Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less
Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehens ....Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehensive security policy management framework, designs a distributed authorisation service and demonstrates a practical secure web service system in .NET.It presents a new approach to formally reasoning about conflict resolution policies with dynamic delegation.Read moreRead less
Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry an ....Security for Peer-to-Peer Systems. The importance of adequate security for Internet and online services has been underscored by recent events. The protection of information infrastructures in this ever-increasing digital world has become essential for businesses, governments and individuals. Secure interactions over the Internet have become a strategic necessity and it is critically important for Australia to possess the technology to anticipate and respond to security threats to its industry and society. The outcomes of this research project will result in secure and trustworthy computing technologies that will enable secure e-commerce applications and on-line services and trusted interactions between users over the Internet. Read moreRead less
Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcom ....Techniques for the Design of Trust Enhanced Secure Distributed Applications. Security and trusted systems for on-line services and information infrastructures are now of paramount importance. Secure trustworthy computing applications have become a strategic necessity for businesses, governments and individuals in the ever-increasing digital world. It is critically important for Australia to develop technologies to anticipate and respond to security threats to its industry and society. The outcomes of this research will result in secure and trustworthy computing technologies that will enable the design of trust enhanced secure applications and trusted platforms, which will help to achieve secure e-commerce applications and on-line services, and trusted interactions between users over the Internet.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended wor ....Mathematics of Elliptic Curve Cryptography. The Australian society and economy requires fast, reliable, and secure digital infrastructure. First-generation security solutions cannot support the efficiency and scalability requirements of wireless and embedded consumer applications. New security infrastructures are emerging and must be carefully, but rapidly, defined and analysed. Thus developing a new framework in this area is one of the most important and urgent tasks. Besides, the intended work advances our knowledge of the theory and the quality of our culture. As such, it will promote the Australian science and will also have many practical applications in Computer Security and E-Commerce.Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less