{"id":22363,"date":"2021-12-07T14:23:29","date_gmt":"2021-12-07T13:23:29","guid":{"rendered":"https:\/\/kinit.sk\/project\/vnet-anomaly-detection-for-improving-network-cybersecurity\/"},"modified":"2024-02-01T13:27:39","modified_gmt":"2024-02-01T12:27:39","slug":"vnet-anomaly-detection-for-improving-network-cybersecurity","status":"publish","type":"project","link":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/","title":{"rendered":"VNET: Anomaly detection for improving network cybersecurity"},"content":{"rendered":"<div id=\"\" class=\"element core-paragraph perex\">\n<p class=\"perex\">People and companies use computers for extended communication, part of which can be highly sensitive and may also be stored in computers or on servers. <\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>This may be interesting for cyber criminals. They want to get this information itself or just to get access to computers to use them for different kinds of cyber criminal activities, such as attacks. Their methods are becoming increasingly sophisticated in order to remain undetected as long as possible.&nbsp;<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>VNET as a provider of comprehensive telecommunications solutions strives to improve its monitoring, warning and protection capabilities for its clients. VNET is able to actively protect its clients from attacks such as DDoS and others; or it may at least warn a client that something unusual (an anomaly) is happening with their computer, server, or subnet.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>There are two basic approaches to detect such threats: either there is a signature of known&nbsp; attacks from the past or we can detect anomalous behavior in network traffic. The second approach can detect new kinds of anomalies (possible attacks) but it needs to use methods of artificial intelligence. This is part of our expertise.&nbsp;<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>KInIT provides analysis of existing methods for anomaly detection on network communication. We will analyse and recommend suitable datasets which provide suitable features for testing chosen methods. These methods may be used in real-world situations. In further stages of the cooperation, we will provide recommendations for building VNET\u2019s own dataset for model testing. In the last part of the project KInIT will propose use of methods for anomaly detection in VNET\u2019s environment.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-image\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/12\/illustration-1.jpg\" alt=\"\" class=\"wp-image-12315 lazyload\" width=\"696\" height=\"327\" data-srcset=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/12\/illustration-1.jpg 928w, https:\/\/kinit.sk\/wp-content\/uploads\/2021\/12\/illustration-1-300x141.jpg 300w, https:\/\/kinit.sk\/wp-content\/uploads\/2021\/12\/illustration-1-768x361.jpg 768w\" data-sizes=\"(max-width: 696px) 100vw, 696px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 696px; --smush-placeholder-aspect-ratio: 696\/327;\" \/><\/figure>\n<\/div>\n\n<div id=\"\" class=\"element acf-memberquote\"><section class=\"memberquote \" style=\"background-color: #ebf7f9;\">\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"in cf\">\n\t\t\t<div class=\"inner cf\">\n                        \t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element acf-members\">\n<section class=\"members \" >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Project team<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"members-wrap members-grid members-grid-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/pistek-2_51330459695_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Peter Pi\u0161tek<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher 10\/2020-07\/2024<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/chuda-web_51328736302_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Daniela Chud\u00e1<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/dominik-macko\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/macko-web_51330462885_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Dominik Macko<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/dominik-macko\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-lacko\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/lacko-web-255x341.png\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Peter Lacko<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">AI Specialist<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-lacko\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/kamil-burda\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/burda-1_51330194184_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Kamil Burda<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/kamil-burda\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/patrik-goldschmidt\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/goldschmidtweb-255x341.png\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Patrik Goldschmidt<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/patrik-goldschmidt\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section> \n<\/div>\n\n<div id=\"news-blogs\" class=\"element acf-loop squares columns-3\"><section id=\"news-blogs\" class=\"loop old  squares columns-3\" style=\"background-color: #ebf7f9;\" >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Related project<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"loop-wrap loop-Any loop-style1 loop-load_more loop-6 cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<article id=\"loop-item-22302\" class=\"loop-item\">\n\t\t\t\t\t\t\t\t\t<div class=\"inner cf\">\n\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-improving-network-cybersecurity-with-hybrid-approaches\/\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"200\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2022\/07\/202206_web_project_vnet_WEB-320x200.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image lazyload\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/200;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content cf\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"content-inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3>VNET: Improving network cybersecurity with hybrid approaches<\/h3>\n                        \t\t\t\t\t\t\t\t\t\t\t\t<div class=\"meta cf\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"date\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tj\u00fal 11. 