Skip to main content

Showing 1–5 of 5 results for author: Tovarňák, D

Searching in archive cs. Search in all archives.
.
  1. Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

    Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák

    Abstract: Identification of cyber threats is one of the essential tasks for security teams. Currently, cyber threats can be identified using knowledge organized into various formats, enumerations, and knowledge bases. This paper studies the current challenges of identifying vulnerabilities and threats in cyberspace using enumerations and data about assets. Although enumerations are used in practice, we poin… ▽ More

    Submitted 29 June, 2022; originally announced June 2022.

    Comments: The 17th International Conference on Availability, Reliability and Security (ARES 2022), 8 pages

  2. HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic

    Authors: Stanislav Špaček, Petr Velan, Pavel Čeleda, Daniel Tovarňák

    Abstract: Achieving situational awareness is a challenging process in current HTTPS-dominant web traffic. In this paper, we propose a new approach to encrypted web traffic monitoring. First, we design a method for correlating host-based and network monitoring data based on their common features and a correlation time-window. Then we analyze the correlation results in detail to identify configurations of web… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

    Comments: 6 pages

  3. Identification of Attack Paths Using Kill Chain and Attack Graphs

    Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák

    Abstract: The ever-evolving capabilities of cyber attackers force security administrators to focus on the early identification of emerging threats. Targeted cyber attacks usually consist of several phases, from initial reconnaissance of the network environment to final impact on objectives. This paper investigates the identification of multi-step cyber threat scenarios using kill chain and attack graphs. Ki… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Comments: IEEE/IFIP NOMS 2022 conference, 6 pages

  4. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training

    Authors: Valdemar Švábenský, Jan Vykopal, Daniel Tovarňák, Pavel Čeleda

    Abstract: When learning cybersecurity, operating systems, or networking, students perform practical tasks using a broad range of command-line tools. Collecting and analyzing data about the command usage can reveal valuable insights into how students progress and where they make mistakes. However, few learning environments support recording and inspecting command-line inputs, and setting up an efficient infr… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: IEEE FIE 2021 conference, 9 pages, 5 figure, 3 tables

    ACM Class: K.3.2

  5. Scalable Learning Environments for Teaching Cybersecurity Hands-on

    Authors: Jan Vykopal, Pavel Čeleda, Pavel Seda, Valdemar Švábenský, Daniel Tovarňák

    Abstract: This Innovative Practice full paper describes a technical innovation for scalable teaching of cybersecurity hands-on classes using interactive learning environments. Hands-on experience significantly improves the practical skills of learners. However, the preparation and delivery of hands-on classes usually do not scale. Teaching even small groups of students requires a substantial effort to prepa… ▽ More

    Submitted 5 January, 2022; v1 submitted 19 October, 2021; originally announced October 2021.

    Comments: IEEE FIE 2021 conference, 9 pages, 6 figures, 1 table

    ACM Class: K.3.2