IT Research

  • Intro
  • Teaching
  • Research
  • Projects
  • Software
  • Visual Analytics in Cyber Security

Short Professional Bio:

portrait-2011-is
Assistant professor at Masaryk University, Faculty of Informatics, Brno, Czech Republic. Formerly Vice-Dean for Development, Public Relations and Lifelong Learning. IT administrator at Faculty of Social Studies, MU.
He received his master degree in computer science at Masaryk University in Brno, Czech Republic, in 1999. In 2004, he received his PhD degree at the same university, both for the application of software engineering methods to the area of computer graphics. In 2005, he spent his short-term fellow (one month) at the Institute of Computer Graphics and Algorithms, Computer Graphics Group, Vienna University of Technology.
His research interests address the issues of interactive techniques in software engineering and data analysis. As a research group leader within the Laboratory of Software Architectures and Information Systems, LaSArIS, he focuses on interactive visualizations, exploratory analytics and semantics modeling in cyber security. As a guest member of the Laboratory of Dialogue Systems, LSD, he also focuses on the dialogue-based interaction with graphical data. For more info see Research section.
His is the holder of the OMG-Certified UML Professional Fundamental Exam certificate. For more info try Curriculum Vitae.

Contant:

  • Radek Oslejsek,
  • Address: Faculty of Informatics, Botanicka 68a, 602 00, Brno, Czech Republic (office A305)
  • Phone: +420-549 49 6121
  • E-mail: oslejsek@fi.muni.cz

Courses

Since 2010
PhD Thesis Proposal
Seminar
Since 2009
Seminar of Lasaris lab.
Seminar
Since 2008
Object-Oriented Programming in Java
Lecture and lab
Since 2005
Object-Oriented Methods for Design of Information Systems
Lecture
Since 2005
Project in Object-Oriented Methods for Design of Information Systems
Lab
2001 – 2007
Systems Analysis and Design
Lecture and lab
2001 – 2002
Principles of Computer Graphics
Lab

Tutorials and Guest Lectures

05/2015
OpenGL Fundamentals
Erasmus+ Mobility Program, practical course, 16 hours
Free University of Bolzano-Bozen, Italy
09/2006
Unified Modeling Language
Commercial course for a business partner
Masaryk University, Czech Republic

