National Repository of Grey Literature 121 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Generator for simulation of SCADA attacks
Hudec, Jan ; Fujdiak, Radek (referee) ; Blažek, Petr (advisor)
Output of this bachelor’s thesis is an attack generator aimed on IEC 61850 protocol using the libpcap library. Part of the output is also a simulation of devices which are normally present in SCADA systems. Theoretic part aims to explain protocols DNP3, IEC 60870 and IEC 61850 more in-depth and further focus is on the attacks. Practical part contains attack implementation that aim on communication between SCADA units, more precisely on GOOSE and Sampled Values frames. Simulated devices generate this communication using the libiec61850 library. Attacks are aimed on that communication.
Anomaly detection by neural networks
Strakoš, Jan ; Sikora, Marek (referee) ; Blažek, Petr (advisor)
This bachelor thesis is focused on anomaly detection represented as computer network attacks by neural network. One of the most common groups of attacks is Distributed Denial of Service (DDoS) attacks, which the system based on neural network should identificate. In the theoretical part of this thesis are described legitimate, non-standard and illegitimate traffic. Another part of this chapter described DDoS attacks, options of their detection, neural networks principle and their use. Practical part describe choosed communication parameters, specifying the threshold intervals of legitimate traffic, constructing a neural network which use of these parameters and threshold intervals, implementation of neural network into the system and presenting results.
Simulator of SCADA protocols
Bohačík, Antonín ; Mlýnek, Petr (referee) ; Blažek, Petr (advisor)
This work is focused on creation of fully functional communication generator of IEC 60870-5-104 protocol. The theoretical part explains in detail the basic principles, properties and possibilities of communication standards DNP3, IEC 60870 and IEC 61850. The next part is focused on the analysis of communication and implementation of this communication in the PQ MEg44PAN device. The last part deals with the configuration of Raspberry Pi 3 devices and the communication emulation of the IEC 60870-5-104 protocol. All programs were written and tested using the Clion development environment.
Parametrization of network attacks
Jelínek, Michael ; Sikora, Pavel (referee) ; Blažek, Petr (advisor)
This bachelor thesis is dedicated to the definition of suitable parameters for network attack identification with the use of neural networks. In the theoretical part of this thesis are methods for anomaly detection in network communication, structure of artificial neural networks and DDoS attacks used for verification of detection capabilities. The practical part of this thesis is focused on the process of preparing data, the subsequent implementation into neural networks and a summary of the results achieved for the different setups of neural networks.
Generator for simulation of SCADA attacks
Hudec, Jan ; Fujdiak, Radek (referee) ; Blažek, Petr (advisor)
Output of this bachelor’s thesis is an attack generator aimed on IEC 61850 protocol using the libpcap library. Part of the output is also a simulation of devices which are normally present in SCADA systems. Theoretic part aims to explain protocols DNP3, IEC 60870 and IEC 61850 more in-depth and further focus is on the attacks. Practical part contains attack implementation that aim on communication between SCADA units, more precisely on GOOSE and Sampled Values frames. Simulated devices generate this communication using the libiec61850 library. Attacks are aimed on that communication.
Traffic generator of industrial protocols
Šnajdr, Václav ; Blažek, Petr (referee) ; Martinásek, Zdeněk (advisor)
This bachelor thesis deals with generating data traffic of industrial SCADA protocols and their implementation into JMeter tool. This tool can be expanded with plugins. Three protocols DNP3, IEC61850 and IEC60870-5 are described in the theoretical part. The practical part is devoted to the design and implementation of the DNP3 protocol module and partly to the design of the IEC61850 protocol. The DNP3 module has been functionally tested. There is also an attempt to obtain the TASE.2 library.
Security assessment for industrial protocols
Priščák, Jaroslav ; Blažek, Petr (referee) ; Fujdiak, Radek (advisor)
This bachelor thesis is focused on security verification of selected protocols used in ICS/SCADA systems. The theoretical part explains the basic principles of the division and management of SCADA systems. Consequently on their communication using protocols (MODBUS, DNP 3, IEC 60870-5-104 and IEC 61850) and their capabilities. In the next chapter, the thesis deals with the analysis of these protocols in terms of security and design methods for their verification. The selected protocols were DNP3 and IEC 60870-5-104, which deal with the work of next parts. Virtualized network, which was simulated using the selected communication protocol DNP3 and IEC 60870-5-104 was created. Subsequently, the security of the protocols was tested using the developed tools and the Kali Linux virtual machine. In the last chapter, the thesis deals with mitigation measures on these created attacks.
Filtering of denial-of-service attacks
Klimeš, Jan ; Blažek, Petr (referee) ; Gerlich, Tomáš (advisor)
This thesis deals with filtering selected DDoS attacks on denial of the service. The the toretical part deals with the problems of general mechanisms used for DDoS attacks, defense mechanisms and mechanisms of detection and filtration. The practical part deals with the filtering of attacks using the iptables and IPS Suricata firewall on the Linux operating system in an experimental workplace using a network traffic generator to verify its functionality and performance, including the statistical processing of output data from filter tools using the Elasticsearch database.
Cyber-environment for systems of ICS/SCADA type
Váňa, Martin ; Blažek, Petr (referee) ; Fujdiak, Radek (advisor)
The thesis explores the problematics of cyber environment for the ICS/SCADA systems. First, shorter section is mainly focused on general introduction into the ICS/SCADA systems and their inner workings. Communication model of a general SCADA system and its foundational elements are explained. It is mainly theoretical passage and it serves as an introduction. It is necessary for understanding the second part which is mainly practical. The appropriate system is chosen as a first thing in the practical part of the thesis for the implementation of the whole project. There are defined criteria on which the system itself is implemented. Following that the system itself is implemented under a framework called openMUC and it is tested with help of the simulators according to the objective of the thesis.
Ekologie vybraných druhů poloparazitických rostlin z čeledi Orobanchaceae
BLAŽEK, Petr
The thesis is focused on the ecology of grassland hemiparasitic Orobanchaceae species, with the focus on Rhinanthus spp., which are vulnerable to modern landscape changes. Various aspects of their population ecology were explored to provide comprehensive information about their ecological requirements. In addition, the parasitic effect of Rh. major on Calamagrostis epigejos was explored.

National Repository of Grey Literature : 121 records found   1 - 10nextend  jump to record:
See also: similar author names
9 BLAŽEK, Pavel
30 BLAŽEK, Petr
9 Blažek, Pavel
Interested in being notified about new results for this query?
Subscribe to the RSS feed.