Modelling Virtual Transport Channel for Future Multimedia Heterogeneous Networks. Recent advances in network bandwidth and processing power have led to the emergence of real time multimedia streaming applications and it is expected that such applications will become an even more dominant source of traffic in future computer networks. Quality of service studies for real-time applications in high-speed networks, point to the importance of the transport layer functionality in admission control, mon ....Modelling Virtual Transport Channel for Future Multimedia Heterogeneous Networks. Recent advances in network bandwidth and processing power have led to the emergence of real time multimedia streaming applications and it is expected that such applications will become an even more dominant source of traffic in future computer networks. Quality of service studies for real-time applications in high-speed networks, point to the importance of the transport layer functionality in admission control, monitoring end-to-end delays, and network bandwidth adaptability. The project will study, design, develop and analyse a comprehensive model for the virtual transport layer to satisfy the necessary quality of service requirements for the next generation of multimedia-based applications.Read moreRead less
Accurate Performance Modelling and Prediction of Cluster Computers. The tools, methodologies and data produced by this project will assist
Australian academic and industrial organisations in choosing the most
cost-effective cluster configurations for their specific high
performance computing requirements. It will also help an Australian
company to compete with increasing strength against the major
multinationals. The project will also draw together and promote future
research links between ....Accurate Performance Modelling and Prediction of Cluster Computers. The tools, methodologies and data produced by this project will assist
Australian academic and industrial organisations in choosing the most
cost-effective cluster configurations for their specific high
performance computing requirements. It will also help an Australian
company to compete with increasing strength against the major
multinationals. The project will also draw together and promote future
research links between two major academic institutions in this field.
Finally, the project will provide high-level training in research,
with industrial grounding, in the high performance computing industry.
Read moreRead less
Providing End-to-End Quality of Service to Internet Applications. Current Internet only supports limited quality of service (QoS) within isolated domains. This project allows critical applications to be deployed over the global Internet. The project employs a programmable architecture for composing services and intelligent software elements for negotiating acceptable QoS responses for individual application flows over multiple administrative domains. The architecture employs DiffServ's aggregati ....Providing End-to-End Quality of Service to Internet Applications. Current Internet only supports limited quality of service (QoS) within isolated domains. This project allows critical applications to be deployed over the global Internet. The project employs a programmable architecture for composing services and intelligent software elements for negotiating acceptable QoS responses for individual application flows over multiple administrative domains. The architecture employs DiffServ's aggregation property to make it scalable for the Internet core. Successful outcomes would open the floodgates, allowing the development and deployment of applications such as high quality videoconferences, live sport broadcasts, remote medical services, network games, real-time on-line educations, and multimedia distributions.
Read moreRead less
Fair Intelligent Quality of Service Control and Path Discovery Mechanisms for Internet Scalable Architectures. Until now the Internet only provides best effort service without guaranteeing the timeliness or actual delivery of data. Quality of Service (QoS) architectures have been proposed but not deployed due to a fundamental problem: either the architecture is not scalable or it does not guarantee end-to-end QoS. The project tackles the problem by introducing mechanisms for network path discove ....Fair Intelligent Quality of Service Control and Path Discovery Mechanisms for Internet Scalable Architectures. Until now the Internet only provides best effort service without guaranteeing the timeliness or actual delivery of data. Quality of Service (QoS) architectures have been proposed but not deployed due to a fundamental problem: either the architecture is not scalable or it does not guarantee end-to-end QoS. The project tackles the problem by introducing mechanisms for network path discovery in the network core. The solution allows an integration of both scalability and end-to-end QoS architectures. The outcomes allow network providers to provision network resources efficiently, to develop competitive Internet-based products; and the service providers to develop quality services such as high quality IP phone, multimedia distributions.
Read moreRead less
High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop paral ....High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop parallel algorithms for traffic analysis and load balancing that can exploit the capacity of these new firewalls. This project provides an excellent opportunity for an Australian company to compete in the growing security market.Read moreRead less
Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses an ....Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses and break-in attempts frequently appear in the world news. A major impediment to confidence in voice-over-IP services is the risk of attacks on its infrastructure, and the potential for using weaknesses in voice-over-IP infrastructure to launch attacks on the existing telephone network.Read moreRead less
Robust next-generation detection techniques to defend operational networks against attacks. As networks are fast becoming one of the pillars of our society, network security is essential.
Without good security, networks will be unreliable, more costly, and restricted in the capabilities they can offer. The project will allow advanced anomaly and intrusion detection techniques to be used in the ultra-high speeds of the Internet core. It will provide the groundwork for the attack detection and p ....Robust next-generation detection techniques to defend operational networks against attacks. As networks are fast becoming one of the pillars of our society, network security is essential.
Without good security, networks will be unreliable, more costly, and restricted in the capabilities they can offer. The project will allow advanced anomaly and intrusion detection techniques to be used in the ultra-high speeds of the Internet core. It will provide the groundwork for the attack detection and prevention infrastructure of the future. Read moreRead less
Carrier-scale defence against distributed denial-of-service attacks. Distributed Denial-of-Service (DDoS) attacks are one of the most persistent and damaging threats to services on the Internet. In recent years, there has been widespread use of DDoS attacks for both financial and political advantage by attackers. The challenge for our Australian industry partner (PowerGuard Pty Ltd) is to continue to scale their DDoS defence platform so that it can be used in much higher bandwidth environments, ....Carrier-scale defence against distributed denial-of-service attacks. Distributed Denial-of-Service (DDoS) attacks are one of the most persistent and damaging threats to services on the Internet. In recent years, there has been widespread use of DDoS attacks for both financial and political advantage by attackers. The challenge for our Australian industry partner (PowerGuard Pty Ltd) is to continue to scale their DDoS defence platform so that it can be used in much higher bandwidth environments, such as carriers’ backbone networks, or large government and commercial networks that have multiple high-speed links to the Internet. The results of this project will provide an Australian company with a leading position in this important and growing market. Read moreRead less
Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less
PROVISION OF ARBITARY COMPLEX SERVICES ON THE MOBILE INTERNET. Within the next few years, mobile and wireless access to the Internet will very likely become the norm. These networks will use widely different networking technologies. Moreover, the services provided, will be accessed by the users using a wide variety of devices, with significantly different capabilities. Thus to provide seamless access, the system must adapt it self to the operating environment. These adaptations need to occur at ....PROVISION OF ARBITARY COMPLEX SERVICES ON THE MOBILE INTERNET. Within the next few years, mobile and wireless access to the Internet will very likely become the norm. These networks will use widely different networking technologies. Moreover, the services provided, will be accessed by the users using a wide variety of devices, with significantly different capabilities. Thus to provide seamless access, the system must adapt it self to the operating environment. These adaptations need to occur at different levels of the system, in isolation. This project is aimed at investigating the implications of adaptation decisions being taken in isolation at different levels on the system stability and performance.Read moreRead less