Student Supervision

2018
Master’s thesis
Norbert Fábián
Adaptation of data services used by a network topology visualization
2017
Master’s thesis
Petr Koláček
Web application for interactive design of security scenarios
2017
Master’s thesis
Silvia Vigašová
Web application for surveys
2017
Master’s thesis
Ľubomír Košarišťan
Management tools for service-oriented projects of small and medium-sized enterprises
2017
Bachelor’s thesis
Michaela Bamburová
Digital library of disk images
2017
Bachelor’s thesis
Lenka Janečková
Web-based chat for cyber security exercises
2017
Bachelor’s thesis
Martin Korec
Account Management in KYPO Cyber Range
2017
Bachelor’s thesis
Ondřej Sotolář
Library supporting GUI testing automation
2017
Master’s thesis
Radim Fornůsek
Extensions of the network topology portlet
2016
Master’s thesis
Filip Bogyai
Identity Management for KYPO Cyber Range
2016
Master’s thesis
Karolína Burská
Portlets for the management and visualization of sandboxes in Cybernetic Proving Ground
2016
Master’s thesis
Jiří Dočkal
Web portlet for replaying time-oriented data
2016
Master’s thesis
Peter Greň
High Performance Networking and Charting in Web Applications
2016
Master’s thesis
Milan Skipala
Multi-Value 3D Chart
2016
Master’s thesis
Tomáš Bobek
Visualization of node-related events in computer networks
2016
Master’s thesis
Martin Rozkoš
Portlet for creating network topology in security scenarios
2016
Bachelor’s thesis
Zuzana Sadloňová
Mobile Application for Fire-Fighting Units
2015
Bachelor’s thesis
Igor Orság
New Visualization Data Service for Cybernetic Proving Ground
2015
Master’s thesis
Michal Kňazský
Time Portlet for Cybernetic Proving Ground
2015
Bachelor’s thesis
Martin Spišiak
Data Services for Cybernetic Proving Ground
2014
Master’s thesis
Branislav Paulis
Ontologies for BPMN
2014
Master’s thesis
Michal Sukupčák
Synopsy PHP Framework
2014
Master’s thesis
Adam Brauner
Portlets for 2D visualization of time series
2014
Master’s thesis
Andrej Lučanský
Porlet for the Visualization of Network Topology
2014
Master’s thesis
Petr Jelínek
Porlet for 3D visualization of time series
2014
Master’s thesis
Robert Dubecký
Data service for Cybernetic Proving Ground’s visualizations
2014
Master’s thesis
Vladimír Červeň
Integration of information systems in oXy Online
2014
Bachelor’s thesis
Jakub Jurových
Techniques for JavaScript debugging – dean’s price
2014
Master’s thesis
Jakub Mareček
NoSQL database for the storage of OWL data
2014
Master’s thesis
Tomáš Botek
Usage of Agile Principles in Game Development – dean’s price
2014
Bachelor’s thesis
Diana Vilkoláková
JavaScript library for the interaction with SVG pictures
2013
Master’s thesis
Aleš Nevřela
Dialogue Component for GATE System
2013
Master’s thesis
Alžběta Černá
Semantic Description of UML Models by Means of OWL Ontologies
2013
Master’s thesis
Dominik Michna
Adaptive User Interface for ERP System
2013
Master’s thesis
Jaromír Nyklíček
Real-time web applications
2013
Master’s thesis
Petr Kubík
EJB component for the manipulation with ontologies
2013
Master’s thesis
Radim Honzírek
Library for work scheduling automatization
2013
Master’s thesis
Tomáš Kratěna
Portlet for interactive visualization of dynamic data
2013
Master’s thesis
Jakub Janoušek
Optimizing Websites for Mobile Devices
2013
Master’s thesis
Branislav Paulis
E-learning Application for Design Patterns
2013
Bachelor’s thesis
Martina Hradská
Harvesting Non-Structured Data from Facebook
2013
Bachelor’s thesis
Petr Suchý
System for radio monitoring
2013
Bachelor’s thesis
Tomáš Bobek
Web application for medal ribbons editing
2013
Master’s thesis
Jan Vostal
Community web pages based on social network
2013
Master’s thesis
Jiří Harazim
Mediation Chain Generation for Device Integration in Pervasive Environments
2013
Master’s thesis
Jiří Procházka
Adaptive system for knowledge testing
2013
Master’s thesis
Martin Sokol
Automatic testing of web applications
2013
Bachelor’s thesis
Václav Bor
Wide System Intergrating Many E-shops Together
2012
Master’s thesis
Peter Dunčák
Vizualization of Sentiment in Discussion Threads
2012
Master’s thesis
Radek Sikora
Search in Czech Documents by Means of Apache Solr
2012
Master’s thesis
Radoslav Matúška
Behaviour Analysis in Community Networks, Self-Regulated Evaluation Systems, Trust Propagation
2012
Master’s thesis
Tomáš Mudra
Information System for Kajot Poker Club
2012
Bachelor’s thesis
Filip Nálepa
Tool for Harvesting Non-Structured Data from Social Networks
2012
Bachelor’s thesis
Jan Šťastný
Application for the Management of Virtual Web Hosts at FSS MU
2012
Bachelor’s thesis
Michal Sukupčák
Framework for Rapid Development of Web Pages
2012
Master’s thesis
Matej Uhrin
Pictures content recognition in the context of communication images
2012
Master’s thesis
Ondřej Božek
System for the Management of Web Forms
2012
Master’s thesis
Petr Nehyba
EJB Component for Efficient Storage of SVG Pictures
2012
Master’s thesis
Radek Šťasta
Object detection in pictures for the G.A.T.E. system
2012
Master’s thesis
Zdeněk Kedaj
Spectrograms of web discussions
2011
Master’s thesis
Karel Barot
Animal Refuge System
2011
Master’s thesis
Marek Chrenko
Sonification Module for Visually Impaired
2011
Master’s thesis
Miroslav Němec
Architecture Patterns – Case Study
2011
Master’s thesis
Pavol Löbb
Pattern-based Software Life Cycle
