This HTML5 document contains 46 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n18http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n21http://purl.org/net/nknouf/ns/bibtex#
n14http://localhost/temp/predkladatel/
n13http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n12http://linked.opendata.cz/resource/domain/vavai/projekt/
n20http://linked.opendata.cz/ontology/domain/vavai/
n10https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n4http://bibframe.org/vocab/
n5http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14610%2F14%3A00073218%21RIV15-MV0-14610___/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n7http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n22http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n15http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14610%2F14%3A00073218%21RIV15-MV0-14610___
rdf:type
skos:Concept n20:Vysledek
dcterms:description
Network connected devices has become inherent part of our lives. These devices have come to be more and more mobile and are target of various malware attacks. An inability to guarantee or check proper security settings of such devices poses a serious risk to network security. In this paper we propose a novel concept of flow based host trustworthiness estimation. The estimated trustworthiness determines a level of the risk to the network security the host posses. This concept enables network operators to identify a potential dangerous host in their network and take an appropriate precautions. Models used for trustworthiness estimation are based on scoring either single events or host characteristics. In order to be able to estimate trustworthiness of a host even in large scale networks, the data used for estimation are reduced only to extended network flows. The research is in its initial phase and will conclude with Ph.D. thesis in three years. Network connected devices has become inherent part of our lives. These devices have come to be more and more mobile and are target of various malware attacks. An inability to guarantee or check proper security settings of such devices poses a serious risk to network security. In this paper we propose a novel concept of flow based host trustworthiness estimation. The estimated trustworthiness determines a level of the risk to the network security the host posses. This concept enables network operators to identify a potential dangerous host in their network and take an appropriate precautions. Models used for trustworthiness estimation are based on scoring either single events or host characteristics. In order to be able to estimate trustworthiness of a host even in large scale networks, the data used for estimation are reduced only to extended network flows. The research is in its initial phase and will conclude with Ph.D. thesis in three years.
dcterms:title
Enhancing Network Security: Host Trustworthiness Estimation Enhancing Network Security: Host Trustworthiness Estimation
skos:prefLabel
Enhancing Network Security: Host Trustworthiness Estimation Enhancing Network Security: Host Trustworthiness Estimation
skos:notation
RIV/00216224:14610/14:00073218!RIV15-MV0-14610___
n3:aktivita
n22:P
n3:aktivity
P(VG20132015103)
n3:dodaniDat
n15:2015
n3:domaciTvurceVysledku
n13:6606288 n13:7457634
n3:druhVysledku
n8:D
n3:duvernostUdaju
n17:S
n3:entitaPredkladatele
n5:predkladatel
n3:idSjednocenehoVysledku
14689
n3:idVysledku
RIV/00216224:14610/14:00073218
n3:jazykVysledku
n11:eng
n3:klicovaSlova
network flow; host; model; trustworthiness; scoring
n3:klicoveSlovo
n7:model n7:trustworthiness n7:network%20flow n7:scoring n7:host
n3:kontrolniKodProRIV
[2ADCE513001B]
n3:mistoKonaniAkce
Brno, Czech Republic
n3:mistoVydani
Heidelberg
n3:nazevZdroje
Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508
n3:obor
n19:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
2
n3:projekt
n12:VG20132015103
n3:rokUplatneniVysledku
n15:2014
n3:tvurceVysledku
Jirsík, Tomáš Čeleda, Pavel
n3:typAkce
n18:WRD
n3:wos
000347615900008
n3:zahajeniAkce
2014-01-01+01:00
s:issn
0302-9743
s:numberOfPages
6
n4:doi
10.1007/978-3-662-43862-6_8
n21:hasPublisher
Springer-Verlag. (Berlin; Heidelberg)
n10:isbn
9783662438619
n14:organizacniJednotka
14610