News

  • Preparations for the XXVI international professional conference Information Security Summit - IS2 under the title "DIGITAL OPTIMISM" are in full progress. The conference will be held on June 3-4, 2025 in the beautiful Ceremonial Hall of the Czech Technical University in Prague Bethlehem Chapel in Prague. More information HERE...

  • Recordings of selected presentations from last year's IS2 2024 Conference - 29-30 May 2024 - "25 years of IS2 - A SAFE AND DIGITAL SOCIETY" are available. More information HERE...

  • The IS2 2024 conference hosted the panel discussion on "Being Prepared". The accompanying videos with the views of eminent personalities are still available. More information HERE...

back  Back to programme...

 

PAVEL MINARÍK

Pavel Minarík received his masters’ degree in computer science in 2005 from the Faculty of Informatics of Masaryk University in Brno. He currently works as the Chief Technology Officer at AdvaICT. He is the main architect of AdvaICT’s ADS (Anomaly Detection System) and outgoing products. Pavel’s main focus is network traffic analysis and anomaly detection. He has participated in several research projects (mainly for the U.S. and Czech Armies) as a senior researcher of the Institute of Computer Science of Masaryk University. He is a co-author of two technology transfers (2010) from the University and co-author of 7 published research papers in the field of network behavior analysis (2007-2009).

 

NETWORK MONITORING – TOOL FOR DETECTING AND AVOIDING INCIDENT

The complexity of IT infrastructure is growing continuously. More products are being incorporated and more services are being used. Enterprises rely on computer network and information technology since their primary processes completely depend on the IT department or it’s outsourcing partners. Malware infection or data loss a single computer might be troublesome. A successful attack on the core infrastructure, or client data loss, or malware infection of the whole network is a disaster. There are widely used methods to stop network attacks and malware from spreading based on signatures (intrusion detection system) in combination with host protection (antivirus, anti spyware). However, the latest results show that these methods are not bulletproof and that we need to focus on network traffic and its monitoring and analysis. We present a network-centric approach to the detection and prevention of incidents on computer networks with a focus on security. This approach is based on the detailed measuring and monitoring of computer networks using flow data. Methods based on flow data processing are unique in their usability, scalability and performance while there is no need for a deep understanding of the topology of target networks and no need for software installation or configuration changes. The proposed approach is called Network Behavior Analysis (NBA) and will be illustrated on a series of case studies from network traffic audits and analyses performed by AdvaICT during the last year.

What interests you?

sliva 2017 1

DSM Magazine

DSM is a professional quarterly magazine focused on information security and data protection problematics. Our goal is to provide an up-to- date overview of development trends in broader context.

More...

is2 20 let

Conference IS2

Prestigious international conference on information security, organized under the auspices of prominent representatives of the Czech government and other important personalities..

More...

 
 

Partnerská společnost
icz logo banner small v2

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top