2011
Bachelor’s thesis
Maroš Džoganík
Information System for Elementary and Secondary Schools
2011
Master’s thesis
Jakub Vavřík
Performence Testing of Web Applications
2011
Master’s thesis
Ján Kotúč
Performence Testing of Web Applications in the Context of Continuous Integration
2011
Master’s thesis
Michal Čermák
Auto Spare Parts E-shop
2011
Master’s thesis
Michal Řihák
Distribution of processing unit utilization in flow-based data processing
2011
Bachelor’s thesis
Jaromír Nyklíček
Annotator of SVG Pictures
2010
Master’s thesis
Stanislav Petrů
DART – Design Analysis Re-engineering Tool
2010
Master’s thesis
Lukáš Krempaský
Communication System for the Maintenance of the Heat Power Plant Devices
2010
Master’s thesis
Lukáš Pitoňák
Module for Budget Planning
2010
Master’s thesis
Tomáš Kozel
Light Operative Database of CHMI
2010
Master’s thesis
Ivana Jansová
Maven plugin
2010
Master’s thesis
Juraj Lehotský
Customer Relationship Management System
2010
Master’s thesis
Radek Vařbuchta
Plugin to the Continuous Integration System
2009
Master’s thesis
Stanislav Tvarůžek
The Shift Towards Cloud Computing
2009
Master’s thesis
Jaromír Viteker
CMS Modeling Tool
2009
Master’s thesis
Jiří Golembiovský
JavaScript Development Environment
2009
Master’s thesis
Jiří Vyskup
Client-server Songbook
2009
Master’s thesis
Kamil Páral
Java SMS Sender
2009
Master’s thesis
Martin Pešout
Project and Task Management Web Application
2009
Master’s thesis
Martin Šufliarsky
System for the analysis of the behaviour of e-shop visitors
2009
Master’s thesis
Adam Kulhánek
Songbook Standalone Application
2009
Master’s thesis
Jan Kubát
Songbook Web Client
2009
Bachelor’s thesis
Jan Šedo
Social Network System
2009
Bachelor’s thesis
Jiří Locker
Flow Execution Control
2009
Master’s thesis
Martin Lazar
Application for web template framework
2009
Master’s thesis
Tomáš Časar
Active Query System
2009
Bachelor’s thesis
Jaroslav Smolinský
Information System for Ryboprodukt
2009
Bachelor’s thesis
Pavel Reichl
Octree-based Ray Tracer
2009
Bachelor’s thesis
Ľuboš Kohút
Java Homeworks Correction Tool
2008
Master’s thesis
Lubor Nosek
Financial Management System
2008
Master’s thesis
Miroslav Patočka
Information System Based on the Model Driven Architecture
2008
Master’s thesis
Tomáš Mach
Automatic Adjustment of Electron Microscope
2008
Bachelor’s thesis
Milan Vymazal
Effective Data Structures for Hierarchical Records
2008
Bachelor’s thesis
Michal Smejkal
Library Information System
2008
Master’s thesis
Miroslav Jelínek
Methods for Measurement of Load in the Ethernet Networks
2008
Master’s thesis
Michal Bebják
Web-service for the Management of Non-profit Organization
2008
Master’s thesis
Vladimír Bičík
Helpdesk System
2008
Bachelor’s thesis
Filip Nešpor
Web-based Management of User Accounts
2008
Bachelor’s thesis
Peter Tužinský
Restaurant Intranet System
2008
Bachelor’s thesis
Peter Langer
A Tool for Storing SVG Pictures in a Relational Database
2008
Bachelor’s thesis
Tomáš Koníček
Centralized Resource Management System
2007
Master’s thesis
Přemysl Šteidl
Comparison of a VPN Realizations
2007
Master’s thesis
Zbyněk Sochor
Tournament System as a Web Service
2007
Bachelor’s thesis
Jan Kubát
Web catalogue implementation
2007
Bachelor’s thesis
Ladislav Kryštof
SW for Comparison and Analysis of SQL Databases
2007
Bachelor’s thesis
Lukáš Havlíček
Web-based Financial Control System
2007
Bachelor’s thesis
Michal Navrátil
Parser of POV-Ray Scenes for ESG Library
2007
Bachelor’s thesis
Miroslav Hořejší
Ontology Management System
2007
Bachelor’s thesis
Miroslav Warchil
Export of a Scene Graph to XML
2007
Bachelor’s thesis
Pavel Borkovec
Sales-return System for Wholesaling Store
2007
Bachelor’s thesis
Radek Bartoš
XML-based photo gallery
2007
Bachelor’s thesis
Radek Vařbuchta
Web application for entering interesting places on the map
2007
Bachelor’s thesis
Roman Šustek
Analysis and Design of Photo Editor
2007
Bachelor’s thesis
Rostislav Wolný
Integration of e-shop into an existing web framework
2007
Bachelor’s thesis
Jiří Vyskup
Web catalogue analysis and design
2007
Bachelor’s thesis
Juraj Lehotský
System for Financial Control at MU
2007
Master’s thesis
Antonín Karásek
Percussion Automat With Sound Data Sharing
2007
Bachelor’s thesis
Štěpán Havlíček
System for e-publishing
2006
Master’s thesis
Peter Čerenský
System for Automated Control of Carved Flat Pieces
2006
Master’s thesis
Rastislav Laurinc
Desing of the Betting System with Digital Signatures and Time-Stamps
2006
Bachelor’s thesis
Jiří Zvolánek
Oct-Tree for Irradiance Caching
2006
Bachelor’s thesis
Tomáš Kozel
System for coordination of IT department activities
2006
Bachelor’s thesis
Tomáš Mach
The Tool for Creation of Virtual Walks on the Web
2006
Bachelor’s thesis
Vítězslav Papiež
Parser of Inventor Scenes for ESG Library
2006
Master’s thesis
Roman Ďaďan
UML-based Proposal of E-Mail Client Supporting Cryptography
2006
Bachelor’s thesis
David Vajčner
Ray-tracing with Concept of Explorers
2006
Bachelor’s thesis
Lukáš Petrlík
Information system for online computer shop
2006
Bachelor’s thesis
Stanislav Tvarůžek
Application of design patterns to the J2EE platform
2005
Bachelor’s thesis
Jan Balek
Nanášení textur přes pomocné povrchy
2004
Bachelor’s thesis
Václav Samec
Zobrazování rozsáhlých terénů pomocí prostorových třídících struktur

