"1"^^ . "network monitoring" . "network monitoring; Next Generation Internet; cyber criminality; network security; threats mitigation; assesment of network device"@en . . "0"^^ . "Modern\u00ED prost\u0159edky pro boj s kybernetickou kriminalitou na Internetu nov\u00E9 generace" . "Modern tools for detection and mitigation of cyber criminality on the New Generation Internet"@en . . . . . "http://www.isvav.cz/projectDetail.do?rowId=VG20102015022"^^ . . . . . "The main project's goal is to identify, define, explore and develop methods and tools for mitigation of cyber criminality threats on the New Generation Internet. The project\u2019s outcomes will include methodology and implementation of a system for network monitoring and a selecting capturing and analysis of traffic in high-speed IPv6 networks. System will also allow analyzing tunneling IPv6 traffic in current IPv4 networks. The process of gathering data will comply with regulation no.485/2005."@en . "2015-09-30+02:00"^^ . "2014-03-07+01:00"^^ . . . . " threats mitigation" . "84"^^ . . "Hlavn\u00EDm c\u00EDlem projektu je definovat, zkoumat a vyv\u00EDjet prost\u0159edky pro boj s kybernetickou kriminalitou na Internetu nov\u00E9 generace, tedy Internetu zalo\u017Een\u00E9m na protokolu IP verze 6 (d\u00E1le IPv6). Nutnost nal\u00E9zt nov\u00E9 p\u0159\u00EDstupy k zaji\u0161t\u011Bn\u00ED a vynucen\u00ED kybernetick\u00E9 bezpe\u010Dnosti je d\u00E1na nevyhnutelnost\u00ED zm\u011Bny internetov\u00E9ho komunika\u010Dn\u00EDho protokolu na protokol IPv6 v \u0159\u00E1du n\u011Bkolika let . Jestli\u017Ee v sou\u010Dasn\u00E9m Internetu je vzhledem vyhl\u00E1\u0161ce \u010D.485/2005 Sb. definov\u00E1na povinnost provozovatel\u016Fm ve\u0159ejn\u00FDch datov\u00FDch s\u00EDt\u00ED uchov\u00E1vat provozn\u00ED a lokaliza\u010Dn\u00ED data a bylo vynalo\u017Eeno nem\u00E1lo prost\u0159edk\u016F pro implementaci tohoto na\u0159\u00EDzen\u00ED, p\u0159i nasazen\u00ED nov\u00E9ho internetov\u00E9ho protokolu bohu\u017Eel nen\u00ED mo\u017En\u00E9 aplikovat sou\u010Dasn\u00E9 technick\u00E9 prost\u0159edky k zaji\u0161t\u011Bn\u00ED t\u00E9to povinnosti ve stejn\u00E9m rozsahu. Krom\u011B toho se v prost\u0159ed\u00ED s\u00EDt\u011B nov\u00E9 generace vyskytuj\u00ED nov\u00E9 mo\u017Enosti ohro\u017Een\u00ED bezpe\u010Dnosti a sou\u010Dasn\u011B nov\u00E9 mo\u017Enosti p\u0159enos\u016F dat a spr\u00E1vy s\u00EDt\u011B, kter\u00E9 maj\u00ED vliv na bezpe\u010Dnost. Napln\u011Bn\u00ED c\u00EDle projektu bude realizov\u00E1no prost\u0159ednictv\u00EDm v\u00FDstup\u016F, kter\u00E9 tvo\u0159\u00ED syst\u00E9my pro monitorov\u00E1n\u00ED a selektivn\u00ED odposlech v prost\u0159ed\u00ED vysokorychlostn\u00EDch s\u00EDt\u00ED IPv6 a metodiky pro jeho nasazen\u00ED. Syst\u00E9m p\u0159edpokl\u00E1d\u00E1 spojov\u00E1n\u00ED dat z v\u00EDce informa\u010Dn\u00EDch zdroj\u016F a na z\u00E1klad\u011B t\u011Bchto \u00FAdaj\u016F operativn\u00ED rekonfiguraci monitorovac\u00EDch sond. P\u0159edpokl\u00E1d\u00E1 se rovn\u011B\u017E, \u017Ee syst\u00E9m bude umo\u017E\u0148ovat anal\u00FDzu obsahu tunelovan\u00E9ho provozu s mo\u017Enost\u00ED extrakce jeho obsahu. V\u00FDstupy d\u00EDl\u010D\u00EDch podsyst\u00E9m\u016F mohou slou\u017Eit pro pr\u016Fb\u011B\u017En\u00E9 ukl\u00E1d\u00E1n\u00ED provozn\u00EDch dat s mo\u017Enost\u00ED realizace selektivn\u00EDho odposlechu datov\u00E9ho provozu. Provozn\u00ED data bude mo\u017Eno z\u00EDskat ve form\u00E1tu odpov\u00EDdaj\u00EDc\u00EDm vyhl\u00E1\u0161ce \u010D. 485/2005 . V\u0161echny komponenty budou navr\u017Eeny tak, aby je bylo mo\u017En\u00E9 b\u011B\u017En\u011B pou\u017E\u00EDvat ve vysokorychlostn\u00EDch s\u00EDt\u00EDch o rychlosti 10Gb/s." . "84"^^ . . " network security" . "2010-10-01+02:00"^^ . " cyber criminality" . "2015-02-13+01:00"^^ . " Next Generation Internet" . "VG20102015022" . . . . "0"^^ . .