Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT a ....Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT access control with machine learning based anomaly detection. This should provide significant benefits, such as preventing cyber threats on security and privacy of IoT and improving trust in IoT-enabled smart critical infrastructure of Australia.Read moreRead less
Intruder alert! detecting and classifying events in noisy time series. This project aims to address the mathematical challenges in automated early detection and classification of intrusion events in noisy time series generated from perimeter security systems. The project expects to develop robust methods to detect intrusion events under different operating environments while ignoring nuisance events. The project will boost the global competitiveness of the Australian security industry, and enabl ....Intruder alert! detecting and classifying events in noisy time series. This project aims to address the mathematical challenges in automated early detection and classification of intrusion events in noisy time series generated from perimeter security systems. The project expects to develop robust methods to detect intrusion events under different operating environments while ignoring nuisance events. The project will boost the global competitiveness of the Australian security industry, and enable improved event detection and classification in noisy time series to the benefit of many critical application areas beyond national security.Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.
Machine learning in adversarial environments. Machine learning underpins the technologies driving the economies of both Silicon Valley and Wall Street, from web search and ad placement, to stock predictions and efforts in fighting cybercrime. This project aims to answer the question: How can machines learn from data when contributors act maliciously for personal gain?
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Constraint-based Privacy Preserving BioSignal Data Management on Blockchain. This project aims to address the issue of user privacy in Bio-Signal data analysis by utilizing the capabilities of differential privacy, smart contracts and blockchain technologies. This project expects to generate new knowledge in the area of privacy to develop an advanced privacy-preserving Bio-Signal data analytic framework. The expected outcomes of this project include increased privacy of user data, and the unifi ....Constraint-based Privacy Preserving BioSignal Data Management on Blockchain. This project aims to address the issue of user privacy in Bio-Signal data analysis by utilizing the capabilities of differential privacy, smart contracts and blockchain technologies. This project expects to generate new knowledge in the area of privacy to develop an advanced privacy-preserving Bio-Signal data analytic framework. The expected outcomes of this project include increased privacy of user data, and the unification of standards on human-specific data analysis, saving time and money spent on privacy breaches. This should provide significant benefits in preserving the quality and integrity of the healthcare services provided by the Australian government and private sector.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170100361
Funder
Australian Research Council
Funding Amount
$360,000.00
Summary
Towards reliable and robust machine learning systems. This project aims to protect machine learning systems from adversarial manipulation. Machine learning technologies are used in e-commerce, search, virtual assistants and self-driving cars. However, they are vulnerable to adversarial manipulations which are imperceptible to humans but can cause systems to fail, thereby undermining their usefulness or possibly causing disasters. Less vulnerable machine learning systems are expected to make futu ....Towards reliable and robust machine learning systems. This project aims to protect machine learning systems from adversarial manipulation. Machine learning technologies are used in e-commerce, search, virtual assistants and self-driving cars. However, they are vulnerable to adversarial manipulations which are imperceptible to humans but can cause systems to fail, thereby undermining their usefulness or possibly causing disasters. Less vulnerable machine learning systems are expected to make future autonomous systems, such as self-driving cars and autonomous robots, safer. This project will provide a deeper understanding of how machine learning systems can be made less vulnerable, thereby increasing the safety of future autonomous systems such as self-driving cars and autonomous robots.Read moreRead less