Publications

2024:

2023:

2022:

2021:

2020:

2019:

2018:

2017:

  • P. Benáček, V. Puš, J. Kořenek and M. Kekely: Line rate programmable packet processing in 100Gb networks. In: 27th International Conference on Field Programmable Logic and Applications (FPL), Ghent, 2017, pp. 1-1. DOI: https://doi.org/10.23919/FPL.2017.8056835.
  • Pavel Benáček, Lukáš Richter, Michal Kekely, Viktor Puš :  Case Study: Usage of High Level Synthesis in HPC Networking. In: Third International Workshop on Heterogeneous High-performance Reconfigurable Computing, Denver, USA, 2017.
  • Radek Krejčí, Ondřej Hujňák, Marek Švepeš: Security Survey of the IoT Wireless Protocols. In: Proceedings of the 25th Telecommunications Forum (TELFOR), Belgrade, Serbia, 2017, pp. 60-63.
  • Lukáš Kekely: Performance Measurements and Acceleration Potential of Suricata IDS. In: 3rd SIG-PMV meeting, Copenhage, Denmark, 2017.
  • Lukáš Kekely: Hardware acceleration of IDS for high-speed networks. In: 44th Network Management Research Group (NMRG) meeting, Prague, Czech Republic, 2017.
  • Luuk Hendriks, Petr Velan, Ricardo de O Schmidt, Pieter-Tjerk de Boer, Aiko Pras: Threats and Surprises behind IPv6 Extension Headers. In: 2017 Network Traffic Measurement and Analysis Conference (TMA). Dublin, Ireland, 2017.
  • Luuk Hendriks, Petr Velan, Ricardo de O Schmidt, Pieter-Tjerk de Boer, Aiko Pras: Flow-Based Detection of IPv6-specific Network Layer Attacks. In: Security of Networks and Services in an All-Connected World. AIMS 2017. Lecture Notes in Computer Science, vol 10356. Springer, Cham
  • Jansky T., Čejka T., Bartoš V. (2017) Hunting SIP Authentication Attacks Efficiently. In: Security of Networks and Services in an All-Connected World. AIMS 2017. Lecture Notes in Computer Science, vol 10356. Springer, Cham
  • Čejka T., Žádník M.: Preserving Relations in Parallel Flow Data Processing. In: Security of Networks and Services in an All-Connected World. AIMS 2017. Lecture Notes in Computer Science, vol 10356. Springer, Cham
  • Švepeš M., Čejka T.: Making Flow-Based Security Detection Parallel. In: Security of Networks and Services in an All-Connected World. AIMS 2017. Lecture Notes in Computer Science, vol 10356. Springer, Cham
  • Václav Bartoš: Evaluating Reputation of IP Addresses. In: Proceedings of the 5th Prague Embedded Systems Workshop 2017 (PESW2017), Roztoky u Prahy, Czech Republic, 2017.
  • Tomáš Jánský, Tomáš Čejka, Václav Bartoš: Detection of SIP Scans and Bruteforce Attacks. In: Proceedings of the 5th Prague Embedded Systems Workshop 2017 (PESW2017), Roztoky u Prahy, Czech Republic, 2017.
  • Tomáš Čejka, Marek Švepeš, Jan Viktorin: Gateway for IoT Security. In: Proceedings of the 5th Prague Embedded Systems Workshop 2017 (PESW2017), Roztoky u Prahy, Czech Republic, 2017.
  • Petr Velan: Security Tools as a Service. In: Proceedings of the 5th Prague Embedded Systems Workshop 2017 (PESW2017), Roztoky u Prahy, Czech Republic, 2017.
  • Martin Žádník: DDoS mitigation at 100G. In: Proceedings of the 5th Prague Embedded Systems Workshop 2017 (PESW2017), Roztoky u Prahy, Czech Republic, 2017.
  • Pavel Benáček, Viktor Puš, Michal Kekely, Lukáš Richter, Pavel Minařík, Jan Pazdera: 100G In-Band Network Telemetry with P4 and FPGA. In: P4 Workshop, Stanford, CA, USA, 2017.
  • Lukáš Kekely, Viktor Puš: Flexible network monitoring at 100Gbps and beyond. In: Géant’s 2nd SIG-PMV meeting, Amsterdam, Netherlands, 2017.
  • Lukáš Kekely: Hardware acceleration of network traffic monitoring and analysis in 100Gbps networks. In: HiPEAC Workshop, Ostrava, Czech Republic, 2017.
  • Radek Iša, Jiří Matoušek: A Novel Architecture for LZSS Compression of Configuration Bitreams Within FPGA. In: Proceedings 2017 IEEE 20th International Symposium on Design and Diagnotics of Electronic Circuit & Systems (DDECS). Dresden: IEEE CS, 2017, pp. 175-180. ISBN 978-1-5386-0471-7.
  • Jiří Matoušek, Gianni Antichi, Adam Lučanský, Andrew W. Moore, Jan Kořenek: ClassBench-ng: Recasting ClassBench After a Decade of Network Evolution. In: 2017 ACM/IEEE Symposium on Architectures for Networking and Communications Systems. Beijing: IEEE CS, 2017, pp. 204-216. 978-1-5090-6386-4.
  • Viktor Puš:  InBand Network Telemetry With P4 and FPGA at 100 Gbps. Presentation at Dataplane Acceleration Developer Day Europe 2017, Utrecht, Netherlands, 2017.

