National Repository of Grey Literature 78 records found  beginprevious59 - 68next  jump to record: Search took 0.00 seconds. 
Web Interface for Network Anomaly Detection System
Sládek, Petr ; Kováčik, Michal (referee) ; Bartoš, Václav (advisor)
The goal of this work is to create a web interface for network anomaly detection system called HostStats. Its mission is to enable users to effectively work with data and statistics provided by the system. Web interface works as a plugin to NfSen as a completely independent web applications. Implementation took place in PHP using the Nette Framework, HTML5, CSS3, and JavaScript using the jQuery library.
Graphical User Interface for Packet Generator
Chromčák, Michal ; Kováčik, Michal (referee) ; Matoušek, Jiří (advisor)
According to increasing requirements on speed of different software and hardware components, there are solutions, which can, by principle,  reach better parameters, then solutions commonly known. One of them is to use software with hardware acceleration on the field of generating synthetic network traffic. Exactly this way a packet generator was implemented, in current version without graphical user interface. But to let this system spread into the target group of users, there is need to implement also this interface. This bachelor's thesis describes proposal of graphical interface, its implementation in JavaFX programming language, testing on real users and tutorial demonstrating how to use this interface.
Wireless Remote Control of Railway Model
Chlupová, Hana ; Kováčik, Michal (referee) ; Tříska, Vít (advisor)
This bachelor thesis describes the possibilities of wireless control of model railways. At the system level, the model railway and trains are managed by application running on a PC. The project consists of two modules for train control, one module for railway control and application controlling the entire system. Both modules communicate wirelessly with a PC by Bluetooth technology. The block schemes and designs of circuits were designed, and then the circuits were realized. I have implemented the PC application, which allows users to view and control model railway and its elements.
Packet Filtering in Computer Networks
Faron, Jan ; Kováčik, Michal (referee) ; Kajan, Michal (advisor)
This bachelor’s thesis deals with packet classification in computer networks. In the introduction it describes some areas where packet classification is used. Then, necessary theoretical background is introduced, together with requirements for classification algorithm. It describes four high-level approaches to the packet classification. It describes principle of various algorithms for each high-level approach. Algorithm EffiCuts is chosen for detailed analysis and implementation. This packet classification algorithm is compared with other packet classification algorithms from NetBench library.
Visualization of Longest Prefix Match Algorithms
Fomiczew, Jiří ; Matoušek, Jiří (referee) ; Kováčik, Michal (advisor)
This thesis describes the design and implementation of program for vizualization of algorithms for longest pre fix match (LPM), which is one of the most important tasks for packet classi cation and routing in TCP/IP networks. It describes necessary theory and details about selected algorithms - Trie, Tree Bitmap and CPE. Furthermore, it describes the design and implementation of program for vizualization of the search process of these algorithms with emphasis on the potential use for educational purposes. Finally, it describes the possibilities for future development and expansion of the program.
Packet Filtering in Computer Networks
Šrůtka, Petr ; Kováčik, Michal (referee) ; Kajan, Michal (advisor)
This bachelor thesis contains an introduction to packet classification, types of packet classification techniques and different metrics. It describes different algorithms used for packet classification and implementation of Recursive flow classification algorithm is also part of this bachelors thesis. It presents different configuration parameters of RFC algorithm and describes its advantages and disadvantages. This work is concluded with a set of experiments describing characteristics of implemented algorithm together with comparison of other classification approaches.
Network Anomaly Detection Based on PCA
Krobot, Pavel ; Kováčik, Michal (referee) ; Bartoš, Václav (advisor)
This thesis deals with subject of network anomaly detection. The method, which will be described in this thesis, is based on principal component analysis. Within the scope of this thesis original design of this method was studied. Another two extensions of this basic method was studied too. Basic version and last extension was implemented with one little additional extension. This one was designed in this thesis. There were series of tests made above this implementation, which provided two findings. First, it shows that principal component analysis could be used for network anomaly detection. Second, even though the proposed method seems to be functional for network anomaly detection, it is still not perfect and additional research is needed to improve this method.
Longest Prefix Match Algorithms
Kováčik, Michal ; Tobola, Jiří (referee) ; Kořenek, Jan (advisor)
This thesis focuses on algorithms for longest prefix match (LPM), which is the key operation in packet classification and routing in TCP/IP networks. A space for analysis of commonly used algorithms with emphasis on their speed and memory efficiency is dedicated along with necessary theory. Focus is then oriented on IPv6 networks, their typical prefix sets and comparison of suitable algorithms. Afterwards, the optimization for selected algorithm is suggested and implemented in programming language Python.
Detection of Slow Network Attacks
Pacholík, Václav ; Kováčik, Michal (referee) ; Bartoš, Václav (advisor)
This master's thesis is aimed how can be network traffic monitored using IP flows. The description of NEMEA framework that can be used to build complex intrusion detection system. Following chapters describes port scanning methods and SSH protocol which can be used for remote login to the system, which can be exploited by an attacker. These two areas are intended to be detected in a slow attack manner, when attacker using low attack speed, which he can evade multiple detection methods. Proposed method for detection such attacks is using information from the last few connections. Finally, proposed detection method results are further described.
Detection of Malicious Domains Using Passive DNS Analysis
Doležal, Jiří ; Žádník, Martin (referee) ; Kováčik, Michal (advisor)
Tato diplomová práce se zabývá detekcí škodlivých domén za pomoci analýzy pasivního DNS provozu, návrhem a implementací vlastního systému detekce. Provoz DNS se stává terčem mnoha útočníků, kteří využívají toho, že služba DNS je nezbytná pro fungování Internetu. Téměř každá internetová komunikace totiž začíná DNS dotazem a odpovědí. Zneužívání služby DNS nebo využívání slabin této služby se projevuje anomálním chováním DNS provozu. Tato práce obsahuje popis různých metod používaných pro odhalování anomálií a škodlivých domén v DNS datech. Hlavní částí práce je návrh a implementace systému pro detekci škodlivých domén. Implementovaný systém byl testován na DNS datech získaných z reálného provozu.

National Repository of Grey Literature : 78 records found   beginprevious59 - 68next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.