ARC Communications Research Network. Building on a strong platform of existing research excellence, the Aim of the Network is to facilitate nation-wide collaborative research, promoting four intersecting research Themes: Mobile and Wireless Communications, Rural Communications, Broadband and Optical Networks, and Fundamentals of Emerging Media. Each Theme is formulated to drive multidisciplinary, innovative research as well as inspire new collaborative initiatives. Four Programs encapsulate the ....ARC Communications Research Network. Building on a strong platform of existing research excellence, the Aim of the Network is to facilitate nation-wide collaborative research, promoting four intersecting research Themes: Mobile and Wireless Communications, Rural Communications, Broadband and Optical Networks, and Fundamentals of Emerging Media. Each Theme is formulated to drive multidisciplinary, innovative research as well as inspire new collaborative initiatives. Four Programs encapsulate the core activities of the Network: Researcher Mobility, Workshops and Conferences, Postgraduate Education, and Knowledge Management Systems. The Network is expected to add significant value to pre-existing investments and raise the profile of Australian telecommunications research.Read moreRead less
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks ....Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks to address both difficulties by using rigorous statistical signal processing methods to optimally fuse information from a network of low-cost cameras.Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0561104
Funder
Australian Research Council
Funding Amount
$402,128.00
Summary
A 10 Gbit/s Fibre Optic link to the Mt Pleasant and Mt Canopus Observatories. A 10 gigabit per second fibre optic link to the Mt Pleasant and Mt Canopus observatories will enable a wide range of new and exciting research opportunities. Very long baseline interferometry (VLBI) allows imaging of distant astronomical objects with much higher resolution than any other technique. The proposed fibre optic link will revolutionise Australia's VLBI capability, giving it the world's most sensitive array, ....A 10 Gbit/s Fibre Optic link to the Mt Pleasant and Mt Canopus Observatories. A 10 gigabit per second fibre optic link to the Mt Pleasant and Mt Canopus observatories will enable a wide range of new and exciting research opportunities. Very long baseline interferometry (VLBI) allows imaging of distant astronomical objects with much higher resolution than any other technique. The proposed fibre optic link will revolutionise Australia's VLBI capability, giving it the world's most sensitive array, with enhanced reliability and faster access to results for researchers. This project will greatly facilitate studies of astrophysical processes in Galactic and extra-galactic environments as well as precision measurements of the Earth's crustal dynamics.Read moreRead less
Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise deve ....Visual tracking of multiple objects: A stochastic geometrical approach. Reliable real-time visual multiple-object tracking techniques will open up new applications that enhance the quality of life such as driving safety, traffic monitoring, home security, security and surveillance of public facilities. These new applications have huge commercial potentials, and the technology developed from this project will provide the catalyst for vibrant new industries to grow. In addition, the expertise developed from the project will provide a competitive edge for Australian industries in aerospace, oceanography, robotics, remote sensing, and biomedical engineering. Read moreRead less