ISIF Asia has awarded USD 120,000 to four organizations to support network operations research and development for the benefit of the region.
2020 Internet Operations Research Grant recipients
Four grants of USD 30,000 each were allocated to four research and development projects focused on the availability, reliability, and security of the Internet, with a particular focus on practical solutions around operational stability and security. The 2020 ISIF Asia Grant recipients and the main focus of their projects are as follows:
|Open Lawful Intercept for Asia Pacific. University of Waikato. New Zealand.||To support further development and expand adoption in the Asia Pacific of OpenLI, the only open source software capable of meeting the ETSI standards for lawful interception. Read more about OpenLI.|
|IPv6 Deployment at Enterprises. IIESoc. India.||To work collaboratively with a non-profit industry consortium in the United States, Industry Network Technology Council (INTC), to address the issue of IPv6 adoption at large brick-and-mortar enterprises in the APAC region.|
|Collaborative Honeynet Threat Sharing Platform. Swiss German University (SGU), Badan Siber & Sandi Negara (BSSN) and Indonesia Honeynet Project (IHP). Indonesia.||This project aims to extend the design of the existing Honeynet Threat Sharing Platform to provide a broader range of honeypot support, a more complete threat database and threat correlation to allow organizations to easily share information with each other in a consistent format in ASEAN economies.|
|Experiment and improve reinforcement learning algorithms to enhance anomalous network behaviour detection. TeleMARS Pty Ltd. Australia.||To research various machine learning algorithms that may effectively monitor, analyse, and detect anomalous traffic at devices’ connections, and/or anomalous traffic at routers/links. This project will investigate how reinforcement learning algorithms such as GANs would perform against other machine learning algorithms such as classification, statistical and deep learning algorithms.|
The views expressed by the authors of this blog are their own and do not necessarily reflect the views of APNIC. Please note a Code of Conduct applies to this blog.