. "cloud computing" . . . . "Aplikovan\u00FD v\u00FDzkum metody pro efektivn\u00ED management s\u00ED\u0165ov\u00E9 bezpe\u010Dnosti datov\u00FDch center, ochrany cloud server\u016F a slu\u017Eeb ov\u011B\u0159en\u00FD praktick\u00FDm m\u011B\u0159en\u00EDm" . "2014-12-31+01:00"^^ . "Hlavn\u00ED c\u00EDl projektu je zv\u00FD\u0161en\u00ED bezpe\u010Dnosti st\u00E1tu a ob\u010Dan\u016F s vyu\u017Eit\u00EDm nov\u00FDch technologi\u00ED. C\u00EDle bude dosa\u017Eeno prost\u0159ednictv\u00EDm aplikovan\u00E9ho v\u00FDzkumu metody pro automatickou obrannou reakci na zji\u0161t\u011Bn\u00E9 bezpe\u010Dnostn\u00ED anom\u00E1lie ve vysokorychlostn\u00EDch datov\u00FDch s\u00EDt\u00EDch. Metoda bude experiment\u00E1ln\u011B ov\u011B\u0159ena a vznikne software, kter\u00FD m\u016F\u017Ee b\u00FDt vyu\u017E\u00EDv\u00E1n dal\u0161\u00EDmi subjekty. Z praktick\u00E9ho pohledu takov\u00FD software bude schopen: 1) efektivn\u011B reagovat na bezpe\u010Dnostn\u00ED hrozby na vysokorychlostn\u00EDch s\u00EDt\u00EDch - na rychlostech v \u0159\u00E1du Gigabit\u016F, 2) automatizovan\u011B vyhodnocovat m\u00EDru rizika zji\u0161t\u011Bn\u00E9 anom\u00E1lie a v souladu s bezpe\u010Dnostn\u00ED politikou dan\u00E9 s\u00EDt\u011B automaticky realizovat obrann\u00E9 kroky na vybran\u00FDch kl\u00ED\u010Dov\u00FDch prvc\u00EDch s\u00EDt\u011B (dynamicky upravovat ACL seznamy a dal\u0161\u00ED relevantn\u00ED parametry sm\u011Brova\u010D\u016F, p\u0159ep\u00EDna\u010D\u016F a firewall\u016F). \u0158\u00EDzeny budou fyzick\u00E9 i virtu\u00E1ln\u00ED prvky. 3) nevy\u017Eadovat \u017E\u00E1dnou pravidelnou podporu typu aktualizace definic \u00FAtok\u016F atd., tedy b\u00FDt schopen ve\u0161ker\u00E1 rozhodov\u00E1n\u00ED prov\u00E1d\u011Bt na z\u00E1klad\u011B automatizovan\u00E9ho u\u010Den\u00ED se z provozu s\u00EDt\u011B za pou\u017Eit\u00ED metod um\u011Bl\u00E9 inteligence. T\u00EDm bude dosa\u017Eeno jednak radik\u00E1ln\u00EDho sn\u00ED\u017Een\u00ED provozn\u00EDch n\u00E1klad\u016F a z\u00E1rove\u0148 syst\u00E9m bude funguje dob\u0159e bez pot\u0159eby komunikovat s n\u011Bjak\u00FDm centr\u00E1ln\u00EDm bodem." . "2013-02-25+01:00"^^ . "Applied research of a metod of an efficient management of network security of data centers, servers and cloud services verified by practical measurements"@en . . . "cloud computing; network security; intrusion detection; intrusion protection"@en . "1"^^ . . . "The main objective of the project is to increase the security of the state and citizens by using new technologies. The objective will be achieved through applied research methods for automatic defensive reaction to perceived security anomalies in high-speed data networks. The method is experimentally verified and will be created software that can be used by other entities. From a practical point of view such software will be able to: 1) to effectively respond to security threats on high-speed networks - at Gigabits speeds, 2) automatically assess the level of risk identified anomalies and in accordance with the security policy of the network automatically implement defensive actions on selected key elements of the network (dynamically modify the ACL lists and other relevant parameters of routers, switches and firewalls). Physical and virtual elements will be controlled. 3) not require a regular support like attack definition updates, etc., therefore, be able to carry out any decisions based on automated learning of network traffic using artificial intelligence methods. This will give a radical reduction in operating costs while the system will work well without the need to communicate with a central point."@en . . " network security" . . . . "VG20122014086" . . . "0"^^ . . . . "http://www.isvav.cz/projectDetail.do?rowId=VG20122014086"^^ . "2"^^ . "0"^^ . "2014-06-30+02:00"^^ . "0"^^ . " intrusion detection" . "2012-01-01+01:00"^^ . .