National Repository of Grey Literature 92 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Analysis of Distributed Computing Technologies for Password Cracking
Mráz, Patrik ; Veselý, Vladimír (referee) ; Hranický, Radek (advisor)
The goal of this thesis is to analyze the technologies for distributed computing in password cracking. Distribution is a key factor regarding the total time of cracking the password which can sometimes take up to tens of years. In the introductory section we take a look at the general password cracking, types of attacks and the most popular tools. Next we address the GPU parallelization as well as the need of distributed computing on multiple computers. We look at all kinds of technologies, such as VirtualCL, BOINC, MPI and analyze their usability in password cracking. We examine each technology's performance, efficiency, scalability and adaptability when given pre-defined conditions. Part of this thesis is a design and implementation of distributed password cracking using MPI technology along with Hashcat, a self-proclaimed World's fastest password cracker.
NAT64 Performance Evaluation
Pokorný, Jan ; Veselý, Vladimír (referee) ; Grégr, Matěj (advisor)
Tato práce se zabývá problematikou přechodu mezi IP protokolem verze 4 a IP protokolem verze 6. Přechod je možné řešit více mechanismy a tato práce je zaměřená na přechodový mechanismus Stateful NAT64. Cílem práce je otestovat různé implementace NAT64 a najít vhodnou implementaci pro router NETX. Za cíl bylo stanoveno najít implementaci, která bude dosahovat propustnosti 10 Gbps. Několik NAT64 implementací bylo zkoumáno v testovacím prostředí. Měření probíhalo pomocí nástrojů Iperf a PF_Ring. Bylo změřeno několik různých druhů síťového provozu tak, aby bylo z výsledku patrné, jaký výkonnostní dopad má každá z testovaných implementací. Z naměřených výsledků Jool vyšlo jako nejvhodnější NAT64 řešení. Jool splnil požadovanou propustnost a zároveň kromě stále aktivního vývoje nabízí i další pokročilé vlastnosti. Jool byl integrován do routeru NETX. Byla navrhnuta struktura příkazové řádky pro manipulaci s Jool instancí, která byla posléze implementována jako rozšíření NETX příkazové řádky. Dále byl vytvořen postup distribuce potřebných balíčku skrze balíčkovácí systém RPM, tak aby zapadl do automatizovaného systému platformy NETX.Výsledkem práce je plná podpora přechodového mechanismu NAT64 na platformě NETX dosahující propustnosti blízké 10 Gbps.
Deanonymization Heuristics for Cryptocurrencies
Anton, Matyáš ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
The cryptocurrencies are growing more and more popular, both due to their independency on institutions and the feeling of anonymity they provide. This is, however, also accompanied by an increasing number of their abuse for criminal activities. This thesis explores the principles of current cryptocurrencies as well as techniques used for increasing anonymity of their usage. Based on the findings, it proposes a solution attemping to deanonymise activity in select cryptocurrencies.
Blockchain Abstraction Library
Gallovič, Ľubomír ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This thesis deals with cryptocurrencies and the underlying principles they are based on. It describes the blockchain technology and explores various cryptocurrencies that utilize it with the focus on their similarities and differences. The next part analyzes InsightAPI, the existing tool for real-time Bitcoin blockchain exploration. It then describes the proposed solution for the Ethereum blockchain explorer, highlights the implementation details, and shows results of its testing. The created tool allows the user to quickly gather information about desired blocks, users, and transactions of the Ethereum blockchain.
Towards More Effective Flow Allocation in RINA
Koutenský, Michal ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This master's thesis focuses on design and implementation of a flow allocator policy which supports bandwidth reservation for the Recursive InterNetwork Architecture (RINA). Each flow has some dedicated bandwidth, which is guaranteed to be available during the whole lifetime of the flow. The allocator, which operates as a distributed system, attempts to find a suitable path in the network graph. To achieve this goal, it must keep the information about link utilization up to date. The proposed allocator has been implemented in the open source project rlite. The first half of the thesis is concerned with congestion control theory, and also studies a number of algorithms used in TCP. Additionally, it contains an overview of the structure of RINA and the Raft consensus algorithm.
Modeling and Simulation of BGP
Novák, Adrián ; Marek, Marcel (referee) ; Veselý, Vladimír (advisor)
This Master's thesis deals with modeling and simulation of BGP protocol within the OMNeT++ environment. The BGP protocol is described with employed data structures and the finite state machine of BGP peering. Next, the basic configuration is outlined involving the setup of the BGP protocol on Cisco devices. Further, BGP for OMNeT++ state-of-the-art is investigated together with its lack of functionality and issues. The second part of this thesis deals with design, implementation, and testing of the new functionality of BGP protocol and simulation models. The last section describes the overall achieved results.
Strategies for Distributed Password Cracking
Večeřa, Vojtěch ; Pluskal, Jan (referee) ; Veselý, Vladimír (advisor)
This thesis introduces viable password recovery tools and their categories as well as the technologies and hardware commonly used in this field of informatics. It follows by an overview of the available benchmarking tools for the given hardware. Thesis later contains a description of the custom benchmarking process targeting the aspects of interest. Later, the thesis moves to a distributed system FITcrack as it proposes and experimentally implements new features. The thesis finishes by comparison of the additions against the original state and highlights the areas of improvement.
User Behavior Anomaly Detection
Petrovič, Lukáš ; Veselý, Vladimír (referee) ; Pluskal, Jan (advisor)
The aim of this work is to create an application that allows modeling of user behavior and subsequent search for anomalies in this behavior. An application entry is a list of actions the user has executed on his workstation. From this information and from information about the events that occurred on this device the behavioral model for a specific time is created. Subsequently, this model is compared to models in different time periods or with other users' models. From this comparison, we can get additional information about user behavior and also detect anomalous behavior. The information about the anomalies is useful to build security software that prevents valuable data from being stolen (from the corporate enviroment).
Automated Web Analysis and Archivation
Kocman, Tomáš ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
This thesis is focused on cybercrime, acquisition of evidence and development of a platform for retrieval, analysis and archiving web site data. The goal is to satisfy the investigators and security experts of the Czech police. The aim is to provide an open source platform that will be freely disseminable and in compliance with the requirements of legal institutions. The output of the thesis is two platform versions - full-fledged, fulfilling all the requirements set out in the diploma thesis and a light version for the police investigators of the Czech Republic.
Implementation of OSPFv3 for INET4
Galbička, Lukáš ; Marek, Marcel (referee) ; Veselý, Vladimír (advisor)
  This thesis deals with simulation of routing protocol OSPF in simulation software called OMNeT++. OMNeT++ is a discrete modular simulator mostly used for simulation of computer networks. This thesis includes theory needed for an understanding of the functionality of OSPFv2 and changes in OSPFv3 for IPv6, which are implemented in the model itself. Moreover, thesis contains the configuration of OSPFv3 protocol on topology created from Cisco devices following by analysis of previous source files, state of implementation and its further extension. Thesis is finished with functionality testing and evaluation of results.

National Repository of Grey Literature : 92 records found   1 - 10nextend  jump to record:
See also: similar author names
13 VESELÝ, Vojtěch
3 Veselý, V.
1 Veselý, Viktor
1 Veselý, Vladan
2 Veselý, Vladislav
1 Veselý, Vlastimil
13 Veselý, Vojtěch
1 Veselý, Vratislav
20 Veselý, Václav
2 Veselý, Vít
2 Veselý, Vítek
1 Veselý, Vítězslav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.