CRUSOE: A toolset for cyber situational awareness and decision support in incident handling

M Husák, L Sadlek, S Špaček, M Laštovička… - Computers & …, 2022 - Elsevier
The growing size and complexity of today's computer network make it hard to achieve and
maintain so-called cyber situational awareness, ie, the ability to perceive and comprehend …

[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges

M Laštovička, M Husák, P Velan, T Jirsík, P Čeleda - Computer Networks, 2023 - Elsevier
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …

[PDF][PDF] Survey on Applications of Deep Learning and Machine Learning Techniques for Cyber Security.

MI Alghamdi - International Journal of Interactive Mobile …, 2020 - researchgate.net
The research aimed to conduct an extensive study of machine learning and deep learning
methods in cybersecurity. To accomplish the objectives, the research carried out a …

Using TLS fingerprints for OS identification in encrypted traffic

M Laštovička, S Špaček, P Velan… - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Asset identification plays a vital role in situational awareness building. However, the current
trends in communication encryption and the emerging new protocols turn the well-known …

Network monitoring and enumerating vulnerabilities in large heterogeneous networks

M Laštovička, M Husák, L Sadlek - NOMS 2020-2020 IEEE/IFIP …, 2020 - ieeexplore.ieee.org
In this paper, we present an empirical study on vulnerability enumeration in computer
networks using common network probing and monitoring tools. We conducted active …

System for continuous collection of contextual information for network security management and incident handling

M Husák, M Laštovička, D Tovarňák - Proceedings of the 16th …, 2021 - dl.acm.org
In this paper, we describe a system for the continuous collection of data for the needs of
network security management. When a cybersecurity incident occurs in the network, the …

Operating system fingerprinting tool based on classical machine learning algorithms

R Pérez-Jove, CR Munteanu, J Dorado… - 2023 JNIC …, 2023 - ieeexplore.ieee.org
Operating System (OS) fingerprinting aims to identify the OS of a machine analysing its
network traffic. Traditional OS fingerprinting tools use a rule-based approach to perform this …

Identify OS from encrypted traffic with TCP/IP stack fingerprinting

X Fan, G Gou, C Kang, J Shi… - 2019 IEEE 38th …, 2019 - ieeexplore.ieee.org
More and more security vulnerabilities are closely related to operating system (OS)
information, but how to accurately identify OS versions on a real-world dynamic network in …

Decision Tree Model-Based Security Situational Awareness Approach for Wireless Communication Networks

S Yuan, K Shan, J Feng - … Journal of High Speed Electronics and …, 2025 - World Scientific
Network security situational awareness is gaining increasing attention due to its capability to
globally and dynamically detect potential network security risks. However, traditional security …

Application of Machine Learning Models for Device Identification in Wireless Network Traffic

RN Anaedevha - 2024 Conference of Young Researchers in …, 2024 - ieeexplore.ieee.org
T Variants of vulnerabilities in wireless network are rapidly increasing as a result of
emerging network traffic complexities. The addition of network communication protocols …