National Repository of Grey Literature 6 records found  Search took 0.00 seconds. 
IPv6 Hosts Monitoring
Rapavý, Martin ; Kašpárek, Tomáš (referee) ; Lampa, Petr (advisor)
This thesis is dedicated to network layer protocol IPv6, purposes of its creation and penetration. Former chapters briefly describe IPv6 protocol format and protocols, methods and technologies related to IPv6. The thesis summarizes security risks and flaws in IPv6 and ICMPv6 protocols. In context of the risks and flaws the thesis describes several of local ICMP attacks. It also mentions security incidents resulting from exploiting those security flaws and means of countermeasures. One of the used countermeasures is passive monitoring of ICMP messages. Thesis contains brief description of tool used to achieve this - NDPMon with its advantages, disadvantages and concepts of usage. Rest of the thesis describes design and implementation of monitoring tool similar to NDPMon, but with some improvements.
IRC Robot
Rapavý, Martin ; Ryšavý, Ondřej (referee) ; Ráb, Jaroslav (advisor)
This bachelor's thesis is dedicated to application protocol IRC, mainly to its client subset and usage possibilties. The thesis summarizes functionality of IRC robots and list of their current implementations. Latter chapters describe new IRC robot program design, mainly concerning IRC client protocol and possibilties of user configuration. In the end, the thesis describes implementation of designed program.
Global krylov methods for solving linear algebraic problems with matrix observations
Rapavý, Martin ; Hnětynková, Iveta (advisor) ; Tichý, Petr (referee)
In this thesis we study methods for solving systems of linear algebraic equati- ons with multiple right hand sides. Specifically we focus on block Krylov subspace methods and global Krylov subspace methods, which can be derived by various approaches to generalization of methods GMRES and LSQR for solving systems of linear equations with single right hand side. We describe the difference in construction of orthonormal basis in block methods and F-orthonormal basis in global methods, in detail. Finally, we provide numerical experiments for the deri- ved algorithms in MATLAB enviroment. On carefully selected test problems we compare convergence properties of the methods. 1
The choice of the step in trust region methods
Rapavý, Martin ; Tichý, Petr (advisor) ; Kučera, Václav (referee)
The main goal of this thesis is the choice of steps in trust region methods for finding a minimum of a given function. The step corresponds to the problem of finding a minimum of a model function on a trust region. We characterize a solu- tion of this problem (Moré-Sorensen theorem) and consider various techniques for approximating a solution of this problem (the Cauchy point method, the dogleg method, the conjugate gradients method). In the case of the first two techniques we prove convergence of the optimization method. Finally, the above techniques are tested numerically in MATLAB on properly chosen functions and initial data. We comment on advantages and disadvantages of considered algorithms. 1
IRC Robot
Rapavý, Martin ; Ryšavý, Ondřej (referee) ; Ráb, Jaroslav (advisor)
This bachelor's thesis is dedicated to application protocol IRC, mainly to its client subset and usage possibilties. The thesis summarizes functionality of IRC robots and list of their current implementations. Latter chapters describe new IRC robot program design, mainly concerning IRC client protocol and possibilties of user configuration. In the end, the thesis describes implementation of designed program.
IPv6 Hosts Monitoring
Rapavý, Martin ; Kašpárek, Tomáš (referee) ; Lampa, Petr (advisor)
This thesis is dedicated to network layer protocol IPv6, purposes of its creation and penetration. Former chapters briefly describe IPv6 protocol format and protocols, methods and technologies related to IPv6. The thesis summarizes security risks and flaws in IPv6 and ICMPv6 protocols. In context of the risks and flaws the thesis describes several of local ICMP attacks. It also mentions security incidents resulting from exploiting those security flaws and means of countermeasures. One of the used countermeasures is passive monitoring of ICMP messages. Thesis contains brief description of tool used to achieve this - NDPMon with its advantages, disadvantages and concepts of usage. Rest of the thesis describes design and implementation of monitoring tool similar to NDPMon, but with some improvements.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.