Home Research Curriculum Vitae Other Contact

Research areas

I am interested in anything, where I can learn something new. However, my time on earth is limited. Therefore I have chosen to focus on following areas:
  • Network traffic monitoring: Being member of CSIRT-MU at the university, I develop detection methods for network attack detection. I am familiar with flow monitoring (NetFlow/IPIFIX) and other means of capturing network traffic. Regarding the detection methods, I am looking into time series analysis , time series prediction particularly. Except the time series analysis, I also focus on host identification techniques - fingerprinting, profiling. s
  • Trust: Trust in the context of computer network security is not clearly defined. My goal is to provide a coherent definition of trust in network security and introduce a simple model for host trustworthiness estimation.
  • Data mining: I need data mining tools and techniques to be able to process the data from network traffic and estimate the host trustworthiness. I focus on credit scoring techniques, stream data processing and similarity search.

Publications

2015

M. Husák, M. Čermák, T. Jirsík, P. Čeleda: Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting In 2015 10th International Conference on Availability, Reliability and Security. : 2015. s. 389-396. Toulouse.

2014

T. Jirsík, M. Husák, P. Čeleda, Z. Eichler: Cloud-based security research testbed: A DDoS use case In Network Operations and Management Symposium (NOMS), 2014 IEEE , vol., no., pp.1-2, 5-9 May 2014, doi: 10.1109/NOMS.2014.6838272
(view online)

D. Kouřil, T. Rebok, T. Jirsík, J. Čegan, M. Drašar, M. Vizváry, J. Vykopal: Cloud-based Testbed for Simulation of Cyber Attacks. In Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland : IEEE Xplore Digital Library, 2014. ISBN 978-1-4799-0913-1, s. 1-6. 2014, Krakow, Poland.
(view online)

M. Drašar, T. Jirsík, M. Vizváry: Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches. In Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin : Springer Berlin Heidelberg, 2014. ISBN 978-3-662-43861-9, s. 160-172. 2014, Brno, Masarykova univerzita.
(view online)

T. Jirsík, P. ČELEDA: Enhancing Network Security: Host Trustworthiness Estimation. In Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Heidelberg : Springer Berlin / Heidelberg, 2014. ISBN 978-3-662-43861-9, s. 63-68. 2014, Brno, Czech Republic.
(view online)

T.Jirsík, P. Čeleda: Identifying Operating System Using Flow-based Traffic Fingerprinting. In Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg : Springer International Publishing, 2014. ISBN 978-3-319-13487-1, s. 70-73. 1.9.2014, Rennes, France.
(view online)

2013

M. Elich, P. Velan, T. Jirsík, P. Čeleda: An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis. In 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). WNM 2013: The 7th IEEE Workshop on Network Measurements. Sydney, Australia : IEEE Xplore Digital Library, 2013. ISBN 978-1-4799-0540-9, s. 1046-1052. 21.10.2013, Sydney, Australia.
(view online)

P. Velan, T. Jirsík, T. Čeleda: Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement. In Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8115. Heidelberg : Springer Berlin / Heidelberg, 2013. ISBN 978-3-642-40551-8, s. 136-147. 28.8.2013, Chemnitz, Germany.
(view online)