National Repository of Grey Literature 46 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Software for Capturing and Intelligent Parsing of Spam
Chlupová, Silvie ; Hranický, Radek (referee) ; Zobal, Lukáš (advisor)
This work deals with the creation of an SMTP honeypot, which will be ready for rapid deployment and will support advanced features. The thesis describes the theory of SMTP protocol, POP3 protocol and IMAP protocol. Furthermore, the work discusses the issue of unsolicited e-mails and the fight against them. The work presents various types of honeypots as well as existing solutions for e-mail honeypots. One of these solutions uses this work as a model. The new honeypot supports authentication, stores e-mails in a directory, from where they are gradually removed and analyzed. Based on the analysis, some e-mails are forwarded to the recipients. It is also possible to install and run the honeypot with one click. Honeypot also supports the destruction of email content to protect users.
Analysis of email spam sources
Caha, Tomáš ; Kubánková, Anna (referee) ; Komosný, Dan (advisor)
The first part of this thesis deals with an approach of designing and developing of application for IP geolocation using various geolocation databases. Methods of geographical location of network devices and amount of available data provided by chosen commercial and freely accessible geolocation databases are presented. The data are summarized with focus on methods of obtaining information about IP addresses from various databases. In the paper there are also presented ways used to develop the Python application and its parts, which can be easily reused in other programs. The command line program was created to demonstrate that all parts of the developed application work properly. The whole application is freely accesible under the conditions of the MIT license, published on GitHub (https://github.com/tomas-net/ip2geotools/) and in the Python package index PyPi. The second part of this thesis deals with the description of cyberthreats and the use of developed application to mass geolocation of IP addresses that are listed in chosen freely accessible lists as sources of email spam or cyberattacks. Geographical analysis of cyberattacks sources shows countries of origin. Results of analysis are presented in graphs and maps.
Unsolicited advertising in Czech and German law
Vacková, Linda ; Patěk, Daniel (advisor) ; Horáček, Vít (referee)
Unsolicited advertising in Czech and German law This thesis, entitled "Unsolicited advertising in Czech and German law", comprehensively analyses the issue of unsolicited advertising in the legal system of the Czech Republic and the Federal Republic of Germany. Unsolicited advertising represents a certain interference with the personal or commercial sphere of its addressee or third parties, and in the context of the development of modern means of communication appears increasingly and in various forms. Even though advertising in general is a reflection of freedom to conduct a business and freedom of expression, its legal regulation is needed, especially in case advertisement is undesired and harassing. The text of this thesis is systematically divided into four consecutive parts. The first part constitutes an initial reflection on the need and reason for a legal regulation of unsolicited advertising. The second part is divided into four chapters and provides the basis for regulation of unsolicited advertising and an outline of its current form. The first chapter deals with the historical background of regulation of unsolicited advertising. The second chapter places unsolicited advertising into a wider legal framework of constitutional law. In the following third chapter the issue of unsolicited...
Machine Learning Text Classifier for Short Texts Category Prediction
Drápela, Karel ; Křena, Bohuslav (referee) ; Pluháčková, Hana (advisor)
This thesis deals with categorization of short spam texts from SMS messages. First part summarizes current methods for text classification and~it's followed by description of several commonly used classifiers. In following chapters test data analysis, program implementation and results are described. The program is able to predict text categories based on predefined set of classes and also estimate classification accuracy on training data. For the two category types, that I designed, classifier reached accuracy of 82% and 92% . Both preprocessing and feature selection had a positive impact on resulting accuracy. It is possible to improve this accuracy further by removing portion of samples, which are difficult to classify. With 80\% recall it is possible to increase accuracy by 8-10%.
Automatic Template Pattern Recognition
Kovařík, David ; Lengál, Ondřej (referee) ; Pluháčková, Hana (advisor)
Spam se typicky nevyskytuje ve formě samostatných zpráv, ale často bývá sdružován do takzvaných kampaní. Ty bývají automaticky generovány pomocí šablon. Díky tomu jsou jednotlivé zprávy sémanticky, ale ne syntakticky, ekvivalentní. Cílem práce je navrhnout algoritmus schopný z množiny zpráv jedné kampaně zpětně extrahovat šablonu, ze které tyto zprávy byly generovány. Práce se zaměřuje na spam v SMS komunikaci, ale navržené postupy jsou dostatečně obecné pro širší použití. Algoritmus je postaven na metodě zarovnávání dvou sekvencí, používané v bioinformatice pro nalezení podobných oblastí proteinových řetězců. Výstupem je regulární výraz popisující šablonu dané kampaně. Součástí řešení je také nástroj pro vizualizaci šablony pomocí HTML.Řešení bylo ověřeno na přibližně třech stovkách skutečných kampaní z celého světa. V naprosté většině případů je poskytnutý výsledek postačující pro identifikaci kampaně.
Security risks of social networks and their prevention
Nguyen, Sao Linh ; Koch, Miloš (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the issue of security risks and threats of social networks. The work includes basic information about the most popular online social networks such as Facebook, Twitter and Instagram. The work analyzes the development and use of the above mentioned networks. In addition, there are the risks and dangers of communicating on social networks and recommendations for safe use.
Analýza způsobů informační bezpečnosti pro uživatele internetu
Vladimirova, Ekaterina ; Luc, Ladislav (advisor) ; Novotný, Jakub (referee)
This thesis is devoted to the information security risk analysis methods for Internet users. Its main objectives include familiarizing Internet users with the types of Internet security threats, analyzing the most prominent anti-virus software, giving instructions for installing a Windows firewall, and providing recommendations on information security. The theoretical part describes the main and most popular services offered on the Internet, as well as the history and development of the Internet. Other chapters focus on information security and describe the types of malware threats that might be encountered on the Internet. In the conclusion of the theoretical part the means of protection against cybercrime, i.e. anti-virus programs and firewalls are characterized. The practical part consists of three parts. The first part is devoted to the evaluation of seven popular antivirus programs with their own firewall in accordance with the selected criteria. The second part gives instructions on how to configure Windows 8 Firewall. Finally, recommendations for Internet users are provided, which must be observed for their own safety.
Organization protection against malware design
Vykydal, Tomáš ; Vykydal, Miloslav (referee) ; Ondrák, Viktor (advisor)
The object of this bachelor work is to design a solution for places, where any imperfection were found.in an analysis of the current state of malware protection in a monitored company. solutions are designed for individual places, where any Result of this work is a design, which significantly increases the level of protection against malware and a description of the current situation in the problematics of malware and protection against it.
Proxy servers in Internet
Henek, Jan ; Burda, Karel (referee) ; Komosný, Dan (advisor)
The goal of this paper is to analyze the representation of proxy servers in cyber attacks conducted by Internet. For this purpose I used method which compares tested IP address with database of open proxy servers. I assembled a list of IP address taken from the blacklist of cyber attacks committed in 2015. Then I checked this list with the created program Proxy checker and compared them with a database of open proxy servers. By measurement I demonstrate the inefficacy of this method for reverse detection of proxy servers in the IP list of past attacks.
Implementation of General Discussion Group
Novotný, Vladimír ; Rychnovský, Lukáš (referee) ; Lukáš, Roman (advisor)
This thesis follows discussion forum's problems. This thesis wants to find a new view on various discussions on the internet. There is also a will to fight against spam.  For this purpose is built in analyze system for new contributions. The main object of this thesis is to create an universal internet discussion forum which meets all formal requirements.

National Repository of Grey Literature : 46 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.