Exploratory Visual Analytics in Cyber Security

Cyber Security Analysis and Training group of the Laboratory of Software Architectures and Information Systems, LaSArIS, aims at developing visualization techniques enabling users to understand big or unstructured data by means of interactive manipulation. We are concerned, for instance, with exploratory data analysis, web-based visualizations, multi-modal interactions or adaptive user interfaces.
Research topics:
    • Cyber security data monitoring, storage and semantic modeling.
    • Techniques of exploratory forensic analysis.
    • Visualization techniques for situation awareness.
    • Providing insight into cyber threats via interactive visualizations.
    • Hands-on cyber exercises and their evaluation.
Related research projects:
  • Simulation, detection, and mitigation of cyber threats endangering critical infrastructure (2016 – 2019)
  • Cybernetic Proving Ground (2013 – 2015)

Dialogue-based interaction with graphical data.

Former research with the Laboratory of Dialogue Systems, LSD. This research group aimed at developing techniques and applications enabling the visually impaired people to explore pictures by means of natural language. Our approach was based on ontology-based semantics modeling, automated picture annotation and smart dialogue interaction.
Related research projects:
  • Dialogue generation of web presentations and graphics for visually impaired people (2007 – 2010)
  • Human-computer interaction, dialog systems and assistive technologies (1999 – 2004)

Boards and Committees

2018
EG/VGTC Conference on Visualization (EuroVis) – organization committee member
2017
ACM Technical Symposium on Computer Science Education (SIGSCE) – program committee member for lightning talks
Since 2015
Open Computer Science – editorial board member
Since 2014
IT SPY (formerly ACM SPY) – committee member
2012 – 2014
University Development Fund of the Ministry of Education, Youth and Sports (FRVŠ) – committee for the examination process at MU
Since 2011

Reviewing Activities

2017
IEEE Symposium on Visualization for Cyber Security (VizSec)
2016
2015
2014
2014
Grant Agency of Charles University – PhD projects reviewer
2013
International ACM Sigsoft Conference on the Quality of Software Architectures (QoSA)
2013
International Conference on Data Mining and Intelligent Information Technology Applications (ICMIA)
2013
International Conference on Networked Computing and Advanced Information Management (NCM)
2012
International Conference on Computing Technology and Information Management (ICCM)
2012
Grant Agency of Charles University – PhD projects reviewer
2010
Grant Agency of Charles University – PhD projects reviewer
2007

Commercial Certificates

2012
OMG: OMG-Certified UML Professional Fundamental Exam
2005
LBMS: Object-oriented analysis and design in UML

Publications:

Research Projects:

