National Repository of Grey Literature 199 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Identity Detection in TCP/IP Architecture
Holkovič, Martin ; Matoušek, Petr (referee) ; Polčák, Libor (advisor)
This work deals with detection of users within computer networks on different layers of the TCP/IP architecture. These identities are identified by protocols running on the appropriate layers of the given architecture. PPPoE and SLAAC protocols were chosen as protocols that are used for network layer address assignments. The second type of protocol is the application protocol SMTP. We analysed communication using the chosen protocols in order to create metadata about the corresponding communication. The results of the analysis are finite state machines. Based on these finite state machines, software for legal interception was designed and implemented. Implemented software was tested on samples of data, in a specialized laboratory, and in a production network.
Software Architecture Comparison
Motyčka, Michal ; Polčák, Libor (referee) ; Pluskal, Jan (advisor)
The goal of this thesis is to compare software architectures to help the reader decide which architecture is the most suitable for their project. The thesis compares the Onion architecture, Anemic domain model architecture and Active record architecture. The architectures are compared based on their readability, extensibility, testability and the amount of knowledge neccesary to implement each architecture. It also offers the description of other well-known software architectures and the concepts which they use.
Tracker Blocking in WebKitGTK-Based Browsers
Dudík, Samuel ; Koutenský, Michal (referee) ; Polčák, Libor (advisor)
This thesis deals with creating an extension for WebKitGTK based browsers that allows users to block advertisements, trackers and other undesirable elements. The extension is implemented in the C programming language. It communicates with a server written in Rust that decides which requests to block and which to allow. The server uses the adblock-rust library that was developed for the Brave browser. Communication between the server and the client uses the Unix domain socket mechanism. The outcome of the thesis is a full-featured content filtering extension that in addition to network filtering also supports dynamic cosmetic filtering. There is also a minimalistic GUI for easy configuration and interaction with the extension.
Computer Identity Based on Its Internal Clock Skew
Franková, Barbora ; Matoušek, Petr (referee) ; Polčák, Libor (advisor)
Thesis deals with remote computer identification based on its internal clock skew. It describes various methods to collect and evaluate time-related data extracted from TCP, ICMP and Javascript. Software package that implements some of those methods is attached as well. During the work, many experiments were carried out to find out possible effects of certain factors. Tests were aimed on software (operation systems, web browsers and time synchronization) as well as hardware (temperature, power source, distance and network connection type) of the remote systems. Interesting results were discovered in areas of IPv4/IPv6 address pairing and NTP time synchronization.
Detection of Suspicious Requests Made by Web Pages
Pohner, Pavel ; Burget, Radek (referee) ; Polčák, Libor (advisor)
The purpose of this thesis is to prevent websites located in public internet from accessing user's internal network through web browser. Acquired knowdledge about modern browser's security mechanism - same-origin policy and options of implementing the web browser extensions using WebExtensions, was used in the solution. Proposed solution is based on WebRequest API, which intercepts and modifies HTTP requests, and extends functionality of existing browser extension JavaScript Restrictor with the ability to detect and prevent the browser to be abused as a proxy for scanning and accessing user's internal network. The implemented solution was tested and accepted as a part of JavaScript Restrictor. The main benefit of this thesis is the protection from possible abusement of a web browser as a proxy, which is not present in existing extensions.
JavaScript Restricting Web Extension
Timko, Martin ; Matoušek, Petr (referee) ; Polčák, Libor (advisor)
The purpose of this thesis is to functionally expand the browser extension prototype created by Ing. Zbyněk Červinka, focused on the privacy protection of the user during his web browsing. Acquired facts about the function of existing tools for safety and privacy protection, such as technology JavaScript Zero, were used in the solution, which was created by employing a technique of encapsulating JavaScript objects and functions. This allows greater anonymity and safety for users during web browsing. The extension was tested and published under the title JavaScript Restrictor. The main benefit of this thesis is the increase of safety from attacks and increase of anonymity linked to the user data harvesting.
BitTorrent Tracker-Less Peer Monitoring
Vaško, Martin ; Pluskal, Jan (referee) ; Polčák, Libor (advisor)
The goal of this thesis is to effectively monitor peers within BitTorrent network. This research is based on distributed hash tables, specifically MLDHT. In the last decade, focus has also been on efficiency of monitoring within network. Existing algorithms do not provide actual efficiency therefore it is recommended to introduce an estimate accuracy using Bernoulli process. The goal of monitoring is to ensure the highest success of peer search. The work focuses on designing and implementing Bernoulli process model. The measurements show that, the in-depth search (LIFO) is better in the short run. The work focuses on the efficiency of time monitoring, estimation of the peer search error and efficiency using the modeled Bernoulli process. Result of this work is the recommended monitoring time with high efficiency.
Netfox Detective Tool Refactorization
Slámová, Hana ; Polčák, Libor (referee) ; Pluskal, Jan (advisor)
This semestral thesis deals with usage of design patterns in  a network tool Netfox Detective. The thesis contains analysis and identification of issues regarding their implementation.  Also, a description of writing unit tests for a part of application is present and its automation. This thesis describes Netfox Detective contribution process as well.
Experimental Evaluation of Clock Synchronization for Networked Control Systems
Pacner, Jan ; Polčák, Libor (referee) ; Ryšavý, Ondřej (advisor)
Within this topic, a testing environment is built, where different clock synchronization methods are evaluated in order to establish a maximal achievable clock precision in a distributed SCADA system based on the QNX operating system. Furthermore a measurement of parameters of communication for different technologies and circumstances is taken. For this purpose, porting of the PTP protocol to QNX OS is necessary.
On-Line Monitoring of Expiration of DNSSEC Signatures
Mrázek, Jakub ; Polčák, Libor (referee) ; Matoušek, Petr (advisor)
In the bachelor thesis we have described computer software (programme) which is supposed to check the signatures of DNS (Domain Name System) records (resource records) and warn in due time about the expiry date or the approaching expiry date of the signatures in order to prevent from expiring. In the paper we have specified the DNSSEC (Domain Name System Security) technology, new resource records for the DNSSEC and details of signing the resource records. Moreover, we have introduced the programme itself, the possibilities of setting the programme, the ways of data reading and warning output. Since no such programme exists, and because there is a need to check the signatures quickly and warn about their expiry date, we have decided for this work.

National Repository of Grey Literature : 199 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.