National Repository of Grey Literature 80 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Radius Monitoring Using IPFIX
Vyskočil, Pavel ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
This barchelor thesis is focused on monitoring RADIUS traffic in the computer network based on IPFIX technology. A new input plugin for the FlowMon probe from the INVEA-TECH company was created using the acquiered knowledge about the RADIUS traffic and the possibilities of the IPFIX protocol. During the tests, the implemented plugin showed the ability to detect and process RADIUS comunication in the LAN network.
Wireless Network Security of Internet Service Provider
Parolek, Pavel ; Horák, Lukáš (referee) ; Ondrák, Viktor (advisor)
This thesis analyzes the wireless network security of the Internet service provider company Net-Connect s.r.o. It identifies its weak points and suggests measures that lead to the increase of the wireless network security.
Wireless Network
Ďuraj, Peter ; Klusák, Aleš (referee) ; Koch, Miloš (advisor)
The subject of my bachelor thesis is the issues of wireless networks. It analyzes current standards and architectures used in wireless networking and its security. Next part focuses on present situation. The practical part contains projecting a wireless network specialized in high security.
Wireless Network
Bárta, Tomáš ; Knoth, Marek (referee) ; Koch, Miloš (advisor)
This thesis describes the design model of the wireless network at Rašínovo College Ltd. After studying theoretical knowledge concerning the issues in the implementation of wireless networks, which is dealt with in the theoretical part, the practical part is devoted to its practical requirements of the customer, the current state of the infrastructure and the subsequent draft model of wireless networks in the new school premises. When processing the project that is central to this work, it was necessary to take into account many aspects such as the implementation environment, it was necessary to select the appropriate network security with regard to the purpose of the network and the sensitivity of the transmitted data. In the final part, appropriate hardware was selected and economic analysis of the project was developed.
Software for assisted study of access control protocols
Kopuletý, Michal ; Burda, Karel (referee) ; Vlček, Lukáš (advisor)
This bachelor’s thesis allows the reader to penetrate into the issues of access control protocols in area such as computer network, banking and access contactless cards. Each chapter provides example of frequently used authentication methods and lists of the pros and cons. Partially describes the methods of authoritzation. The main outcome of this bachelor’s thesis is an educational software executable in a web browser. For the reader’s better understanding there are, animation in the software. In order to verify student knowledge, there are test in teaching material. The thesis proposal provides authentication protocol that can be implemented into ACP protocol. The proposed authentication protocol can transmit information to a wide number of authentication methods (hash, symmetric cryptography, asymmetric cryptography)
Establishment of the Linux internet gateway using advanced filtering
Matocha, Tomáš ; Pust, Radim (referee) ; Jelínek, Mojmír (advisor)
The thesis Establishment of the Linux internet gateway using advanced filtering focuses on~the installation of~the Linux operating system on~the older computers, that functions as a gateway to connect clients in the internal network to the Internet. The thesis describes creation an advanced filter with using iptables. Shows some types of security against attacks from the Internet. The other chapters are discussed, advanced traffic control mechanism (such as a TC and a qdisc). The system queue, it is highly beneficial where it is necessary to hierarchically divide traffic between users. It describes types of queue and assembled configurations for clients in the internal network. Next chapter describes the DNS server caching-only type and application denyhosts, which increases the overall security system. Have your own DNS server is certified, especially if we want to reduce the data traffic. Last chapter describes the RADIUS server and its implementation using Apache and MySQL database. Furthermore, the configuration options are described and the examples of the particular configurations are provided. Finally, it presented a system for authentication through the RADIUS server. The thesis seeks to provide a~complex view of security and filtering.
Design of user authentication for small and medium networks
Hajný, Jan ; Pust, Radim (referee) ; Burda, Karel (advisor)
The main focus of this Master’s thesis is user authentication and access control in a computer network. I analyze the TCP/IP model in connection with security and describe main stepping stones of authentication protocols (mainly hash functions). The authentication protocol analysis follows. I begin with LANMAN protocol analysis for the reason of a security comparison. The NTLM, Kerberos and Radius follows. The focus is on the Kerberos which is chosen as a main authentication protocol. This is also a reason why the modification used in MS domains is described. The implementation and functional verification is placed in the second part which is more practical. The virtualization technology is used for an easier manipulation. The result is a computer network model requiring user authentication and minimizing the possibility of an attack by unauthorized clients.
Solution of the authentification and authorization for wireless local networks
Čížek, Michal ; Pust, Radim (referee) ; Burda, Karel (advisor)
This thesis is about available priciples and methods of authentication and authorization in wireless local area networks. First part is about available methods of authentication with short description each of them and usage analysis for small and middle-sized wireless networks. There is a project of authentication and authorization for school wireless network of three access points in the second part of the thesis, including description of Mikrotik RouterOS configuration and FreeRadius configuration. In the end of the thesis there is a project tests and usage analysis.
Preventing attacks 802.11
Štefanec, Filip ; Kenyeres, Martin (referee) ; Novotný, Bohumil (advisor)
The main focus of this bachelor's thesis is on issues with security in wireless networks, based on standard 802.11. It includes description of most used encryption process and authentication methods in 802.11 networks. Also it explains functionality of EAP and RADIUS protocols, which are the main part of WPA/WPA2-Enterprise security mode. At the end of the thesis there is simulation of basic attacks on standard 802.11 and consequently desing and implementation of security, which prevents similar attacks. Implementation of security is based on authentication of clients through RADIUS server.
Porovnanie AAA protokolov pomocou Petriho sietí
Baloga, Ľubomír
The diploma thesis deals with AAA protocols. The first practical part of thesis was deployment of protocols independently on virtualized computer networks and test their functionality. Next practical part of thesis is about models created with colored Petri nets. The aim of the thesis was to test the individual protocols using Petri nets as well as on the created computer networks. The result of this work is a summary of the possibilities of using protocols in practice because these protocols are rela-tively outdated but often used today.

National Repository of Grey Literature : 80 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.