2016 – 2019
Simulation, detection, and mitigation of cyber threats endangering critical infrastructure.
The project aims at research and development of tools for economically-and-time efficient simulation of real Critical Information Infrastructures (CIIs), detecting of cyber-threats, and then mitigation. The created tools will provide support for automated preparation and execution of security teams’ training and exercises. Created results will improve technical and professional cyber-security preparedness of Czech Republic in the terms of CII protection.
Funded by Ministry of Interior of the CR, Grant no. VI20162019014.
Role: Co-investigator (leader at FI MU, software architect, head of the „visualization“ research team).
2013 – 2015
Cybernetic Proving Ground (KYPO)
Ministry of Interior Award for the exceptional results in the field of security research
Cybernetic Proving Ground (CPG) is a project of applied research. It aims to develop a unique environment intended for the research and development of methods for cyber attacks protection. Utilizing cloud environment, it will be possible to simulate complex cyber attacks against real networks and IT infrastructures and then to analyze these attacks. The polygon will be usable for the development of new security tools as well as for the training of security teams. This project reacts to current demands of National Security Authority of the Czech Republic, Ministry of the Interior of CR and security teams (government and national CSIRT/CERT) under the strategic goals and obligations of CR in EU.
Funded by Ministry of Interior of the CR, Grant no. VG20132015103.
Role: Co-investigator (leader at FI MU, head of the „visualization“ research team).
2009 – 2011
Triangulated models in service of haptic and virtual reality
Funded by Czech Science Foundation, Grant no. 201/09/0097.
Role: Research team member.
2007 – 2010
Dialogue generation of web presentations and graphics for visually impaired people
The basic idea of the project consists in developing web presentations and graphics through a dialogue, therefore in a way that is fully feasible for blind users.
Funded by Czech Science Foundation, Grant no. 201/07/0881.
Role: Research team member responsible for the graphical part and semantic modeling.
2006 – 2011
CPG – Center of Computer Graphics
A cooperation project in the Czech Republic between Masaryk University (Brno), Brno University of Technology, Czech Technical University (Prague) and University of West Bohemia (Pilsen).
Funded by Ministry of Education, Youth and Sports of the CR, Grant no. LC06008.
Role: Participation in research.
2006 – 2008
Generic OO Architectures in the Computer Graphics and Virtual Reality
Various applications of computer graphics have different requirements on the description of virtual scenes and graphic architecture. Therefore, the real projects use their own specific and often monolithic solutions that are not easily extensible or modifiable. However, methods of software analysis propose many techniques and tools for development of reusable pieces of software. The goal of this project is to exploit these techniques in order to propose generic architectures unifying several fields of the computer graphics.
Funded by Czech Science Foundation, Grant no. 201/06/P247.
Role: Principal investigator (post-doc grant).
1999 – 2004
Human-computer interaction, dialog systems and assistive technologies
The aim of the research proposal is an integrated approach to HCI. In this framework, the main task is to combine techniques developed in the VR field with the techniques built in NLP and dialogue systems area. Special attention will be paid to the assistive technologies (directed to the improvement of life standards and support of handicapped). The combination of the research in VR, NLP, DGS field using both written and spoken natural language will yield a number of new research results and will contribute to the society. In this regard, a reasonable impact of the results on the international forum can be expected.
Funded by Ministry of Education, Youth and Sports of the CR, Grant no. VZ MSM 143300003.
Role: Participation in research (young researcher).

Industrial Projects, Applied Research and Expert Studies:

2015 – 2016
Expert studies and qualified price estimations of a unified security system in Prague
Contractor: Prague Municipal Authority.
2014
Mobilní řešení na pořízení dat související s montáží elektroměrů v terénu
Investor: E.ON Servisní s.r.o. Contractor: TakePlace company. Role: Software analyst responsible for requirements analysis, use case modeling and software architecture.
2013
Posouzení stávajícího stavu jednotného bezpečnostního systému MHMP z pohledu jeho dalšího rozvoje
Contractor: Prague Municipal Authority.
2010
Studie proveditelnosti ve Fakultní nemocnici Brno z pohledu implementace nového nemocničního informačního systému FN u svaté Anny
Contractor: The University Hospital Brno
2008 – 2010
Establishment of Czech IPPC information system
The establishment of a new comprehensive information system and information infrastructure based on existing information sources in administrative and legislative activities of the Ministry of Environment of the Czech Republic.
Funded by Ministry of Environment of the Czech Republic via CENIA, Czech Environmental Information Agency, Grant no. SP/4H5/173/08. Role: Research team member, developer of IPPC system.
2010
Analysis and Modification of CRM System and Formulation of Required Business Processes
Analysis and functional modification of existing CRM system. Business process modeling and use-case modeling of concrete business partner.
Innovation voucher co-financed by the Municipality of Brno, business partner KeyTech, s.r.o. Role: Investigator.

