"RIV/00216224:14610/14:00073218" . "10.1007/978-3-662-43862-6_8" . . "Jirs\u00EDk, Tom\u00E1\u0161" . "Network connected devices has become inherent part of our lives. These devices have come to be more and more mobile and are target of various malware attacks. An inability to guarantee or check proper security settings of such devices poses a serious risk to network security. In this paper we propose a novel concept of flow based host trustworthiness estimation. The estimated trustworthiness determines a level of the risk to the network security the host posses. This concept enables network operators to identify a potential dangerous host in their network and take an appropriate precautions. Models used for trustworthiness estimation are based on scoring either single events or host characteristics. In order to be able to estimate trustworthiness of a host even in large scale networks, the data used for estimation are reduced only to extended network flows. The research is in its initial phase and will conclude with Ph.D. thesis in three years."@en . "Enhancing Network Security: Host Trustworthiness Estimation"@en . . . . "9783662438619" . "Enhancing Network Security: Host Trustworthiness Estimation"@en . . . "14689" . "Network connected devices has become inherent part of our lives. These devices have come to be more and more mobile and are target of various malware attacks. An inability to guarantee or check proper security settings of such devices poses a serious risk to network security. In this paper we propose a novel concept of flow based host trustworthiness estimation. The estimated trustworthiness determines a level of the risk to the network security the host posses. This concept enables network operators to identify a potential dangerous host in their network and take an appropriate precautions. Models used for trustworthiness estimation are based on scoring either single events or host characteristics. In order to be able to estimate trustworthiness of a host even in large scale networks, the data used for estimation are reduced only to extended network flows. The research is in its initial phase and will conclude with Ph.D. thesis in three years." . "RIV/00216224:14610/14:00073218!RIV15-MV0-14610___" . "Enhancing Network Security: Host Trustworthiness Estimation" . "2"^^ . . "Heidelberg" . "Enhancing Network Security: Host Trustworthiness Estimation" . . "2014-01-01+01:00"^^ . . "14610" . "2"^^ . . "Brno, Czech Republic" . "0302-9743" . . "\u010Celeda, Pavel" . . . "Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508" . "network flow; host; model; trustworthiness; scoring"@en . "[2ADCE513001B]" . . . "P(VG20132015103)" . "6"^^ . . . . "Springer-Verlag. (Berlin; Heidelberg)" . "000347615900008" . .