Project information
Simulation, Detection, and Mitigation of Cyber Threats Endangering Critical Infrastructure
(KYPO II)
- Project Identification
- VI20162019014
- Project Period
- 1/2016 - 12/2019
- Investor / Pogramme / Project type
-
Ministry of the Interior of the CR
- Security Research for the Needs of the State Program 2015-2020
- MU Faculty or unit
-
Institute of Computer Science
- doc. Ing. Pavel Čeleda, Ph.D.
- Mgr. Kamil Andoniadis
- Mgr. David Beran
- Mgr. Ing. Jakub Čegan
- RNDr. Milan Čermák, Ph.D.
- RNDr. Tomáš Jirsík, Ph.D.
- RNDr. Daniel Kouřil, Ph.D.
- Mgr. Martin Macháč
- Mgr. Ivo Nutár
- Bc. Tomáš Plesník
- RNDr. Vít Rusňák, Ph.D.
- RNDr. Ing. Pavel Šeda, Ph.D.
- RNDr. Valdemar Švábenský, Ph.D.
- RNDr. Daniel Tovarňák, Ph.D.
- doc. RNDr. Jan Vykopal, Ph.D.
- Other MU Faculty/Unit
- Faculty of Informatics
- Project Website
- https://www.kypo.cz
- Keywords
- simulation; detection; protection; CII; cyber threats; attacks; exercises; training; NCISA; CERT; CSIRT; cloud; virtualization
The project aims at research and development of tools for economically-and-time efficient simulation of real Critical Information Infrastructures (CIIs), detecting of cyber-threats, and then mitigation. The created tools will provide support for automated preparation and execution of security teams’ training and exercises. Created results will improve technical and professional cyber-security preparedness of Czech Republic in the terms of CII protection.
Publications
Total number of publications: 22
2018
-
Timely Feedback in Unstructured Cybersecurity Exercises
Proceedings of Special Interest Group on Computer Science Education, Baltimore, Maryland, USA, February 21–24, 2018(SIGCSE’18), year: 2018
-
Toward Real-time Network-wide Cyber Situational Awareness
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, year: 2018
-
Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets
2018 Network Traffic Measurement and Analysis Conference (TMA), year: 2018
2017
-
Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study
SPI 2017 - Security and Protection of Information 2017, year: 2017
-
Finding Exercise Equilibrium: How to Support the Game Balance at the Very Beginning?
Year: 2017, type: Conference abstract
-
Honeypot Testbed for Network Defence Strategy Evaluation
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), year: 2017
-
KYPO Cyber Range: Design and Use Cases
Proceedings of the 12th International Conference on Software Technologies - Volume 1: ICSOFT, year: 2017
-
Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range
2017 IEEE Frontiers in Education Conference, year: 2017
-
Towards a Unified Data Storage and Generic Visualizations in Cyber Ranges
Proceedings of the 16th European Conference on Cyber Warfare and Security ECCWS 2017, year: 2017
-
Visual Analytics for Network Security and Critical Infrastructures
AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, year: 2017