Development Projects:

2014 – 2015
Popularizace vědy a výzkumu v přírodních vědách a matematice s využitím potenciálu MU
Funded by Ministry of Education, Youth and Sports of the CR, Grant no. CZ.1.07/2.3.00/45.0018. Role: Co-investigator at FI MU, coordinator of open days and editor-in-chief of printed PR materials.
2011 – 2013
Innovation of the Applied Informatics Bachelor Study Programme towards the Social Informatics
The aim of the project is an innovation of the study programme Applied Informatics at Bachelor’s level at the Faculty of Informatics, namely in the field of study Social informatics.
Funded by Ministry of Education, Youth and Sports of the CR and European Social Fund in the CR, Grant no. CZ.1.07/2.2.00/15.0184. Role: Participation in project, innovation of PB162 course in autumn 2012 and spring 2013
2010 – 2013
Innovation of PhD study programmes of the Faculty of Informatics Masaryk University
The purpose of the project is an innovation of PhD studies at FI MU.
Funded by Ministry of Education, Youth and Sports of the CR and European Social Fund in the CR, Grant no. CZ.1.07/2.2.00/15.0196. Role: Participation in the project, DTEDI course lecturer.
2010 – 2013
Platform for cooperation in research and education with FI MU in data processing
This project aims (1) to strengthen the cooperation of FI MU with the application sector, (2) to undertake a systematic approach in order to involve FI MU students in activities of the industrial sector, (3) to address lack of qualified staff (graduates) in the area of information and communication technologies in both the region of South Moravia, as well as in the Czech Republic as such.
Funded by Ministry of Education, Youth and Sports of the CR and European Social Fund in the CR, Grant no. CZ.1.07/2.4.00/12.0049. Role: Participation in the project (till June 2012), cooperation with IBA CZ and oXy Online industrial partners.
2009 – 2012
Innovation of Master’s study programmes of the Faculty of Informatics Masaryk University
The purpose of the project is an innovation of the most number of courses and their other advancement and creation of the system of education for teachers, staff members, students and necessary infrastructure.
Funded by Ministry of Education, Youth and Sports of the CR and European Social Fund in the CR, Grant no. CZ.1.07/2.2.00/07.0457. Role: Participation in project, innovation of PA103 and PV167 courses.

kypo-small

KYPO (Kybernetický polygon in Czech, Cybernetic Proving Ground in English) Cyber Range is a cloud-based testbed platform designed especially for a network security management and simulation purposes. It provides the environment for modeling and running virtual network which serves as an isolated environment for controlled analysis of various cyber attacks as well as for cybersecurity training programs.
My participation: Software architect, head of a visualization team.

gate

GATE project is aiming to achieve the following goals. First, development of utilities deployed for easy picture annotation. Second, provision of blind users with support for exploring (“viewing”) pictures. And finally, development of a system utilized for generating images by means of dialogue and enabling the blind to create some limited form of computer graphics.
My participation: Theoretical research. Analysis and implementation of the server side (JavaEE SOA with SVG, OWL and WWL services).

ippc

A web-based administrative system for IPPC. The system serves as a backend tool supporting administrative processes that are connected with the IPPC issues. This Spring MVC tool is available for authorized persons only and then it is „invisible“ in the IPPC web portal.
My participation: External software designer, data analyst and developer, 2010.

caver

CAVER is a software tool for analysis and visualisation of tunnels and channels in protein structures. Tunnels are void pathways leading from a cavity buried in a protein core to the surrounding solvent. Unlike tunnels, channels lead through the protein structure and their both endings are opened to the surrounding solvent. Studying of these pathways is highly important for drug design and molecular enzymology.
My participation: Complete refactoring of this Java-based system using OO design principles and design patterns, 2011.

vrecko

The VRECKO system is being developed in the HCI laboratory for several years. It is a component system capable of managing and displaying the virtual world using various devices, such as computer monitors, large stereo-projections or head mounted displays. It can also take use of data gloves, pinch gloves, PHANToM and ReachIn devices and others. A growing set of components is available, which means new applications can be prototyped rapidly. Plenty of components/extensions were done as students work during appropriate courses or as a part of their theses.
My participation: Implementation of fast collision detection algorithms, 2004-2006.

gra

The main objective of the Generic Rendering Architecture is to propose and develop an OO system that is sufficiently general to treat wide variety of rendering strategies, from local illumination to photorealistic algorithms. The rendering architecture can be particularized according to the common features of energy distribution techniques. We applied modern techniques of object-oriented design to development process, including design patterns principles and UML. These C++ libraries and applications have been developed during my Ph.D. and post-doc research, as a proof of theoretical concepts, and they are not maintained anymore.
My participation: Theoretical research and complete implementation, 2006-2008.

