Army & Academia Cyber Security Research in Czech Republic
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F12%3A00058688" target="_blank" >RIV/00216224:14610/12:00058688 - isvavai.cz</a>
Výsledek na webu
<a href="https://is.muni.cz/auth/repo/1075286/cyber_security_research.pdf" target="_blank" >https://is.muni.cz/auth/repo/1075286/cyber_security_research.pdf</a>
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Army & Academia Cyber Security Research in Czech Republic
Popis výsledku v původním jazyce
To complement traditional mechanisms for protection of computer networks, we develop, test and deploy tools based on IP flows monitoring. This technology is built on stand-alone probes that observe network traffic at critical points of network infrastructure. The probes are designed to process multigigabit traffic without any loss and provide network flow statistics for further analysis and attack detection as well as execute deep packet inspection. The probes can be connected in "in-line" mode and filter out objectionable traffic and even counterattack against the attacker. Our research is also focused on network behaviour analysis that scales well in contrast to deep packet inspection. We create software prototypes that are thoroughly tested in the campus network of Masaryk University. Selected prototypes are then tranferred to the university spin-off company. Thanks to security monitoring of the network, we discovered a new botnet for embedded devices named Chuck Norris.
Název v anglickém jazyce
Army & Academia Cyber Security Research in Czech Republic
Popis výsledku anglicky
To complement traditional mechanisms for protection of computer networks, we develop, test and deploy tools based on IP flows monitoring. This technology is built on stand-alone probes that observe network traffic at critical points of network infrastructure. The probes are designed to process multigigabit traffic without any loss and provide network flow statistics for further analysis and attack detection as well as execute deep packet inspection. The probes can be connected in "in-line" mode and filter out objectionable traffic and even counterattack against the attacker. Our research is also focused on network behaviour analysis that scales well in contrast to deep packet inspection. We create software prototypes that are thoroughly tested in the campus network of Masaryk University. Selected prototypes are then tranferred to the university spin-off company. Thanks to security monitoring of the network, we discovered a new botnet for embedded devices named Chuck Norris.
Klasifikace
Druh
A - Audiovizuální tvorba
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
<a href="/cs/project/OVMASUN200801" target="_blank" >OVMASUN200801: CYBER ? Bezpečnost informačních a komunikačních systémů AČR - on line monitorování, vizualizace a filtrace paketů. Rozvoj schopností Computer Incident Response Capability v prostředí Cyber Defence.</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2012
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
ISBN
—
Místo vydání
—
Název nakladatele resp. objednatele
—
Verze
—
Identifikační číslo nosiče
—