Christopher Ho

EC&MS Faculty Services

Faculty of Engineering, Computer and Mathematical Sciences

Although project work when working with DSTG is CLASSIFIED as per security clearance requirements, a non-disclosure abstracted summary can be viewed as follows:

The Defence Science and Technology Group (DSTG) in Australia excels in the research and development of advanced software that strengthens cybersecurity measures. Their notable contribution lies in the creation of a sophisticated firewall and action response system. This software leverages the MITRE framework to analyze attack patterns comprehensively.

By employing machine learning and artificial intelligence techniques, the software accurately classifies and breaks down various attack types, such as Distributed Denial of Service (DDoS), malware, or intrusion attempts. It utilizes the extensive knowledge base of the MITRE framework, which encompasses a wide range of attack tactics, techniques, and procedures (TTPs) employed by threat actors.

The software meticulously analyzes incoming network traffic, examining the patterns and signatures associated with known attack TTPs. It then applies the MITRE framework to identify specific tactics and techniques employed in the attacks. This in-depth analysis provides valuable insights into the origins and methods used by threat actors, as well as the vulnerabilities exploited during the attacks.

Based on the analysis, the software generates actionable recommendations for incident response teams. These recommendations include appropriate actions to mitigate the attacks and prevent further compromise. This may involve blocking specific IP addresses, isolating affected systems, updating firewall rules, or implementing additional security measures based on the specific attack patterns detected.

DSTG's innovative approach, combining the power of the MITRE framework with advanced machine learning techniques, enhances Australia's cybersecurity posture. The software's ability to analyze attack patterns through the MITRE framework equips organizations with a comprehensive understanding of evolving threats, enabling them to proactively defend critical infrastructure and safeguard sensitive data.

Connect With Me