Cyber Deception Based Intrusion Detection System

Professor Jill Slay

This project aimed to deliver a next-generation Intrusion Detection System (IDS) that exposes sophisticated cyber actors inside high-value target networks. The solution uses deception techniques and analysis of attacker’s psychology. This intelligence is used to identify actors inside these high value targets to significantly reduce the time from compromise to containment.

Development of Smart Grid Cyber Security Testbed

Dr Abdun Mahmood

Recently there has been an increase in focus on protection of critical infrastructure from different threat actors. The Smart Grid sector presents a potential target that could result in disruption of electricity supply or even cascaded failures of the power system. This project looks to build a security testing environment on a simulated power system that will enable research into many aspects of today’s smart grid that is otherwise not possible with a live system.

A governance framework for the Australian Crime Intelligence Commission

Professor Louis De Koker

Commissioned by the Australian Criminal Intelligence Commission (ACIC) to develop its approach to the governance questions posed by the National Criminal Intelligence System (NCIS)

Identity Assurance, ‘Pattern of Life’ and Big Data Analytics

Professor Louis De Koker

Commissioned by the Attorney-General's Department, the Identity Assurance project sought to identify whether or not the application of advanced analytical techniques to 'pattern of life' data could be used for identity assurance purposes in Australia, and the legal and policy implications of such use.

Enhancing Regulation and Supervision/Oversight of AML and CTF of mobile payments in Jordan: Improving Access to Remittances and other Financial Services through Digital Solutions in Jordan

Professor Louis De Koker

Commissioned by the Deutsche Gesellschaft fur Internationale Zusammenarbeit (GIZ) to support the Central Bank of Jordan, this project was undertaken to inform the assessment and mitigation of money laundering and financing of terrorism that may arise in relation to the development of new digital financial services products and new business practices in Jordan, including new delivery mechanisms and the use of new or developing technologies for both new and pre-existing products.

Leveraging Deep Learning Approach for Attack Detection scheme in Fog-to-Things Networks.

Dr Naveen Chilamkurti

This research project will investigate and propose a novel fog based attack detection scheme in IoT applications using self-learning approach, specifically Short-term Memory (LSTM) networks. The main outcomes from this project are anticipated to be a deep learning-based distributed attack detection in IoT applications and its associated dataset for security researchers.  The developed could be used as intrusion detection layer of security in private business and government organisations

Efficient and Secure Cloud - Based Healthcare Systems for the Storage of Electrical Medical Records

Dr Naveen Chilamkurti

In this project, we aim to design a cloud-­based medical system to store national EMRs, where each EMR is encrypted using ABE to protect data privacy. We expect the system to be practically deployed for both mobile and non-­‐mobile users.

Efficient and fair context-aware resource allocation in networks

Dr  Khoa Phan

This project will develop a flexible mathematical framework for internet resource allocation among competing demands by exploiting application context like file sizes to allocate resources more efficiently at the timescales relevant to users.  It extends an existing successful framework, which allocates resources independently at each time, by instead considering benefits over periods of time relevant to users.  The expected outcome of this project is a systematic method for designing next-generation congestion-avoidance protocols that anticipate and accomodate differnt types of demands.  Resulting benefits include a better provision of Internet services, and new ways to combat congestion in analogous networks such as road network.

Anonymous Mobile Secure Payment System using Cloud Infrastructure

Dr Naveen Chilamkurti

The growth of wireless networks and the increasing popularity of mobile devices present a significant opportunity to empower them as a payment device.  Unfortunately, several problems hinder the widespread acceptance of mobile payments, for example, privacy protection and user anonymity.  We propose a new system to enhance the level of anonymity and increase the privacy of transaction records in micro and macro mobile payments.  We rely on IPAS (Implicit Password Authentication System) as the underlying authentication protocol to support our proposed idea.  In this project we propose an efficient anonymous mobile secure payment system that can be applied at both micro and macro-level and to store transactions, which can be traced back for digital warrantee for any, purchased goods.  Our proposed payment system supprts both online, offline and in-shop purchases.

Analysis and study of authentication and key management for security in the Internet of Things

Dr Naveen Chilamkurti

This research explores novel approaches in designing and implementing key management system for smart grid using an innovative and aggressive approach in key distribution and cyrptography.  It addresses the limitations of traditional key management schemes.