National Repository of Grey Literature 7 records found  Search took 0.00 seconds. 
Measurements of the intensity of traffic within a fixed interval of the AP
Kubík, Pavel ; Trzos, Michal (referee) ; Matocha, Tomáš (advisor)
The thesis analyzes the network traffic on a router with open source firmware. First is chosen a software platform, based on compatibility with available equipment. Then are assessed properties necessary for the development of custom applications. Support for various programming languages provided by the SDK, development environment and the available modules and libraries, for working with network interface. Based on these factors is then chose method to realize the program. He is implemented on the OpenWRT firmware in C / C + + using network library pcap. These funds are used to capture and analyze network traffic. Obtained data are processed using methods of technical analysis, namely on the basis of moving averages, Stochastic oscillator and Bollinger bands. Based on results of these methods are generated and verified estimates of traffic. They are based on linear extrapolation, simplified for fixed intervals. The validity of each method is verified on base of the estimated value. Method is verified if estimated value of the traffic volume is in the Bollinger band, which is given by the standard deviation. Each method is tested several times in real traffic with different input parameters. Then is evaluated the influence of parameters on the error rate of methods. Individual methods are compared and evaluated based on the behavior in different scenarios and based on the average relative error.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.
Network load generators
Kubík, Pavel ; Koutný, Martin (referee) ; Pelka, Tomáš (advisor)
The aim is to create, test and describe the network load generator for server-client connection type. It´s used language C++ under Linux. It was also used socket and multithreading programming. Load on the server is done by sending HTTP requests. The load generator have different adjustable parameters and displays the test statistics. In this work is described mechanisms wich are used, by the application, to load. Testing was done on one server with a different size of the target file.
Semiadaptive 3D modeling
Kubík, Pavel ; Pelikán, Josef (referee) ; Winkler, Zbyněk (advisor)
In first part of this paper, methods for reducing complexity of building 3D maps are introduced. These methods use predictions about scene properties or special hardware devices for reducing complexity such as a laser range finder, an omnidirection camera or both. Furthermore, an algorithm for creating a reconstructed scene using a camera and robot odometry is presented. The method presupposes moving on a straight floor and an indoor environment. A user can interact with the algorithm and help with creating model or with repairing parts of the model, if they were not satisfactorily created by the automatic algorithm. An interaction also allows to apply the method in various environments, which weren't initially planned. So, the adaptation to the new environment may be done by a user. The output model is exported to the common format for virtual reality VRML. This allows to view the model in e.g. a web browser. The presented method was implemented with a user interface to enable an interaction with the algorithm. The method was tested on data from the real world and the effectiveness of each user's interferences was evaluated.
Cryptovirology
Kubík, Pavel ; Schäfer, Jiří (referee) ; Pecho, Peter (advisor)
This thesis is focused on a relatively new branch of computer security called Cryptovirology. It uses cryptography and its principles in conjunction with designing and writing malicious codes (e.g. computer viruses, trojan horses, worms). Techniques such as viral propagation through computer networks, capabilities of current viruses and similar threats are described. Beside cryptography and computer viruses, design of the cryptovirus and methods of a cryptoviral extortion attack along with their related potential are also analyzed below in this paper. As a proof of the concept in the given area of cryptovirology, a demonstrational computer program was written. The program was implemented with the respect to the satisfaction of the essentials set to the cryptovirus.
Network load generators
Kubík, Pavel ; Koutný, Martin (referee) ; Pelka, Tomáš (advisor)
The aim is to create, test and describe the network load generator for server-client connection type. It´s used language C++ under Linux. It was also used socket and multithreading programming. Load on the server is done by sending HTTP requests. The load generator have different adjustable parameters and displays the test statistics. In this work is described mechanisms wich are used, by the application, to load. Testing was done on one server with a different size of the target file.
Measurements of the intensity of traffic within a fixed interval of the AP
Kubík, Pavel ; Trzos, Michal (referee) ; Matocha, Tomáš (advisor)
The thesis analyzes the network traffic on a router with open source firmware. First is chosen a software platform, based on compatibility with available equipment. Then are assessed properties necessary for the development of custom applications. Support for various programming languages provided by the SDK, development environment and the available modules and libraries, for working with network interface. Based on these factors is then chose method to realize the program. He is implemented on the OpenWRT firmware in C / C + + using network library pcap. These funds are used to capture and analyze network traffic. Obtained data are processed using methods of technical analysis, namely on the basis of moving averages, Stochastic oscillator and Bollinger bands. Based on results of these methods are generated and verified estimates of traffic. They are based on linear extrapolation, simplified for fixed intervals. The validity of each method is verified on base of the estimated value. Method is verified if estimated value of the traffic volume is in the Bollinger band, which is given by the standard deviation. Each method is tested several times in real traffic with different input parameters. Then is evaluated the influence of parameters on the error rate of methods. Individual methods are compared and evaluated based on the behavior in different scenarios and based on the average relative error.

See also: similar author names
3 Kubík, Peter
28 Kubík, Petr
Interested in being notified about new results for this query?
Subscribe to the RSS feed.