National Repository of Grey Literature 113 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Analysis of email spam sources
Caha, Tomáš ; Kubánková, Anna (referee) ; Komosný, Dan (advisor)
The first part of this thesis deals with an approach of designing and developing of application for IP geolocation using various geolocation databases. Methods of geographical location of network devices and amount of available data provided by chosen commercial and freely accessible geolocation databases are presented. The data are summarized with focus on methods of obtaining information about IP addresses from various databases. In the paper there are also presented ways used to develop the Python application and its parts, which can be easily reused in other programs. The command line program was created to demonstrate that all parts of the developed application work properly. The whole application is freely accesible under the conditions of the MIT license, published on GitHub (https://github.com/tomas-net/ip2geotools/) and in the Python package index PyPi. The second part of this thesis deals with the description of cyberthreats and the use of developed application to mass geolocation of IP addresses that are listed in chosen freely accessible lists as sources of email spam or cyberattacks. Geographical analysis of cyberattacks sources shows countries of origin. Results of analysis are presented in graphs and maps.
Secure, reliable and adaptive network based on Cisco devices
Lefler, Přemysl ; Komosný, Dan (referee) ; Kubánková, Anna (advisor)
This bachelor thesis deals with design of secure, reliable and adaptive network using Cisco network devices. Thesis includes design of a network with description of each individual technology, that were used in the design to meet requirements for safety, reliability and adaptivity. The last chapter describes frequently occuring network attacks along with a description of their execution followed by implementation of defense against them.
Twitter data analysis tool
Rýdl, Pavel ; Komosný, Dan (referee) ; Galáž, Zoltán (advisor)
This work deals with the creation of an application for automatic downloading and Twitter data analysis based on natural language processing techniques. The application is created in the Python programming language. A development environment Jupyter Notebook was used for creating the application, where the entire application, including GUI, was implemented. In the section of theory are data downloading issues and data analysis by natural language processing described. In the part of implementation there is solution of the application described in several steps, such as creating the application on the Twitter's side, downloading, preprocessing, data analysis with techniques of natural language processing and following visualization. There was also a technique with no natural language processing implemented. Testing run on tweets that contained reference to US president Donald Trump.
Application for geolocation databases
Klíma, Oldřich ; Burget, Radim (referee) ; Komosný, Dan (advisor)
The thesis deals with possibilities for more precise determination of geographical position of given IP address by combination of estimates of data obtained from geolocation databases. The first part introduces the issue on theoretical level. Possibilities of network device identification, its geographical location and principles of geolocation databases are described here. After analyzing the theoretical part of this issue, the current state of application for geolocation databases is described. The next section introduces a new application which uses original software ip2geotools as a library. Using the three implemented methods for combining results (based on average, median, and cluster analysis by K-Means algorithm), the new program allows to estimate the physical location of IP address. The app is complemented with console interface and geographic data visualization on the map. In the last part, the accuracy of computational methods is validated and a detailed statistical analysis of data obtained by performing a calculation over a set of IP addresses with known geographical location of the RIPE Atlas service is performed.
Application for monitoring of Linux servers
Kačmarčík, Martin ; Ricci, Sara (referee) ; Komosný, Dan (advisor)
PlanetLab Server Manager je aplikace, která pomáhá uživatelům realizovat projekty zaměřené na vývoj aplikací pro distribuované sítě. Aplikace primárně umožňuje vyhledávání serverů podle jejich geografické polohy a umožňuje přístup na tyto servery a jejich vykreslení na mapě. Práce čtenáře seznámí se síťí PlanetLab a její infrastukturou. Dále popisuje aplikaci PlanetLab Server Manager (také známou jako plbmng) a identifikuje problémy v její aktuální verzi. Diplomová práce se zaměřuje na řešení identifikovaných problémů a specifikuje provedená vylepšení do aplikace. Také je v ní pomocí nově přidané funkcionality provedena analýza stavu sítě PlanetLab. Tato práce se zaměřuje na vylepšení stávající funkcionality tím, že je aplikace plně přepsána do jazyka Python 3. Kvůli stávající implementaci v jazyce Bash, jehož vlastnosti se od jazyka Python liší, bude nutné kompletně přeplánovat stávající funkce aplikace, aby bylo plně využito výhod jazyka Python. Aplikace je také rozšířena o možnosti filtrování serverů na základě jejich stavu a další vylepšení. Zdrojové kódy aplikace jsou dostupné na repozitáři GitHUB pod licencí MIT a dále je aplikace dostupná v repozitářích PyPI.
