High-performance real-time OS framework for low-power applications. Wireless network adapters, as they are being developed by Cisco, will find widespread use in the near future, as they are the basis of all mobile or otherwise disconnected intelligent devices. These devices must process data very rapidly, yet operate with minimal power consumption. We will develop operating system kernels that will support the secure, efficient and protected execution of the core processing firmware, and provide ....High-performance real-time OS framework for low-power applications. Wireless network adapters, as they are being developed by Cisco, will find widespread use in the near future, as they are the basis of all mobile or otherwise disconnected intelligent devices. These devices must process data very rapidly, yet operate with minimal power consumption. We will develop operating system kernels that will support the secure, efficient and protected execution of the core processing firmware, and provide application frameworks for the controlling higher software layers. We will also investigate and design hardware mechanisms that support the software while keeping power consumption minimal.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop paral ....High Performance Firewalls for Network Security. This project aims to improve the accuracy and efficiency of firewall systems for defending the security of large networks. The role of a network firewall is to detect and block unauthorised network traffic. Our industry partner, IntelliGuard, is developing a parallel system architecture for firewalls, which will provide sufficient processing capacity to support more sophisticated traffic analysis in high speed networks. Our aim is to develop parallel algorithms for traffic analysis and load balancing that can exploit the capacity of these new firewalls. This project provides an excellent opportunity for an Australian company to compete in the growing security market.Read moreRead less
Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses an ....Defending Against Attacks on Internet-Based Telephone Services (Voice Over IP). The telephone network is a critical platform for communication, used by all levels of society - government, the private sector and the general public. The shift to telephone services based on voice-over-IP technology holds the promise of significantly reducing costs for communication services. However, the Internet has long been plagued by a variety of network attacks. Reports of denial-of-service attacks, viruses and break-in attempts frequently appear in the world news. A major impediment to confidence in voice-over-IP services is the risk of attacks on its infrastructure, and the potential for using weaknesses in voice-over-IP infrastructure to launch attacks on the existing telephone network.Read moreRead less
Robust next-generation detection techniques to defend operational networks against attacks. As networks are fast becoming one of the pillars of our society, network security is essential.
Without good security, networks will be unreliable, more costly, and restricted in the capabilities they can offer. The project will allow advanced anomaly and intrusion detection techniques to be used in the ultra-high speeds of the Internet core. It will provide the groundwork for the attack detection and p ....Robust next-generation detection techniques to defend operational networks against attacks. As networks are fast becoming one of the pillars of our society, network security is essential.
Without good security, networks will be unreliable, more costly, and restricted in the capabilities they can offer. The project will allow advanced anomaly and intrusion detection techniques to be used in the ultra-high speeds of the Internet core. It will provide the groundwork for the attack detection and prevention infrastructure of the future. Read moreRead less
Carrier-scale defence against distributed denial-of-service attacks. Distributed Denial-of-Service (DDoS) attacks are one of the most persistent and damaging threats to services on the Internet. In recent years, there has been widespread use of DDoS attacks for both financial and political advantage by attackers. The challenge for our Australian industry partner (PowerGuard Pty Ltd) is to continue to scale their DDoS defence platform so that it can be used in much higher bandwidth environments, ....Carrier-scale defence against distributed denial-of-service attacks. Distributed Denial-of-Service (DDoS) attacks are one of the most persistent and damaging threats to services on the Internet. In recent years, there has been widespread use of DDoS attacks for both financial and political advantage by attackers. The challenge for our Australian industry partner (PowerGuard Pty Ltd) is to continue to scale their DDoS defence platform so that it can be used in much higher bandwidth environments, such as carriers’ backbone networks, or large government and commercial networks that have multiple high-speed links to the Internet. The results of this project will provide an Australian company with a leading position in this important and growing market. Read moreRead less
PROVISION OF ARBITARY COMPLEX SERVICES ON THE MOBILE INTERNET. Within the next few years, mobile and wireless access to the Internet will very likely become the norm. These networks will use widely different networking technologies. Moreover, the services provided, will be accessed by the users using a wide variety of devices, with significantly different capabilities. Thus to provide seamless access, the system must adapt it self to the operating environment. These adaptations need to occur at ....PROVISION OF ARBITARY COMPLEX SERVICES ON THE MOBILE INTERNET. Within the next few years, mobile and wireless access to the Internet will very likely become the norm. These networks will use widely different networking technologies. Moreover, the services provided, will be accessed by the users using a wide variety of devices, with significantly different capabilities. Thus to provide seamless access, the system must adapt it self to the operating environment. These adaptations need to occur at different levels of the system, in isolation. This project is aimed at investigating the implications of adaptation decisions being taken in isolation at different levels on the system stability and performance.Read moreRead less