National Repository of Grey Literature 96 records found  beginprevious87 - 96  jump to record: Search took 0.00 seconds. 
Efficient Transport of Electronic Mail with Microsoft Exchange Plugin
Jakubis, Tomáš ; Homoliak, Ivan (referee) ; Kováčik, Michal (advisor)
This project discusses optimization of e-mail and SMTP traffic in proprietary product of Microsoft Exchange 2013 in regard of marine industry. The goal is at first to analyze the requirements of this service on slow and unreliable network connections, SMTP traffic and then the product itself. Afterwards it defines specification  for the final product and prepares the test environment. Design and implementation of transport agent using Exchange Management Shell is described for synchronization of two installations of Microsoft Exchange 2013; and focuses on emerged problems during the development, discusses different approaches and possible solutions. Testing shows various shortcomings of found solution. Finally, analysis of final solution shows possible future improvements and a need of security upgrade before applying to production environment.
Obfuscation of Anomalies and Security Incidents in DNS Traffic
Štěrba, Ondřej ; Kováčik, Michal (referee) ; Homoliak, Ivan (advisor)
The work analyze current detection methods of anomalies and security incidents in DNS traffic, and than design new obfuscation techniques which are capable of evading anomaly detection. Network attacks, exploiting the DNS protocol for tunneling of other network traffic, were selected for implementation part of the work. Control of botnet is considered as malicious application of tunneling through the DNS protocol. The main result of the work is to emphasize the necessity of discovering new detection principles of anomalies and security incidents in DNS traffic.
Computer Library with Clustering Methods
Riša, Martin ; Homoliak, Ivan (referee) ; Košík, Michal (advisor)
The aim of this work is to create a library with chosen clustering methods, to compare their effectiveness and their properties by testing them on different input data sets. The aim of the testing is to determine efficiency of a method, to determine advantages and disadvantages of a method to cluster general input data or to cluster only data of specific shapes. Stages of development of the library are also documented in the text of this work.
Increasing Classification Accuracy in libSVM Using String Kernel Functions
Homoliak, Ivan ; Drozd, Michal (referee) ; Michlovský, Zbyněk (advisor)
Publication aims to explore dependencies of text classification used with string kernel functions. String kernel functions are here used to retrieve rate of similarity between two text strings. There are described experiments with single string kernel function and also experiments with combinations of them with arithmetic operations of adition and multiplication. Gathered results are aplied to detect spam messages of e-mail communication.
Metrics for Intrusion Detection in Network Traffic
Homoliak, Ivan ; Chmelař, Petr (referee) ; Drozd, Michal (advisor)
Publication aims to propose and apply new metrics for intrusion detection in network traffic according to analysis of existing metrics, analysis of network traffic and behavioral characteristics of known attacks. The main goal of the thesis is to propose and implement new collection of metrics which will be capable to detect zero day attacks.
Quality Evaulation of Structured Documentations Using Methods of Artificial Intelligence
Svrbíková, Simona ; Janoušek, Vladimír (referee) ; Homoliak, Ivan (advisor)
The motivation of this work is to provide evaluation simplicity and speedup of an extensive number of documentations with the same subject. The tool for automate evaluation was created and tested on the set of structured documentations originated from student´s projects with the same assignment. The tool uses an existing methods of the artificial intelligence for the purpose of the supervised learning. The source of the first attributes group are string-kernel functions using the criterion of the text strings similarity. Another group of attributes makes provision for properties like the structure of documentations, the stylistic, the length of chapters etc., which are statistically evaluated. These groups of attributes are joined together to achieve higher diversity of classified objects. The experiments present results achieved by using of neural networks, naive Bayes and SVM methods. The analysis of the data has been performed by data mining studio RapidMiner. The contribution of this work is to find out the classification usage possibilities in the case when classified objects have very similar properties in the feature space.
Metrics for Buffer Overflow Attacks Detection of UDP Network Services
Šulák, Ladislav ; Ovšonka, Daniel (referee) ; Homoliak, Ivan (advisor)
This bachelor thesis deals with problematic of network attacks and their detection in network traffic. The aim is to propose such collection of metric, that will describe network traffic according to its behaviour, and will be capable of detection of Zero-Day attacks as well. Following part of this thesis is to implement a tool for metric extraction.
Cryptanalysis of Symmetric Encryption Algorithms Using Genetic Programming
Smetka, Tomáš ; Janoušek, Vladimír (referee) ; Homoliak, Ivan (advisor)
This diploma thesis deals with the cryptanalysis of symmetric encryption algorithms. The aim of this thesis is to show different point of view on this issues. The dissimilar way, compared to the recent methods, lies in the use of the power of evolutionary principles which are in the cryptanalytic system applied with help of genetic programming. In the theoretical part the cryptography, cryptanalysis of symmetric encryption algorithms and genetic programming are described. On the ground of the obtained information a project of cryptanalytic system which uses evolutionary principles is represented. Practical part deals with implementation of symmetric encrypting algorithm, linear cryptanalysis and simulation instrument of genetic programming. The end of the thesis represents experiments together with projected cryptanalytic system which uses genetic programming and evaluates reached results.
Extension of Behavioral Analysis of Network Traffic Focusing on Attack Detection
Teknős, Martin ; Zbořil, František (referee) ; Homoliak, Ivan (advisor)
This thesis is focused on network behavior analysis (NBA) designed to detect network attacks. The goal of the thesis is to increase detection accuracy of obfuscated network attacks. Methods and techniques used to detect network attacks and network traffic classification were presented first. Intrusion detection systems (IDS) in terms of their functionality and possible attacks on them are described next. This work also describes principles of selected attacks against IDS. Further, obfuscation methods which can be used to overcome NBA are suggested. The tool for automatic exploitation, attack obfuscation and collection of this network communication was designed and implemented. This tool was used for execution of network attacks. A dataset for experiments was obtained from collected network communications. Finally, achieved results emphasized requirement of training NBA models by obfuscated malicious network traffic.
Parallelization of Integer Factorization from the View of RSA Breaking
Breitenbacher, Dominik ; Henzl, Martin (referee) ; Homoliak, Ivan (advisor)
This paper follows up the factorization of integers. Factorization is the most popular and used method for RSA cryptoanalysis. The SIQS was chosen as a factorization method that will be used in this paper. Although SIQS is the fastest method (up to 100 digits), it can't be effectively computed at polynomial time, so it's needed to look up for options, how to speed up the method as much as possible. One of the possible ways is paralelization. In this case OpenMP was used. Other possible way is optimalization. The goal of this paper is also to show, how easily is possible to use paralelizion and thanks to detailed analyzation the source codes one can reach relatively large speed up. Used method of iterative optimalization showed itself as a very effective tool. Using this method the implementation of SIQS achieved almost 100 multiplied speed up and at some parts of the code even more.

National Repository of Grey Literature : 96 records found   beginprevious87 - 96  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.