Kamil Malinka
Brno University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kamil Malinka.
international conference on internet monitoring and protection | 2008
Jiri Schafer; Kamil Malinka; Petr Hanacek
In this work wepsilare dealing with security in highly distributed systems, namely in peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them against real world data. This should lead to creation of models for peer-to-peer networks defense and for detection of Malware spreading. Also we are proposing our system for automatic downloading and detection of new viruses in peer-to-peer networks with all possible extensions.
international carnahan conference on security technology | 2008
Petr Hanaek; Kamil Malinka; Jiri Schafer
In this article wepsilare dealing with security of bankpsilas applications remote access. This article summarizes basic forms of electronic banking and wildly used authentication and authorization methods. There is needed to access each one separately because of different approaches for different types of communication paths (for e.g. telephonic banking, internet banking).
international conference on internet monitoring and protection | 2009
Jiri Schafer; Kamil Malinka
In this work we analyze propagation of files in the BitTorrent network. The paper covers security problems in peer-to-peer networks and establishes a malware propagation model. We give overview of existing models and their weaknesses and introduce a propagation or epidemiological model based on model based on real data and real user behavior in the peer-to-peer network BitTorrent. We describe our empirical epidemiological model in detail and propose some advanced strategies which can help in fight against malware. Further we present our empiric, as its application.
IEEE Aerospace and Electronic Systems Magazine | 2010
Petr Hanacek; Kamil Malinka; Jiri Schafer
Herein we are dealing with the security of banks applications remote access. This article summarizes basic forms of electronic banking and widely used authentication and authorization methods. There is a need to access each one separately because of different approaches for different types of communication paths (telephonic banking, internet banking, etc.).
international carnahan conference on security technology | 2011
Kamil Malinka; Petr Hanacek; Michal Trzos
This article is dealing with biometric authentication. We propose an analysis of challenge-response approach usability together with an appropriate candidate for such an approach — visual evoked potentials (VEP). Their physiological properties and recognition capabilities are presented. We design and implement methods covering all phases necessary for processing VEP as a biometric characteristic and perform them on a test database. The efficiency of our approach is presented in an appropriate way. We also propose our design of a biometric authentication system based on the VEP characteristic.
international conference on internet monitoring and protection | 2009
Kamil Malinka; Jiri Schafer
In this paper, we perform an empirical analysis of email traffic logs obtained from a large university to better understand the development of social networks. We analyzed data containing records of emails sent over a period of 10 months – the largest dataset we are aware of. We study the long term evolution of social networks on real world data. The initial analysis of data is followed by an exploration of existence of how social network impacts the anonymity. We describe possibilities of modeling social network and describe dynamics of their development. Based on our result we design attack of proper selection, which could cause higher successfulness of disclosure attacks.
international conference on internet monitoring and protection | 2009
Kamil Malinka
Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. It’s not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security. Corruption of system with low level of security could help attacker to gain access to system with higher level of security. Solution of this problem could lie in use of behavioral biometric. The article introduces challenge-response approach in this area. We discuss possibilities of challenge-response biometric authentication and show new behavioral biometric suitable for this approach – visual evoked potentials. We give description of physiological features of this characteristic, discuss this properties and usability. We try to answer the question if it’s suitable only for liveness testing or it’s possible to use it for full authentication. Further we present design of prototype challenge-response biometric authentication system which takes advantage of visual evoked potentials.
international carnahan conference on security technology | 2008
Jiri Schafer; Kamil Malinka; Petr Hanacek
In this article we are dealing with security problems of peer-to-peer networks, with malware propagation model, establishing empirical model of file propagation in peer-to-peer networks and we are describing our system for automatic file downloading.
Archive | 2012
Kamil Malinka; Petr Hanacek
This chapter deals with anonymous communication. Our aim is to extend knowledge of the security limits of anonymity systems with information based on real-world traffic data. We perform a set of analyses targeting the behavioural patterns of users and their impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested in are inter-arrival times and the number of messages sent by an individual user. The importance of our analyses’ results for the design and implementation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identifiable social networks and their development in time are presented in the context of the security of anonymous systems.
Data Security Management | 2015
Radim Polčák; Zdeněk Říha; Kamil Malinka