2016:

2015:

  • Viktor Puš, Lukáš Kekely, Jan Kučera, Denis Matoušek: Live Demonstration of Application Layer Traffic Monitoring at 100 Gbps. In: The 40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, US, 2015.
  • Pavel Benáček, Viktor Puš, Hana Kubátová :  Automatic Generation of 100 Gbps Packet Parsers from P4 Description. In: First International Workshop on Heterogeneous High-performance Reconfigurable Computing, Austin, USA, 2015.
  • Tomáš Čejka, Radoslav Bodó, Hana Kubátová: Nemea: Searching for Botnet Footprints. In: Proceedings of the 3rd Prague Embedded Systems Workshop, Prague, Czech Republic, 2015.
  • David Alexa, Tomáš Čejka: Easy configuration of NETCONF devices. In: Proceedings of the 3rd Prague Embedded Systems Workshop, Prague, Czech Republic, 2015.
  • Radek Krejčí, Josef Hájek: Overview of the Local Network Monitoring Projects and Tools. CESNET Technical Report, 2015
  • Tomáš Čejka, Václav Bartoš, Lukáš Truxa, Hana Kubátová: Using Application-Aware Flow Monitoring for SIP Fraud Detection. In: Proc. of 9th International Conference on Autonomous Infrastructure, Management and Security (AIMS15), 2015.
  • Petr Velan, Viktor Puš: High-Density Network Flow Monitoring. In: Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management, Ottawa, Canada, 2015
  • Viktor Puš, Petr Velan, Lukáš Kekely, Jan Kořenek, Pavel Minařík: Hardware Accelerated Flow Measurement of 100G Ethernet. In: Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and Service Management, Ottawa, Canada, 2015
  • Martin Žádník, Pavel Krobot, Lukáš Kekely, Viktor Puš, Jan Kořenek: Distribuovaný kolektor záznamů o IP tocích: návrh a první experiment. CESNET technical report 2/2015.

2014:

