Research to help software communicate and operate seamlessly

The Cyber Security and Network Security research cluster is focussed on various aspects of network and computer security, spanning from theory to practice. In an increasingly interconnected world, where cyber attacks are increasing in frequency, we provide vital research with practical applications to help protect individuals and organisations from cyber threats.

OUR RESEARCH

The Network Security Research undertakes research primarily in the following areas:

  • Applied Cryptography
  • Cyber and Data Security
  • Multimedia Security
  • Sensor Networks Security
  • Coding Techniques for Network Communications
  • Network Security, Intrusion Detection and Wireless Security
  • Information Assurance in e-Government Models

3D content encryption

Since the 1970s, a large number of encryption schemes have been proposed, among which some have been standardised and widely adopted all over the world, such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). However, due to special features of 3D content, these encryption standards may not be a suitable solution for 3D applications.

The problem of 3D content encryption is beyond the application of established and well-known encryption algorithms. This is primarily due to the structure of 3D content and the way it is used commercially. Unlike data encryption, where a complete bitstream is encrypted, 3D content encryption introduces several challenges. One of the greatest challenges of 3D content encryption is that, in comparison with traditional data and 2D images, 3D content implies a higher level representation or semantics, and in many 3D applications, it is necessary to maintain 3D semantics, such as the spatial and dimensional requirements. In this project, we conduct research as to address such requirements.

Anomaly Detection in Wireless Sensor Networks

Advancements in technology have enhanced the use of Wireless Sensor Network (WSN) in several application domains such as environment, home, industry, military, health and infrastructure monitoring. In these application domains, sensor nodes and sensor readings are vulnerable to various attacks and anomalies. These anomalies may degrade overall performance of a Wireless Sensor Network (WSN) application. Mobile Agents (MA) are being effectively employed in WSNs for variety of purposes such as distributed data fusion, code and data dissemination, localisation, security, collaborative signal, and information processing.

In this research, MAs are employed for in-situ verification of suspicious behaviour of a sensor node as part of an anomaly detection system. This approach is particularly useful for large scale WSNs where physical verification of anomalous node is cumbersome and time consuming. Furthermore, this technique is also beneficial in infrastructure monitoring WSN applications where mobile agent can non-intrusively verify the anomalous behaviour of sensor nodes before taking an appropriate action against them.

Body sensor networks

The availability of small, low-cost networked sensors combined with advanced signal processing and information extraction is driving a revolution in physiological monitoring and intervention. Body Sensor Networks (BSN) are enabling technologies for precision healthcare, enhanced sports and fitness training, novel life-style monitoring, and individualized security. Expected growth of elderly populations and the corresponding increase in healthcare costs mandate systems for automated monitoring of physiological conditions, triage, and remote diagnosis.

Semantics-Based Document Classification for Data Leakage Detection

The protection of confidential data from being leaked to the public is conventionally done through firewalls, virtual private networks and intrusion detection/prevention systems. However, these systems lack dedicated and proactive protection for confidential data when it travels through legitimate channels. An emerging technology in the field of information security called Data Leakage Prevention has been developed to overcome these problems. It deals with tools working under a central policy, which analyse networked environments to detect sensitive data, prevent unauthorized access to it and block channels associated with potential leak. This requires special data classification capabilities to distinguish between sensitive and normal data. Not only this task needs prior knowledge of the sensitive data, but also requires knowledge of potentially evolved and unknown data. Content statistical analysis deals with nebulous forms of data, while preserving exact data detection capabilities. It focuses on analysing frequencies and relationships of words “terms” within a large corpus, to construct a semantic weight for data. It also facilitates the use of machine learning algorithms and Bayesian analysis, in order to classify data.  We evaluate the effectiveness of using content statistical analysis in constructing semantics of confidential data. Moreover, we propose a semantic-aware document classification model for data leakage detection.

Want to know more?

Get in touch with the Institute for Integrated and Intelligent Systems