Smarter protection against hackers
University of Adelaide researchers are building enhanced defences for the worldâs top target for cyber attacks.
Cyberattacks can disrupt the systems we rely on. They can strike governments, hospitals, schools, and essential servicesââshutting down tax systems, hijacking medical devices, locking student records, crippling power grids, and disrupting water supply. On a personal level, hackers can also access our emails, accounts, and identity. At the centre of this crucial infrastructure is Microsoftâs Active Directory, a cyber security management system powering more than 95% of our worldwide networks. To protect this prime target, University of Adelaide researchers have partnered with the Department of Defence to develop cutting-edge intelligent systems to safeguard our future.
Researchers at the Defence and Security Institute are improving methods for finding and blocking âattack pathwaysâ, which are the various ways hackers can infiltrate a computer system. To improve speed, the researchers, led by Professor Hung Nguyen, are replacing current security systemsââwhich are slow, manual, and rule-based. Theyâre introducing AI and mathematical modelling that fast-track the process of fixing security risks in Active Directory.Â
Researcher Nhu Long Nguyen explains that he is creating a realistic model of Active Directory by grouping related users and permissions together to block cyber attacks with dramatic speedâcutting the cyber threat response time âfrom days to minutesâ. Specifically, his modelââthe first in the world to model Active Directory attack graphs based on its actual structure using affinity graphs and alpha metagraphsââbetters the removal rate from 710 attack sources in 36 hours to nearly 1,400 attack sources in just 21 minutes.Â
University of Adelaide researchers are also making the search for attack paths more realistic by capturing their real-world complexity.
âCurrent security tools rely on enumerating the shortest attack paths, but this oversimplifies the issue,â says researcher Yumeng Zhang.Â
âBy compromising just one account with a phishing email, for example, attackers can potentially find paths leading to high value assets or compromise a whole system; our methods are more effective than current technologies because they address more dynamic paths with rigorously modelling.â
Quang Huy Ngo, another University of Adelaide researcher focused on safeguarding Active Directory, takes yet another approach to improving security networks. Ngo is preventing cyber attacks in two major ways: identifying and removing the most dangerous links between accounts to help protect higher risk targets, and installing fake accounts called âhoneypotsâ in strategic locations to tempt and trap the attacker, setting off security alerts before the hackers can reach their goals. Using a mathematical optimisation model, Ngo has developed a graphing program with the ability to adapt to dynamic changes in the network so that it can place honeypots in more effective locations. Heâs also designing a tool thatâs iterative and intelligent, learning from user feedback and continuously discovering unexpected solutions to help protect our accounts.
Whatâs next?
In a constantly changing digital landscape, our researchers suggest that increased academia-industry collaboration coupled with demonstrated capability is the key to staying agile.Â
"I believe the future of cyber security will involve stronger collaboration between industry professionals and researchers," Ngo says.
"With the increase in AI agents online, identity and account theft is of the most pressing issues in cyber security today," says Professor Hung Nguyen, who is leading the Cyber-AI research group. âBut after working in this space for over five years, we are in a unique position to address the problem.â
With the Universityâs latest rapid automated tools in development, our cyber protection will be more responsive than ever to intercept future threats. The team at the Defence and Security Institute will continue expanding AI tools and existing attack graphing systems even further, taking each discovery to new heights.