Cybersecurity

In the Cybersecurity Research and Development Division, we create technologies that enhance the security of network infrastructure and digital services.
We develop technologies to build a reliable and accurate picture of threats based on network traffic samples, distributed information about security incidents, and data on vulnerabilities in devices and network services. In parallel, we deliver solutions that safely and rapidly mitigate the impact of detected threats on digital services and network infrastructure, and that secure network communications.

Security of mobile systems calls for lightweight, adaptive attack-detection methods, tools for behavioural user profiling, and early-warning mechanisms for threats to network services. One of the outcomes of our work in this area is the BotSense technology. #BotSense.
In the area of network and application security, we develop cybersecurity and network control systems, ICT data processing systems that enable early detection, propagation modelling, and effective mitigation of security incidents. Achieving these objectives requires the use of advanced technologies for processing large, heterogeneous datasets, as well as technologies for controlling network devices and application servers #AI and mitigation of DDoS attacks.. We also develop solutions for the early detection and mitigation of security incidents in IT/OT networks, and network traffic monitoring systems. We are developing and commercialising our proprietary technology for countering DDoS attacks #FLDX. An important part of our portfolio in network threat monitoring is the #ARAKIS technology. Achieving these objectives requires the use of ensuring information security requires continuous verification of ICT system protection. We therefore conduct security testing and analysis of software and hardware, particularly IoT devices, and we develop tools and methods that support cybersecurity tasks. Since non-technical aspects also matter, we research the effectiveness and reliability of trust and reputation management systems, as well as their resilience to attacks. We are also engaged in disseminating and expanding knowledge on the protection of ICT systems and the data stored within them.
We have created technology for clustering and searching data on vulnerabilities in ICT systems and IoT devices, as well as on methods of exploiting them. We develop tools for network-traffic and cyberattack analysis and perform security testing and analysis of software, with a particular focus on IoT devices. #VariotDB: IoT vulnerability and exploit database
Research areas:
- mathematical foundations of threat detection, propagation modelling, and mitigation modelling
- interdisciplinary research into the human aspect of cybersecurity (cognitive, personality, and behavioural factors), and its social and technological determinants
- the competence gap and the effectiveness of cybersecurity education methods.
- technologies for monitoring networks, systems, and digital services
- distributed cybersecurity systems
- detection of harmful content
- application of spiking neural networks and neuromorphic hardware to detecting malicious network traffic and computer vision
- cyberspace monitoring using a network telescope
- analysis of events and malware collected with various types of honeypots.
Projects