This page summarizes hot research topics that we address in our current research. As a platform for the implementation, testing, and evaluation, we utilize a KYPO Cyber Range that has been developed at Masaryk University and which serves as a safe simulation environment for various cyber security exercises and experiments. For more information about KYPO architecture and types of exercises see:

  1. VYKOPAL, Jan, Radek OŠLEJŠEK, Pavel ČELEDA, Martin VIZVÁRY and Daniel TOVARŇÁK. KYPO Cyber Range: Design and Use Cases. In Proceedings of the 12th International Conference on Software Technologies – Volume 1: ICSOFT. Madrid, Spain: SciTePress, 2017. p. 310-321, 12 pp. ISBN 978-989-758-262-2. doi:10.5220/0006428203100321.
  2. VYKOPAL, Jan, Martin VIZVÁRY, Radek OŠLEJŠEK, Pavel ČELEDA and Daniel TOVARŇÁK. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. In 2017 IEEE Frontiers in Education Conference. Indianapolis, IN, USA: IEEE, 2017. p. 1-8, 8 pp. ISBN 978-1-5090-5919-5.

1 Visual Analysis of CtF Games

Sketch of situation awareness for teachers

Sketch of personalized feedback for learners.

Sketch of personalized feedback for learners.

KYPO Cyber Range facilitates user training under the supervision of teachers. Capture-the-flag games, CtF games, are like a multi-level computer games. Learners play the game either alone or in couples or small groups. They perform tasks prescribed by individual levels. To proceed to a next level, they have either to fulfill prescribed tasks (e.g. hack a server) or they can skip the task. Every level has restricted time and there are also hints provided to users. Learners are penalized for skipping the level, taking hints, and overcoming the time limit. Activities of learners are monitored and logged (taken hints, time of task fulfillment, etc.). A game can be equipped with questionnaires (before, during or after the game).

Challenge: Situation awareness for teachers

To manage an exercise efficiently, teachers need an overview of learners so that they see what level they are in, who needs help, how successful they are, etc. Therefore, our goal is to develop visualizations proving online situation awareness to teachers and to evaluate (a) how much it helps to intervene early and efficiently and (b) how much an early intervention helps learners to gain the required knowledge, avoid frustration, etc.

Challenge: Ex-post analytics for teachers and game designers

The problem of CtF games is how to estimate game criteria like time limits, hints and their penalties for new games and/or according to experience and skills of learners. Therefore, our goal is to develop an interactively visualizations that would help to evaluate a game when the exercise is finished in order to reveal difficulty of levels, meaningfulness of time limits, usefulness of individual hints and their penalty values, or to reveal strategies of passing through the game.

Challenge: Feedback for learners

Personalized timely feedback provided to learners just after an exercise would improve the learning capabilities of the exercise because the learners can realized their failures and mistakes immediately. Therefore, our goal is to provide visualizations of passing through the game in the comparison with other learners and to evaluate usefulness of such timely feedback.

2 Visual Analysis of Cyber Exercises

In contrast to the CTF games, cyber exercises like Cyber Czech are more complex, more extensive (2 days), focused on security experts and focuses on the simulation of real conditions, work under stress, soft skills (communication with journalists, acting according to law statements), etc. Questionnaires are possible only before or after the exercise. Background story may differs from exercise to exercise, but the infrastructure and principles remains the same.

Sketch of a network-based situation awareness

Timely feedback for Cyber Czech learners

For instance, the Cyber Czech exercise is organized as follows:

  • Day 1: Familiarization phase. Blue teams (defenders) learn about and secure the network infrastructure that has to be defended. It takes roughly 2 hours.
  • Day 2: Execution phase. Attacks of a red team according to the scenario. Blue teams are penalized for inaccessibility of services, successful attacks, insufficient cooperation with white team (playing the role of journalists), etc. The only feedback for blue team during the exercise is a shared scoring table. At the end of the day, organizers provide a short assessment of teams‘ performance during the whole exercise (hot wash-up).

Published papers:

  1. VYKOPAL, Jan, Radek OŠLEJŠEK, Karolína BURSKÁ and Kristína ZÁKOPČANOVÁ. Timely Feedback in Unstructured Cybersecurity Exercises. In Proceedings of Special Interest Group on Computer Science Education, Baltimore, Maryland, USA, February 21–24, 2018(SIGCSE’18). To appear. Baltimore, Maryland, USA: ACM, 2018. 6 pp. ISBN 978-1-4503-5103-4. doi:10.1145/3159450.3159561.
Challenge: Situation Awareness

A general aim of the exercise is to detect and mitigate cyber attacks. Therefore, providing situation awareness for learners during the exercise might be contradictory to this aim. At present, we provide only basic indication of learners performance by displaying a real-time total score of all teams on a shared scoreboard produced by the scoring system. However, the absence of a feedback can lead to frustration of blue teams or event to „give it up“. Therefore, we discuss three different approaches.