2022\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"excerpt\">Network communication is under constant monitoring to detect any unexpected behavior (anomalies). This project focuses on anomaly detection, especially on the harmful anomalies caused by cybercriminals. VNET as a provider&#8230;<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/a>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n\n","protected":false},"featured_media":31165,"template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[77,82,93,132,415],"class_list":["post-22363","project","type-project","status-publish","has-post-thumbnail","hentry","category-information-security-sk","category-2021-sk","category-security-sk","category-industry-research-sk","category-industry-research-project-sk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VNET: Anomaly detection for improving network cybersecurity - KInIT<\/title>\n<meta name=\"description\" content=\"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VNET: Anomaly detection for improving network cybersecurity - KInIT\" \/>\n<meta property=\"og:description\" content=\"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"KInIT\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-01T12:27:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_vnet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@kinit\" \/>\n<meta name=\"twitter:label1\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-anomaly-detection-for-improving-network-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-anomaly-detection-for-improving-network-cybersecurity\\\/\",\"name\":\"VNET: Anomaly detection for improving network cybersecurity - KInIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-anomaly-detection-for-improving-network-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-anomaly-detection-for-improving-network-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/202401_web_project_innovatrics_feature_vnet.png\",\"datePublished\":\"2021-12-07T13:23:29+00:00\",\"dateModified\":\"2024-02-01T12:27:39+00:00\",\"description\":\"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-anomaly-detection-for-improving-network-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-anomaly-detection-for-improving-network-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-anomaly-detection-for-improving-network-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/202401_web_project_innovatrics_feature_vnet.png\",\"contentUrl\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/202401_web_project_innovatrics_feature_vnet.png\",\"width\":1201,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/vnet-anomaly-detection-for-improving-network-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/uvod\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industry research project\",\"item\":\"https:\\\/\\\/kinit.sk\\\/category\\\/industry-research-project\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"VNET: Anomaly detection for improving network cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\",\"url\":\"https:\\\/\\\/kinit.sk\\\/\",\"name\":\"KInIT\",\"description\":\"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kinit.sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VNET: Anomaly detection for improving network cybersecurity - KInIT","description":"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/","og_locale":"sk_SK","og_type":"article","og_title":"VNET: Anomaly detection for improving network cybersecurity - KInIT","og_description":"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.","og_url":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/","og_site_name":"KInIT","article_modified_time":"2024-02-01T12:27:39+00:00","og_image":[{"width":1201,"height":629,"url":"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_vnet.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@kinit","twitter_misc":{"Predpokladan\u00fd \u010das \u010d\u00edtania":"2 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/","url":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/","name":"VNET: Anomaly detection for improving network cybersecurity - KInIT","isPartOf":{"@id":"https:\/\/kinit.sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_vnet.png","datePublished":"2021-12-07T13:23:29+00:00","dateModified":"2024-02-01T12:27:39+00:00","description":"KInIT provides analysis of existing methods for anomaly detections to VNET, which is is able to protect its clients from cyber attacks based on AI data.","breadcrumb":{"@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/#primaryimage","url":"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_vnet.png","contentUrl":"https:\/\/kinit.sk\/wp-content\/uploads\/2024\/02\/202401_web_project_innovatrics_feature_vnet.png","width":1201,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/kinit.sk\/sk\/projekt\/vnet-anomaly-detection-for-improving-network-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kinit.sk\/sk\/uvod\/"},{"@type":"ListItem","position":2,"name":"Industry research project","item":"https:\/\/kinit.sk\/category\/industry-research-project\/"},{"@type":"ListItem","position":3,"name":"VNET: Anomaly detection for improving network cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/kinit.sk\/#website","url":"https:\/\/kinit.sk\/","name":"KInIT","description":"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kinit.sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"}]}},"_links":{"self":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project\/22363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/types\/project"}],"version-history":[{"count":2,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project\/22363\/revisions"}],"predecessor-version":[{"id":22446,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project\/22363\/revisions\/22446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media\/31165"}],"wp:attachment":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media?parent=22363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/categories?post=22363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}