{"id":22302,"date":"2022-07-11T11:19:12","date_gmt":"2022-07-11T09:19:12","guid":{"rendered":"https:\/\/kinit.sk\/project\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/"},"modified":"2023-04-03T15:52:52","modified_gmt":"2023-04-03T13:52:52","slug":"vnet-improving-network-cybersecurity-with-hybrid-approaches","status":"publish","type":"project","link":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/","title":{"rendered":"VNET: Improving network cybersecurity with hybrid approaches"},"content":{"rendered":"<div id=\"\" class=\"element core-paragraph perex\">\n<p class=\"perex\">Network communication is under constant monitoring to detect any unexpected behavior (anomalies). This project focuses on anomaly detection, especially on the harmful anomalies caused by cybercriminals.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>VNET as a provider of comprehensive telecommunications solutions strives to improve its monitoring, warning and protection capabilities for their clients. VNET is able to actively protect the clients from attacks such as DDoS and others; or they can&nbsp; at least warn a client that something unusual (an anomaly) is happening with their computer, server, or subnet.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>There are two basic approaches to detect such threats:&nbsp;<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-list\">\n<ul class=\"wp-block-list\"><div id=\"\" class=\"element core-list-item\">\n<li>by a signature based approach&nbsp;<\/li>\n<\/div>\n\n<div id=\"\" class=\"element core-list-item\">\n<li>by detecting anomalous behavior in network traffic&nbsp;<\/li>\n<\/div><\/ul>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Both approaches have their advantages and disadvantages and may be combined in hybrid approaches. This is part of our expertise at KInIT.&nbsp;<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>KInIT created a proposal for better data gathering from the research point of view with practical implications. The dataset will be created with focus on machine learning approaches with different sampling rates and attack visibility together with statistical analysis of a new dataset from the real network traffic.&nbsp;<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-image\">\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" data-src=\"https:\/\/lh4.googleusercontent.com\/-xMlaOQaZ1KQM2XRs3BAPVr5HooX1CuhN6W70j3LoiBxJuDeqjnAKQYw_x7ZdUq1ADWr3trFQ8egEN37mYUo6qqoNKqJfQhiIntIK9ZP8-AWLl1dYCJ3-WETIkO1CtliqtWhfjNQURuvR7_gHg\" alt=\"\" width=\"800\" height=\"388\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/388;\" \/><\/figure>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>We are working on several models that will serve different needs of the whole solution, e.g.: filter known attacks, create network profiles, anomaly detection module. All modules have to cooperate with each other and they have to be prepared for use in production in VNET\u2019s environment.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>This project is a successor to our previous <a href=\"https:\/\/kinit.sk\/project\/vnet-anomaly-detection-for-improving-network-cybersecurity\/\">successful collaboration<\/a> with VNET.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element acf-memberquote\"><section class=\"memberquote \" style=\"background-color: #ebf7f9;\">\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"in cf\">\n\t\t\t<div class=\"inner cf\">\n                        \t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element acf-members\">\n<section class=\"members \" >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Project team<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"members-wrap members-grid members-grid-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/pistek-2_51330459695_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Peter Pi\u0161tek<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher 10\/2020-07\/2024<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/chuda-web_51328736302_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Daniela Chud\u00e1<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/dominik-macko\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/macko-web_51330462885_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Dominik Macko<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/dominik-macko\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-lacko\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/lacko-web-255x341.png\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Peter Lacko<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">AI Specialist<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-lacko\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/kamil-burda\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/burda-1_51330194184_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Kamil Burda<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/kamil-burda\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/patrik-goldschmidt\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/goldschmidtweb-255x341.png\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Patrik Goldschmidt<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/patrik-goldschmidt\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section> \n<\/div>\n\n<div id=\"news-blogs\" class=\"element acf-loop squares columns-3\"><section id=\"news-blogs\" class=\"loop old  squares columns-3\" style=\"background-color: #ebf7f9;\" >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Related project<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Any loop-style1 loop-load_more loop-6 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22363\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_vnet-320x200.png\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>VNET: Anomaly detection for improving network cybersecurity<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tdec 7. 