  • Provide a feedback to learners during the exercise. The goal is to provide some real-time feedback and research its impact. It is necessary to balance between real conditions (in fact no extra feedback provided) and „reasonable“ feedback that would prevent frustration of a blue team or giving it up. We want to evaluate whether it would be helpful to provide blue teams with an overview of the state of the infrastructure just after the familiarization period. Detailness of the overview would simulate different levels of awareness and knowledge that a blue team has about their infrastructure prior to massive attacks.
  • Support learners to make their own situational awareness. Instead of providing a feedback to learners directly, we can equip learners with tools enabling them to make their own situational awareness. A key visualization providing an overview of the network infrastructure and its state is a network topology. Extending the topology visualization with the possibility to (re)organize the topology efficiently, tag nodes, etc. would enable learners to gradually build a „situation awareness topology map“ by themselves.
  • Provide situational awareness to organizers. Another alternative to providing feedback directly to learners is to provide a detailed situational awareness to organizers of the exercise so that they can intervene, if necessary.
Challenge: Feedback for Learners

Similarly to CtF games, the goal is also to provide a feedback just after the exercise so that the learners can learn from their mistakes. However, available data are much restricted. There are no levels, hints, time limits, etc. Therefore we can focus only on penalties. We want to provide learners with detail graph of penalties immediately after the exercise. This graph will has the form of an interactive chart showing when and why they took penalties. Learners will be able to show details and also assess individual penalties. By watching these interactions we would like to discover usability of this type of information for learners and their lessons learned.

Challenge: Feedback for Organizers

The goal is to provide a visual feedback to exercise organizers enabling them to evaluate (a) whether the values of individual penalties was assigned reasonably, (b) what are the strategies of a blue teams in the familiarization period and how they are successful, e.g. a restrictive strategy when learners disable everything including regular services or a phlegmatic strategy when they do nothing and wait for attacks, (c) what are the defending strategies of blue teams, etc.

3 Forensic Analysis

KYPO Cyber Range facilitates the forensic investigation of machines that have been compromised. In the virtual environment an attacked machine can be run repeatedly and its behavior analyzed. The KYPO’s built-in monitoring infrastructure makes machine communication data available immediately upon startup.

Security experts usually use a set of specialized command-line tools to identify possible attackers, incidents and to analyze what happened. Our goal is to develop visual interactive tools that would support security experts in exploring the big and heterogeneous cyber security data more efficiently by providing them an insight into hidden internal relationships between data, enabling them to filter data, focus on interesting parts and explore the data interactively.

3.1 Challenge: Visual Analysis of Suspicious File Activities

Hacker attacks and activities of worms are usually accompanied by changes on file system. Our goal is to design and develop an interactive analytics tool that would help security experts to identify suspicious time span, to filter out a common changes on the file system, and to focus on suspicious files in order to analyze changes of their attributes (not the content).

4 Knowledge Modeling in Cyber Security Domain

Cyber security it very broad term with a lot of possible applications of visual analysis principles. Therefore, we focus on the application of the visual analytics process [Sacha et al. 2014] into the cyber security domain, which is still a very generic assignment. Apart from exploratory visualizations, our goal is to focus on semantics modeling of cyber security data via formal ontologies and also knowledge modeling in this domain.

Published papers:

  1. OŠLEJŠEK, Radek, Dalibor TOTH, Zdenek EICHLER and Karolína BURSKÁ. Towards a Unified Data Storage and Generic Visualizations in Cyber Ranges. In Mark Scanlon, Nhien-An Le-Khac. Proceedings of the 16th European Conference on Cyber Warfare and Security ECCWS 2017. UK: Academic Conferences and Publishing International Limited, 2017. p. 298-306, 9 pp. ISBN 978-1-911218-43-2.
  2. BURSKÁ, Karolína and Radek OŠLEJŠEK. Visual Analytics for Network Security and Critical Infrastructures. In Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. AIMS 2017 – 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Zürich (Switzerland): Springer, 2017. p. 149-152, 4 pp. ISBN 978-3-319-60773-3. doi:10.1007/978-3-319-60774-0_13