
Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less
PROVISION OF ARBITARY COMPLEX SERVICES ON THE MOBILE INTERNET. Within the next few years, mobile and wireless access to the Internet will very likely become the norm. These networks will use widely different networking technologies. Moreover, the services provided, will be accessed by the users using a wide variety of devices, with significantly different capabilities. Thus to provide seamless access, the system must adapt it self to the operating environment. These adaptations need to occur at ....PROVISION OF ARBITARY COMPLEX SERVICES ON THE MOBILE INTERNET. Within the next few years, mobile and wireless access to the Internet will very likely become the norm. These networks will use widely different networking technologies. Moreover, the services provided, will be accessed by the users using a wide variety of devices, with significantly different capabilities. Thus to provide seamless access, the system must adapt it self to the operating environment. These adaptations need to occur at different levels of the system, in isolation. This project is aimed at investigating the implications of adaptation decisions being taken in isolation at different levels on the system stability and performance.Read moreRead less
Large Scale Complex Multiagent Systems : Control Methodologies and Information Architectures. Future military operations are likely to involve increasing use of unmanned vehicles, airborne, underwater or on land. In some cases there will be very large formations. This research will develop methodologies which allow formations of unmanned vehicles to be configured. Much of the same methodology is applicable to the construction and operation of large scale sensor networks, identified by some comm ....Large Scale Complex Multiagent Systems : Control Methodologies and Information Architectures. Future military operations are likely to involve increasing use of unmanned vehicles, airborne, underwater or on land. In some cases there will be very large formations. This research will develop methodologies which allow formations of unmanned vehicles to be configured. Much of the same methodology is applicable to the construction and operation of large scale sensor networks, identified by some commentators as one of the most important technologies of the 21st century. They comprise large numbers of low cost networked sensors and will increasingly find application in security, agricultural and environmental monitoring.Read moreRead less