Research Programme Cybersecurity 

This research programme is carried out by CSIRT-MU – security team of Masaryk University, which cooperates with experts from DISA laboratory. Aside from keeping general awareness in complex and evolving field of cybersecurity, this programme focuses on excellent research in its three complementary areas.

CSIRT-MU - the security team of Masaryk University

CSIRT-MU is a leading group focused on research in the areas of situational awareness, network data analysis and virtual cybersecurity environments.

CSIRT-MU is certified by Trusted Introducer. It secures the network of Masaryk University. It colaborates intensively with academia, industrial partners and state administration bodies on a number of projects. It implements cybersecurity exercises for governmental organizations and critical infrastructure operators.

The research programme Cybersecurity is lead by Pavel Čeleda.

Research areas

The research focuses on the following three complementary areas and is closely related to other two research programmes.

Simulation of advanced attacks and efficient defence

• Modelling of network attacks against infrastructure.
• Analysis of new attack strategies and efficient defence.
• Simulation of new types of attacks.
• Methodology of efficient teaching in cybersecurity.
• Development of active learning in cybersecurity.

Advanced analysis of operational data

• Classification and semantic modelling of analyzable data and cyberthreats.
• Research of analytic methods of stream data processing.
• Relationship discovery in large volumes of heterogeneous data.
• Visualization and interaction techniques for cybersecurity.
• Semantically driven visual analytics process.
• Legal aspects of big-data analytics deployment.

Similarity management for Big-Data analytics

• Definition of descriptive knowledge of complex and heterogeneous objects.
• Multimodal search structures for fast response time.
 Concurrent query processing.
Unstructured data analysis.
• Protection of personal data on the level of analytic tools’ design.
Usage of analytic results as a lawful evidence in investigation and prosecution of cybercrime