  • Viktor Puš: Connection for the fast analysis of packet headers transferred via data bus. United States Patent no. 8,923,300
  • Pavel Benáček, Hana Kubátová and Viktor Puš: Architecture of Effective High-Speed Network Stream Merger. In: Euromicro Conference on Digital System Design (DSD), Verona, Italy, 2014
  • Tomáš Čejka, Zdeněk Rosa and Hana Kubátová: Stream-wise Detection of Surreptitious Traffic over DNS. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (CAMAD 2014). Athens, 2014
  • Pavel Benáček, Rudolf B. Blažek, Tomáš Čejka, and Hana Kubátová: Change-point detection method on 100 Gb/s ethernet interface (poster). In Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems (ANCS ’14). ACM, New York, USA, 2014
  • Martin Žádník, Erik Šabík, Václav Bartoš: Detection of Network Flow Timestamp Reliability. In: 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, 2014.
  • Tomáš Čejka, Lukáš Kekely, Pavel Benáček, Rudolf B. Blažek, Hana Kubátová: FPGA Accelerated Change-Point Detection Method for 100Gb/s Networks. In: 9th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2014), Telč, Czech Republic, 2014
  • Lukáš Kekely, Viktor Puš, Pavel Benáček, Jan Kořenek: Trade-offs and Progressive Adoption of FPGA Acceleration in Network Traffic Monitoring. In: 24th International Conference on Field Programmable Logic and Applications (FPL 2014), Munich, Germany, 2014
  • Lukáš Kekely, Viktor Puš, Jan Kořenek: Software Defined Monitoring of Application Protocols. In: Proceedings of the IEEE INFOCOM 2014 – IEEE Conference on Computer Communications, Toronto, Canada, 2014
  • Vaibhav Bajpai, Radek Krejčí: Managing SamKnows probes using NETCONF (poster). In: Proceedings of the IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 2014
  • Viktor Puš, Lukáš Kekely, Jan Kořenek: Design Methodology of Configurable High Performance Packet Parser for FPGA. In: Proceedings of the 17th IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, Warsaw, Poland, 2014
  • Tomáš Závodník, Lukáš Kekely, Viktor Puš: CRC based hashing in FPGA using DSP blocks. In: Proceedings of the 17th IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, Warsaw, Poland, 2014
  • Viktor Puš, Pavel Benáček: Application Specific Processor with High Level Synthesized Instructions. In: Proceedings of the 22nd ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Monterey, USA, 2014
  • Tomáš Závodník, Lukáš Kekely, Viktor Puš: Using DSP blocks to compute CRC hash in FPGA. In: Proceedings of the 22nd ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, Monterey, USA, 2014
  • Václav Bartoš, Martin Žádník: An Analysis of Correlations of Intrusion Alerts in an NREN. In: 2014 IEEE 19th International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD). IEEE, 2014.

2013:

  • Radek Krejčí: Building NETCONF-enabled Network Management Systems with libnetconf. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management 2013, Ghent, Belgium, 2013
  • Petr Velan: Practical Experience with IPFIX Flow Collectors. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management 2013, Ghent, Belgium, 2013
  • Václav Bartoš, Pavel Čeleda, Tomáš Kreuzwieser, Viktor Puš, Petr Velan, Martin Žádnik: Monitoring, Detection and Reporting of Security Incidents in CESNET NREN. In: Proceedings of The TERENA Networking Conference 2013, Maastricht, Netherlands, 2013
  • Viktor Puš, Lukáš Kekely: Software Defined Monitoring: A New Approach to Network Traffic Monitoring. In: Proceedings of The TERENA Networking Conference 2013, Maastricht, Netherlands, 2013
  • Viktor Puš: Connection for the fast analysis of packet headers transferred via data bus. Czech patent no. 303954.
  • Jiří Matoušek, Martin Skačan, Jan Kořenek: Memory Efficient IP Lookup in 100 Gbps Networks, In: 23rd International Conference on Field Programmable Logic and Applications (FPL’13), Porto, PT, IEEE CAS, 2013, ISBN 978-1-4799-0004-6
  • Martin Elich, Petr Velan, Tomáš Jirsík, Pavel Čeleda: An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis. In 38th Annual IEEE Conference on Local Computer Networks (LCN 2013), Sydney, Australia, 2013
  • Václav Bartoš, Martin Žádník, Tomáš Čejka: Nemea: Framework for stream-wise analysis of network traffic. CESNET Technical Report, 2013
  • Štěpán Friedl, Viktor Puš, Jiří Matoušek, Martin Špinler. Designing a Card for 100 Gb/s Network Monitoring. Technical report 7/2013, CESNET, 2013.

2012:

