Hardware Acceleration

Our technologies make use of programmable hardware (FPGA) which allows us to keep pace with the ever-increasing speeds of networks. We focus at 40G, 100G and 400G Ethernet, all as running prototypes, not just powerpoint presentations. High-speed packet processing algorithms and architectures are one of our main research topics. We have experience in designing acceleration cards. For 400GE, we have designed with Reflex CES highly optimised FPGA SmartNIC. We have created easy to use Network Development Kit (NDK) for rapid prototyping of new...

read more

Flow Monitoring

Flow Monitoring

Network traffic monitoring is an essential component of every modern network infrastructure. For the large ones, it is currently the best practice to use technology based on IP flows, which is exactly the scope of interest in our R&D activities. Since we are responsible for traffic monitoring of the national research and education network perimeter , we have to deal with state-of-the-art high bandwidth data networks with communication speeds exceeding 100Gb/s. Therefore, we develop unique hardware cards with HANIC firmware that are...

read more

Security

Supporting network security management is one of the main goals of our technologies. We have created an open-source framework for real-time analysis of the monitored flow data (NEMEA) and developed a number of methods for detection of various types of malicious network traffic. Many of these detection methods are based on modern machine learning techniques. We also undertake research and development in the area of Cyber Situational Awareness, focused on gathering data about sources of malicious activities (NERD) and on autodiscovery of...

read more

Machine Learning

We are heavily using modern machine learning (ML) methods in the areas of network traffic analysis and security. We have successfully applied ML for classification of encrypted traffic, detection of different types of attacks, prediction of future attacks, or detection of coordinated behavior of malicious IP addresses. We are continuously exploring the potential of ML techniques in other use cases.

read more

Configuration via NETCONF

Configuration via NETCONF

Our devices and applications take into account the need of remote configuration. We implement NETCONF protocol for this purpose. We publicly provide libnetconf, the general implementation of the NETCONF protocol communication and NETCONF datastores management. Furthermore, we develop Netopeer system providing NETCONF client and mainly NETCONF server application for any device or...

read more