2021\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">People and companies use computers for extended communication, part of which can be highly sensitive and may also be stored in computers or on servers. This may be interesting for&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n\n\n\n","protected":false},"featured_media":19206,"template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[77,93,349,415],"class_list":["post-22302","project","type-project","status-publish","has-post-thumbnail","hentry","category-information-security-sk","category-security-sk","category-2022-sk","category-industry-research-project-sk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VNET: Improving network cybersecurity with hybrid approaches - KInIT<\/title>\n<meta name=\"description\" content=\"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VNET: Improving network cybersecurity with hybrid approaches - KInIT\" \/>\n<meta property=\"og:description\" content=\"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/\" \/>\n<meta property=\"og:site_name\" content=\"KInIT\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-03T13:52:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202206_web_project_vnet_WEB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"785\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@kinit\" \/>\n<meta name=\"twitter:label1\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-improving-network-cybersecurity-with-hybrid-approaches\\\/\",\"url\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-improving-network-cybersecurity-with-hybrid-approaches\\\/\",\"name\":\"VNET: Improving network cybersecurity with hybrid approaches - KInIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-improving-network-cybersecurity-with-hybrid-approaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-improving-network-cybersecurity-with-hybrid-approaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/202206_web_project_vnet_WEB.jpg\",\"datePublished\":\"2022-07-11T09:19:12+00:00\",\"dateModified\":\"2023-04-03T13:52:52+00:00\",\"description\":\"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-improving-network-cybersecurity-with-hybrid-approaches\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-improving-network-cybersecurity-with-hybrid-approaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-improving-network-cybersecurity-with-hybrid-approaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/202206_web_project_vnet_WEB.jpg\",\"contentUrl\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/202206_web_project_vnet_WEB.jpg\",\"width\":1500,\"height\":785},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-improving-network-cybersecurity-with-hybrid-approaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/uvod\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industry research project\",\"item\":\"https:\\\/\\\/kinit.sk\\\/category\\\/industry-research-project\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"VNET: Improving network cybersecurity with hybrid approaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\",\"url\":\"https:\\\/\\\/kinit.sk\\\/\",\"name\":\"KInIT\",\"description\":\"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kinit.sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VNET: Improving network cybersecurity with hybrid approaches - KInIT","description":"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/","og_locale":"sk_SK","og_type":"article","og_title":"VNET: Improving network cybersecurity with hybrid approaches - KInIT","og_description":"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.","og_url":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/","og_site_name":"KInIT","article_modified_time":"2023-04-03T13:52:52+00:00","og_image":[{"width":1500,"height":785,"url":"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202206_web_project_vnet_WEB.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@kinit","twitter_misc":{"Predpokladan\u00fd \u010das \u010d\u00edtania":"2 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/","url":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/","name":"VNET: Improving network cybersecurity with hybrid approaches - KInIT","isPartOf":{"@id":"https:\/\/kinit.sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/#primaryimage"},"image":{"@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/#primaryimage"},"thumbnailUrl":"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202206_web_project_vnet_WEB.jpg","datePublished":"2022-07-11T09:19:12+00:00","dateModified":"2023-04-03T13:52:52+00:00","description":"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.","breadcrumb":{"@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/#primaryimage","url":"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202206_web_project_vnet_WEB.jpg","contentUrl":"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202206_web_project_vnet_WEB.jpg","width":1500,"height":785},{"@type":"BreadcrumbList","@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kinit.sk\/sk\/uvod\/"},{"@type":"ListItem","position":2,"name":"Industry research project","item":"https:\/\/kinit.sk\/category\/industry-research-project\/"},{"@type":"ListItem","position":3,"name":"VNET: Improving network cybersecurity with hybrid approaches"}]},{"@type":"WebSite","@id":"https:\/\/kinit.sk\/#website","url":"https:\/\/kinit.sk\/","name":"KInIT","description":"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kinit.sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"}]}},"_links":{"self":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project\/22302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/types\/project"}],"version-history":[{"count":2,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project\/22302\/revisions"}],"predecessor-version":[{"id":26068,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project\/22302\/revisions\/26068"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media\/19206"}],"wp:attachment":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media?parent=22302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/categories?post=22302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}