  • Puš V.: Hardware acceleration for measurements in 100 Gb/s networks. In: Proceedings of 6th International Conference on Autonomous Infrastructure, Management and Security (AIMS), LNCS, vol. 7279, Springer, Heidelberg, 2012
  • Kořenek J., Puš V.: Reducing memory in high-speed packet classification. In: Proceedings of 3rd International Workshop on TRaffic Analysis and Classification, Limassol, Cyprus, 2012
  • Friedl Š., Novotný J., Puš V.: Implementation of 100ge card with hardware acceleration. In: Proceedings of The TERENA Networking Conference 2012, Reykjavík, Iceland, 2012
  • Velan, P., Krejčí, R.: Flow Information Storage Assessment Using IPFIXcol. In: Proceedings of 6th International Conference on Autonomous Infrastructure, Management and Security (AIMS), LNCS, vol. 7279, Springer, Heidelberg, 2012, p. 154-157
  • Krejčí, R., Čeleda, P., Dobrovolný, J.: Traffic Measurement and Analysis of Building Automation and Control Networks. In: Proceedings of 6th International Conference on Autonomous Infrastructure, Management and Security (AIMS), LNCS, vol. 7279, Springer, Heidelberg, 2012
  • Čeleda, P., Krejčí, R., Krmíček, V.: Revealing and Analysing Modem Malware. In Proceedings of IEEE International Conference on Communications, ICC 2011, Ottawa, Canada, 2012
  • Čeleda, P., Krejčí, R., Krmíček, V.: Flow-Based Security Issue Detection in Building Automation and Control Networks. In EUNICE Conference on Information and Communications Technologies, LNCS, vol. 7479, Springer, Heidelberg, 2012
  • Kekely, L., Puš, V., Kořenek, J.: Low-Latency Modular Packet Header Parser for FPGA, In: ACM/IEEE Symposium on Architectures for Networking and Communications Systems, Austin, US, ACM, 2012, p. 77-78, ISBN 978-1-4503-1685-9
  • Václav Bartoš, Pavel Čeleda, Tomáš Kreuzwieser, Viktor Puš, Petr Velan, Martin Žádník: Pilot Deployment of Metering Points at CESNET Border Links. CESNET technical report, CESNET, 2012.
  • Tomáš Čejka, Pavel Benáček, Štěpán Friedl, Radek Krejčí: COMET-COMBO Ethernet Tester. CESNET technical report, CESNET, 2012.

2011:

  • Kajan M., Kořenek J., Puš V.: Hardware Architecture for Packet Classification with Prefix Coloring, In: IEEE Design and Diagnostics of Electronic Circuits and Systems DDECS’2011, Cottbus, DE, IEEE CS, 2011, p. 231-236, ISBN 978-1-4244-9753-9
  • Lhotka, L.: Configuring network devices with NETCONF and YANG., In XML Prague 2011 Conference Proceedings, MATFYZPRESS, Prague, Czech Republic, 2011, p. 99-124, ISBN: 978-80-7378-160-6

2010:

  • Kořenek J., Puš V.: Memory Optimization for Packet Classification Algorithms in FPGA, In: Proceedings of the 13th IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, Vienna, AT, IEEE CS, 2010, p. 297-300, ISBN 978-1-4244-6610-8
  • Novotný J., Čeleda P., Dedek T., Krejčí R.: Hardware Acceleration for Cyber Security. In IST-091 – Information Assurance and Cyber Defence. NATO Research and Technology Organization, Tallinn, Estonia, 2010, p. 86-101, ISBN 978-92-837-0115-6
  • Novotný J., Čeleda P., Krejčí R.: Hardware Acceleration: An Essential Part of Cyber Security in High-Speed Networks. DeepSec – In Depth Security Conference. DeepSec GmbH, Vienna, Austria, 2010.

2009:

  • Kořenek, J., Puš, V.: Fast and scalable packet classification using perfect hash functions, In: Proceeding of the ACM/SIGDA international symposium on Field programmable gate arrays, New York, US, ACM, 2009, p. 229-236, ISBN 978-1-60558-410-2
  • Kořenek, J., Puš, V.: Memory Optimization for Packet Classification Algorithms, In: Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, New York, US, ACM, 2009, p. 165-166, ISBN 978-1-60558-630-4

2008:

  • Krejčí R., Lhotka L., Čeleda P., Špringl P.: Secure Remote Configuration of Network Devices – a Case Study, In proceedings of CESNET Conference 2008, CESNET, z. s. p. o., Prague, Czech Republic, 2008, p. 77-84, ISBN: 978-80-904173-0-4
  • Bartoš K., Grill M., Krmíček V., Rehák M., Čeleda P.: Flow Based Network Intrusion Detection System using Hardware-Accelerated NetFlow Probes, In proceedings of CESNET Conference 2008, CESNET, z. s. p. o., Prague, Czech Republic, 2008, p. 49-56, ISBN: 978-80-904173-0-4