National Repository of Grey Literature 16 records found  previous11 - 16  jump to record: Search took 0.01 seconds. 
Tool to support DoS testing
Kamenář, Filip ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The master thesis deals with denial of service attacks and their implementation in own application, called ptdos, that allows testing of web applications using the implemented attacks. Ptdos is also capable of monitoring the progress of testing as well as its evaluation. In the theoretical part of the thesis, the basic concepts are defined, the classification of attacks into categories is described and the individual attacks are discussed in detail in order to explain how the denial of service should occur in the context of an attack. The practical part of the thesis describes the design of the ptdos application architecture and its subsequent development, including a description of the implementation of all the selected attacks. The last part of the thesis is the testing of the application, which includes the creation of a test network and the analysis of all implemented attacks using different scenarios.
Detection of attacks on the L2 layer
Štefánik, Jaromír ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
Bachelor thesis is focused on cybernetic attacks on the second layer of the reference model OSI, namely: DHCP starvation, MAC flooding, Eavesdropping. The first, theoretical, part of the bachelor thesis is focused on the OSI model, types of cybernetic attacks and methods used by cybercriminals (attackers). In the practical part of the bachelor thesis an experimental workplace was set up (local network), the cybernetic attacks were realized, detection algorithms for given attacks were theoretically designed and programs designed to detect the given attacks were created.
Cybersecurity for Outer Space - A Transatlantic Study
Perrichon, Lisa ; Doboš, Bohumil (advisor) ; Střítecký, Vít (referee)
Cyber attacks can target any nodes of the space infrastructure, and while these attacks are called non-violent, there is a credible capability to use cyber attacks to cause direct or indirect physical damage, injury or death. However, the vulnerability of satellites and other space assets to cyber attack is often overlooked, which is a significant failing given society's substantial and ever increasing reliance on satellite technologies. Through a policy analysis, this dissertation assess the set of political provisions provided by the European Union to address the cyber security issue of the space infrastructure. Such study aims at exploring the geopolitical consequences linked to space cyber security risks, and at assessing the political preparedness of the European Union to address these challenges. The perspective of transatlantic cooperation to further support both American and European effort to tackle this security risk is also addressed. The overarching value of the study is to contribute to future European cyber security for space and transatlantic debates by providing useful perspectives and key takeaways on these two domains. Ultimately, he existing set of policies are not sufficient to address the cyber security issue in Outer Space, a unified approach by the European Union and the United...
Cyber attacks on operating systems
Holasová, Eva ; Komosný, Dan (referee) ; Člupek, Vlastimil (advisor)
This bachelor thesis is focused on cybernetic attacks towards operating systems. In the thesis, there are discussed base security functions of operating systems Windows, Linux and macOS; followed by described cybernetic attacks and its differences. The chapter Malware describes the most harmful software. Next chapter is about common awareness of cybernetic attacks, in which terms antivirus, firewall and IDS/IPS (Intrusion Detection System/Intrusion Prevention System) systems are defined. Following chapter brings scenario of ethics of hacking on operating system of personal computer, server and web server by using penetration tests. The thesis is finished by doing ethics hacking and evaluations. The goal of this thesis is to summarize the problem of cybernetic attacks, methods and tools whose goal is to break the security of the system, the use some of these method to do ethics hacking in virtualized environment.
Cyberattack Generator
Gregr, Filip ; Smékal, David (referee) ; Hajný, Jan (advisor)
This thesis is focused on developing a tool that is capable of generating cyber attacks. In the opening there are introduced some attacks using the ISO/OSI application layer protocols. Specifically, these are attacks known as Slowloris, RUDY, Slow Read, HTTP flood, and dictionary attack on the SSH. These attacks are implemented into an existing DoSgen Linux tool that already contains several famous network attacks. The main part of the thesis is devoted to the description of the tool and to the implementation of its own extension. The created tool is practically tested in an experimental enviroment against the Apache web server. Part of the thesis is the documentation for the improved DoSgen tool.
Modern cyber attacks
Hodes, Vojtěch ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This bachelor's thesis deals with contemporary cyber attacks with an emphasis on denial of service attacks. In the theoretical part the thesis focuses on an analysis and description of the cyber attacks. It monitors trends in cyber attacks and also describes generators of denial of service attacks based on software and hardware platform. The practical part uses the information from the theoretical one to design tests of network devices against cyber attacks, their practical realization and a comparison between used cyber attacks. At the very end the thesis offers possible countermeasures against them.

National Repository of Grey Literature : 16 records found   previous11 - 16  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.