Analysis of the GlobeImposter ransomware
Procházka, Ivo ; Komosný, Dan (referee) ; Martinásek, Zdeněk (advisor)
The aim of this diploma thesis is to analyze an instance of the GlobeImposter ransomware extracted from an affected device. The first part outlines various types of malware and ransomware and includes a description of encryption mechanisms and key distribution systems. It also discusses possible approaches of static and dynamic analysis of malware samples and requirements for test environments. The practical part describes the source of the malware sample, the physical and virtual test environment and the results of the static and dynamic analysis of the GlobeImposter ransomware. The final part discusses the results and the possibility of implementing a decryptor for the analyzed GlobeImposter ransomware.
Monitoring of servers with OS Linux
Šuba, Filip ; Frolka, Jakub (referee) ; Komosný, Dan (advisor)
This bachelor’s thesis deals with monitoring of a servers in experimental network PlanetLab. The beginning of the thesis is about PlanetLab network, terminology used within it and also projects realized in it. For generating information about node, has been created a module in Python, which has been integrated into application Plbmng. Application has been published under the MIT license on \url{www.github.com} and on Python Package Index www.pypi.org. For the application has been created manual and for the module has been created documentation.
Identification of cyberbully
Paučo, Daniel ; Martinásek, Zdeněk (referee) ; Komosný, Dan (advisor)
This bachelor thesis deals with the options of determining the identity of the aggressor of the cyberbullying and it is focused at the analysis of the network information of the aggressor’s devices (computer, smartphone). Regarding the layout of the thesis was created application which is able to clone any website and consequently run it on the server of planetlab. Thanks to this "‘phishing"’ website, the application is able to get network information about all visitors and saves it for later usage. Most important part of the application is that it is working in realtime mode where shows the IP addresses which are currently connected to the website. Besides that it also shows information like location of the IP address: country, region, city and geolocation. The application also shows operating system, user agent, resolution of the browser a the number of visits of the website.
Cyber attacks on operating systems
Holasová, Eva ; Komosný, Dan (referee) ; Člupek, Vlastimil (advisor)
This bachelor thesis is focused on cybernetic attacks towards operating systems. In the thesis, there are discussed base security functions of operating systems Windows, Linux and macOS; followed by described cybernetic attacks and its differences. The chapter Malware describes the most harmful software. Next chapter is about common awareness of cybernetic attacks, in which terms antivirus, firewall and IDS/IPS (Intrusion Detection System/Intrusion Prevention System) systems are defined. Following chapter brings scenario of ethics of hacking on operating system of personal computer, server and web server by using penetration tests. The thesis is finished by doing ethics hacking and evaluations. The goal of this thesis is to summarize the problem of cybernetic attacks, methods and tools whose goal is to break the security of the system, the use some of these method to do ethics hacking in virtualized environment.
Security of operating systems
Kuchař, Karel ; Komosný, Dan (referee) ; Člupek, Vlastimil (advisor)
This bachelor thesis is focused on security of operating systems, which is more and more important. At first, basics of security of operating systems will be covered, followed by describing elements, which help secure communication on internet. In the third chapter, there are discussed the most using operating systems in terms of security and mentioned their most common weaknesses. Following chapter talks about scenarios in which is defined how to properly set each part of the system, so it is secure; also, security applications that make operating system more secure are mentioned. In fifth chapter are above mentioned scenarios applied to virtual machines. To test chosen security settings were individual machines exposed to penetration test. Afterwards, the chosen security settings are evaluated and further steps are recommended. The goal of this thesis is to apprise with problems of security of operating systems and the importance of implementation of security measures.

National Repository of Grey Literature : 113 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.