Main page | Study Branches/Specializations | Groups of Courses | All Courses | Roles                Instructions

A course is the basic teaching unit, it's design as a medium for a student to acquire comprehensive knowledge and skills indispensable in the given field. A course guarantor is responsible for the factual content of the course.
For each course, there is a department responsible for the course organisation. A person responsible for timetabling for a given department sets a time schedule of teaching and for each class, s/he assigns an instructor and/or an examiner.
Expected time consumption of the course is expressed by a course attribute extent of teaching. For example, extent = 2 +2 indicates two teaching hours of lectures and two teaching hours of seminar (lab) per week.
At the end of each semester, the course instructor has to evaluate the extent to which a student has acquired the expected knowledge and skills. The type of this evaluation is indicated by the attribute completion. So, a course can be completed by just an assessment ('pouze zápočet'), by a graded assessment ('klasifikovaný zápočet'), or by just an examination ('pouze zkouška') or by an assessment and examination ('zápočet a zkouška') .
The difficulty of a given course is evaluated by the amount of ECTS credits.
The course is in session (cf. teaching is going on) during a semester. Each course is offered either in the winter ('zimní') or summer ('letní') semester of an academic year. Exceptionally, a course might be offered in both semesters.
The subject matter of a course is described in various texts.

BI-HAM HW accelerated network traffic monitoring Extent of teaching: 2P+1C
Instructor: Čejka T., Hynek K. Completion: KZ
Department: 18103 Credits: 4 Semester: L

Annotation:
This course introduces students to modern and widely used technologies and principles in the area of network infrastructure and traffic monitoring. The monitoring and analysis of network traffic are mandatory skills to network operators (planning and development of resources and infrastructure) and security analysts alike (as a source of information and data for analysis). The goals of the course are to acquaint students with the modern trends and cornerstone principles in the area of monitoring network traffic on a hardware and software level and to develop their practical abilities in this field.

Lecture syllabus:
1. Network protocol overview and introduction to network monitoring.
2. Monitoring on a hardware level (wired, optical, wireless networks)
3. Monitoring on a packet level and its hardware acceleration.
4. Packet analysis (libpcap, pf_rink, DPDK) and the use of the P4 language for monitoring.
5. Gathering telemetry data, sFlow
6. Monitoring on L3 & L4 - IP flow, NetFlow, IPFIX
7. Biflow, flow pairing, aggregation, traffic filtering on high speed networks.
8. Extended IP flow and feature extraction from the application layer.
9. Monitoring of encrypted traffic.
10. Monitoring virtual and cloud environments, datacenter, software defined networks.
11. Classification of network traffic and entities.
12. Monitoring IoT.
13. Network traffic visualization.

Seminar syllabus:
1. Tools for network analysis (tcpdump, wireshark, tshark).
2. Monitoring probes and data exporters.
3. Data flow collectors.
4. Deep Packet Inspection.
5. Data flow analysis, information about network state.
6. Network traffic visualization.

Literature:
SANDERS, Chris: ?Applied network security monitoring: collection, detection and analysis?. Waltman, MA: Syngress, c[2014]. ISBN 978-0-12417-208-1.
R. Hofstede et al.: "Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX," in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 2037-2064, Fourthquarter 2014, doi: 10.1109/COMST.2014.2321898.
M. Lucas: ?Network Flow Analysis?, No Starch Press, 2010, ISBN 978-1-59327-203-6.
P. Benáček, V. Puš, H. Kubátová, and T. Čejka, ?P4-To-VHDL: Automatic generation of high-speed input and output network blocks,? Microprocessors and Microsystems, vol. 56, pp. 22?33, 2018.
T. Cejka, V. Bartos, L. Truxa, and H. Kubatova, ?Using Application-Aware Flow Monitoring for SIP Fraud Detection,? in Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, S. Latré, M. Charalambides, J. François, C. Schmitt, and B. Stiller, Eds. Ghent, Belgium: Springer International Publishing, 2015, pp. 87?99.
T. Cejka, V. Bartoš, M. Svepes, Z. Rosa, and H. Kubatova, ?NEMEA: A Framework for Network Traffic Analysis,? in 12th International Conference on Network and Service Management (CNSM 2016), Montreal, Canada, 2016.

Requirements:
Basic knowledge of computer networks and their monitoring, finished Computer Networks course.

The course is also part of the following Study plans:
Study Plan Study Branch/Specialization Role Recommended semester
BI-SPOL.2015 Unspecified Branch/Specialisation of Study V Není
BI-WSI-PG.2015 Web and Software Engineering V Není
BI-WSI-WI.2015 Web and Software Engineering V Není
BI-WSI-SI.2015 Web and Software Engineering V Není
BI-ISM.2015 Information Systems and Management V Není
BI-ZI.2018 Knowledge Engineering V Není
BI-PI.2015 Computer engineering V Není
BI-TI.2015 Computer Science V Není
BI-BIT.2015 Computer Security and Information technology V Není
BI-SPOL.21 Unspecified Branch/Specialisation of Study V Není
BI-PI.21 Computer Engineering 2021 (in Czech) V Není
BI-PG.21 Computer Graphics 2021 (in Czech) V Není
BI-MI.21 Business Informatics 2021 (In Czech) V Není
BI-IB.21 Information Security 2021 (in Czech) V Není
BI-PS.21 Computer Networks and Internet 2021 (in Czech) V Není
BI-PV.21 Computer Systems and Virtualization 2021 (in Czech) V Není
BI-SI.21 Software Engineering 2021 (in Czech) V Není
BI-TI.21 Computer Science 2021 (in Czech) V Není
BI-UI.21 Artificial Intelligence 2021 (in Czech) V Není
BI-WI.21 Web Engineering 2021 (in Czech) V Není


Page updated 25. 4. 2024, semester: Z,L/2023-4, Z/2019-20, Z/2024-5, L/2022-3, Z/2020-1, Z,L/2021-2, L/2020-1, Z/2022-3, L/2019-20, Send comments to the content presented here to Administrator of study plans Design and implementation: J. Novák, I. Halaška