News

  • We are preparing XXVI year of the international professional conference Information Security Summit - IS2 under the title "Digital Optimism". The conference will be held on June 3-4, 2025.
  • Conference contributions - Call for paper - can be submitted until November 29, 2024 to the address tate@tate.cz. More information HERE...
     
  • The jubilee XXV year of the IS2 conference took place on May 29-30, 2024 in the Aula of the Czech Technical University - Bethlehem Chapel. It was a great honour to welcome all the distinguished personalities and speakers. Thank you to all partners.

  • Videos and summit books from past conferences are available for registered participants after logging to "Off-line Access" HERE...

back  Back to programme...

 

PAVEL MINARÍK

Pavel Minarík received his masters’ degree in computer science in 2005 from the Faculty of Informatics of Masaryk University in Brno. He currently works as the Chief Technology Officer at AdvaICT. He is the main architect of AdvaICT’s ADS (Anomaly Detection System) and outgoing products. Pavel’s main focus is network traffic analysis and anomaly detection. He has participated in several research projects (mainly for the U.S. and Czech Armies) as a senior researcher of the Institute of Computer Science of Masaryk University. He is a co-author of two technology transfers (2010) from the University and co-author of 7 published research papers in the field of network behavior analysis (2007-2009).

 

NETWORK MONITORING – TOOL FOR DETECTING AND AVOIDING INCIDENT

The complexity of IT infrastructure is growing continuously. More products are being incorporated and more services are being used. Enterprises rely on computer network and information technology since their primary processes completely depend on the IT department or it’s outsourcing partners. Malware infection or data loss a single computer might be troublesome. A successful attack on the core infrastructure, or client data loss, or malware infection of the whole network is a disaster. There are widely used methods to stop network attacks and malware from spreading based on signatures (intrusion detection system) in combination with host protection (antivirus, anti spyware). However, the latest results show that these methods are not bulletproof and that we need to focus on network traffic and its monitoring and analysis. We present a network-centric approach to the detection and prevention of incidents on computer networks with a focus on security. This approach is based on the detailed measuring and monitoring of computer networks using flow data. Methods based on flow data processing are unique in their usability, scalability and performance while there is no need for a deep understanding of the topology of target networks and no need for software installation or configuration changes. The proposed approach is called Network Behavior Analysis (NBA) and will be illustrated on a series of case studies from network traffic audits and analyses performed by AdvaICT during the last year.

What interests you?

sliva 2017 1

DSM Magazine

DSM is a professional quarterly magazine focused on information security and data protection problematics. Our goal is to provide an up-to- date overview of development trends in broader context.

More...

is2 20 let

Conference IS2

A prestigious international conference on information security, organized under the auspices of the prime minister and other eminent representatives of the Czech government.

More...

 
 

Partnerská společnost
icz logo banner small v2

Na naší webové stránce používáme cookies. Některé z nich jsou nutné pro běh stránky, zatímco jiné nám pomáhají vylepšit vlastnosti stránky na základě uživatelských zkušeností (tracking cookies). Sami můžete rozhodnout, zda cookies povolíte. Mějte prosím na paměti, že při odmítnutí, nemusí být stránka zcela funkční.

Back to top