Project information
CYBER - Security of Czech Army Information and Communication Systems - On-line Monitoring, Visualization and Packet Filtration. Computer Incident Response Capability Development in the Cyber Defence Environment
(CYBER)
- Project Identification
- OVMASUN200801
- Project Period
- 11/2008 - 12/2012
- Investor / Pogramme / Project type
-
Ministry of Defence of the CR
- Development - the development of attained operational capabilities of the Czech Armed Forces
- MU Faculty or unit
-
Institute of Computer Science
- doc. RNDr. Václav Račanský, CSc.
- doc. Ing. Pavel Čeleda, Ph.D.
- RNDr. Milan Čermák, Ph.D.
- Jan Dosoudil
- RNDr. Martin Drašar, Ph.D.
- RNDr. Martin Husák, Ph.D.
- RNDr. Pavel Minařík, Ph.D.
- Ing. Jiří Novotný
- Mgr. Pavel Piskač
- Bc. Tomáš Plesník
- Mgr. Bc. Jan Rejchrt
- Mgr. Michal Trunečka
- doc. RNDr. Jan Vykopal, Ph.D.
- Other MU Faculty/Unit
-
Faculty of Informatics
- prof. Ing. Václav Přenosil, CSc.
- Ing. Josef Kaderka, Ph.D.
- RNDr. Vojtěch Krmíček, Ph.D.
- Ing. Richard Složil
- Keywords
- network security; anomaly detection; network probe; visualization; NetFlow; visual analytics; artificial intelligence
Analysis of specific kinds of threats (behavior patterns) and specification of processes and methodologies how to prevent, deter and respond to these threats. Formalization of the knowledge base enabling to react on security threats automatically. Verification of advanced network probe in the active defence of the network.
Publications
Total number of publications: 47
2013
-
Flow-based Brute-force Attack Detection
Advances in IT Early Warning, year: 2013, number of pages: 11 s.
2012
-
Army & Academia Cyber Security Research in Czech Republic
Year: 2012, type: R&D Presentation
-
Automatic Network Protection Scenarios Using NetFlow
Year: 2012, type: R&D Presentation
-
Bruteforcing in the Shadows - Evading Automated Detection
Year: 2012, type: R&D Presentation
-
Dependable Networks and Services, 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012
Year: 2012, type:
-
Flow-Based Security Issue Detection in Building Automation and Control Networks
Lecture Notes in Computer Science 7479, year: 2012
-
Geolokace a bezpečnost počítačových sítí
Data Security Management, year: 2012, volume: 16, edition: 3
-
NetFlow Based Network Protection
Proceedings of 7th International ICST Conference on Security and Privacy in Communication Networks, year: 2012
-
Network Security Monitoring and Behavior Analysis
Year: 2012, type: R&D Presentation
-
Revealing and Analysing Modem Malware
2012 IEEE International Conference on Communications (ICC), year: 2012