CRUSOE: A toolset for cyber situational awareness and decision support in incident handling

M Husák, L Sadlek, S Špaček, M Laštovička… - Computers & …, 2022 - Elsevier
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …

Identification of attack paths using kill chain and attack graphs

L Sadlek, P Čeleda, D Tovarňák - NOMS 2022-2022 IEEE/IFIP …, 2022 - ieeexplore.ieee.org
The ever-evolving capabilities of cyber attackers force security administrators to focus on the
early identification of emerging threats. Targeted cyber attacks usually consist of several …

Network monitoring and enumerating vulnerabilities in large heterogeneous networks

M Laštovička, M Husák, L Sadlek - NOMS 2020-2020 IEEE/IFIP …, 2020 - ieeexplore.ieee.org
In this paper, we present an empirical study on vulnerability enumeration in computer
networks using common network probing and monitoring tools. We conducted active …

[PDF][PDF] Lessons learned while supporting Cyber Situational Awareness.

G Blasilli, E De Paoli, S Lenti, S Picca - EuroVA@ EuroVis, 2021 - diglib.eg.org
The increasing number of cyberattacks against critical infrastructures has pushed
researchers to develop many Visual Analytics solutions to provide valid defensive …

[PDF][PDF] Decision Support in Network Defence

J KOMÁRKOVÁ - is.muni.cz
The rising complexity of today's communications networks and information systems calls for
automated systems that would help the operator achieve a cyber situational awareness and …

[PDF][PDF] Improving Cybersecurity Through Situational Awareness

RNDM Laštovička - is.muni.cz
Large-scale networks consisting of thousands of connected devices are like living
organisms, constantly changing and evolving. It is challenging for a human administrator to …

[PDF][PDF] Vulnerability Exploit Effect Categorization

L Sadlek - is.muni.cz
In this bachelor's thesis, we propose a way how to categorize an effect of a vulnerability
exploit based on the vulnerability data from the National Vulnerability Database. At first, we …