Project information
Cybernetic Proving Ground
(KYPO)
- Project Identification
- VG20132015103
- Project Period
- 4/2013 - 9/2015
- Investor / Pogramme / Project type
-
Ministry of the Interior of the CR
- Security Research for the Needs of the State 2010-2015 (2010-2015)
- MU Faculty or unit
-
Institute of Computer Science
- doc. Ing. Pavel Čeleda, Ph.D.
- Mgr. Ing. Jakub Čegan
- RNDr. Milan Čermák, Ph.D.
- RNDr. Tomáš Jirsík, Ph.D.
- Bc. Tomáš Plesník
- RNDr. Michal Procházka, Ph.D.
- doc. RNDr. Václav Račanský, CSc.
- RNDr. Tomáš Rebok, Ph.D.
- Mgr. Jan Soukal
- RNDr. Petr Velan, Ph.D.
- RNDr. Martin Vizváry
- doc. RNDr. Jan Vykopal, Ph.D.
- Other MU Faculty/Unit
-
Faculty of Informatics
- doc. RNDr. Radek Ošlejšek, Ph.D.
- RNDr. Zdenek Eichler
- Mgr. Dalibor Toth
- Project Website
- https://www.kypo.cz
The Cybernetic Proving Ground project aims to create a unique environment for research and development of new methods to protect critical infrastructure against attacks. A virtualised environment will be used for performing complex cybernetic attacks against critical infrastructure and analyze them. The proving ground will serve for research and development of new security methods, tools and for educating members of security teams.
Publications
Total number of publications: 23
2014
-
Enhancing Network Security: Host Trustworthiness Estimation
Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508, year: 2014
-
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, year: 2014, volume: 16, edition: 4, DOI
-
Future of DDoS Attacks Mitigation in Software Defined Networks
Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508, year: 2014
-
Identifying Operating System Using Flow-based Traffic Fingerprinting
Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846, year: 2014
-
Next Generation Application-Aware Flow Monitoring
Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508, year: 2014
2013
-
Cybernetic Proving Ground
Year: 2013, type: R&D Presentation
-
Cybernetic Proving Ground - Cloud-based Environment for Simulation of Cyber Attacks"
Year: 2013, type: Appeared in Conference without Proceedings
-
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement
Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8115, year: 2013
-
Emerging Management Mechanisms for the Future Internet, 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013
Year: 2013, type:
-
Flow-based detection of RDP brute-force attacks
Security and Protection of Information 2013, year: 2013