National Repository of Grey Literature 45 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Web application integrating artificial intelligence techniques into the correlation rule creation process
Šibor, Martin ; Caha, Tomáš (referee) ; Safonov, Yehor (advisor)
Currently, as digitalization becomes an integral part of all areas of our lives, the complexity and sophistication of cyber threats are constantly increasing. A key element in the fight against these cyber threats is security monitoring. An important tool for security monitoring are SIEM systems, which allow for early detection and response to potential attacks based on correlation rules. The main contribution of this work is the design and implementation of a web application that integrates artificial intelligence techniques into the process of creating and managing correlation rules for security monitoring systems, with the aim of streamlining the process of creating, modifying, and understanding correlation rules. The work first provides a theoretical introduction to the field of natural language processing and modern neural networks, particularly the transformer architecture, which is the basis of generative artificial intelligence models (e.g., ChatGPT, Gemini). It then introduces the principles of security monitoring, log management systems, the concept of correlation rule generalization, and, last but not least, the challenges associated with managing and maintaining correlation rules, which the integration of artificial intelligence into these processes significantly reduces. The practical part of the work describes the design and implementation of a web application that utilizes the gpt-4 and gpt-3.5-turbo models from OpenAI and the Gemini Ultra 1.0 model from Google for creating new correlation rules, modifying existing rules, and explaining and interpreting them for easier understanding and faster deployment. The application is designed with user-friendliness and efficiency in mind. The results of the work show that the integration of artificial intelligence into the correlation rule creation process brings significant efficiency improvements. The web application allows users to easily create and modify correlation rules. The application also allows users to better understand correlation rules, enabling them to respond to potential threats more quickly.
Rental information system
Koláček, Tomáš ; Lattenberg, Ivo (referee) ; Caha, Tomáš (advisor)
The work deals with the development of a web application using C#/.NET 8 and Blazor Server technology. The application is created as an information system for rental compa- nies. The application provides a user interface for managing a wide range of information that is important for rental companies, such as managing customers, borrowed items and loans. All information is stored in an MSSQL database, the structure of which is created using the Entity Framework Core technology version 8.0.5 using the Code First method. All web interfaces and their functions are described on both the implementation and user side. The application can also generate PDF files for loans created from DOCX templates.
Smart VoIP doorbell
Čecháček, Šimon ; Jedlička, Petr (referee) ; Caha, Tomáš (advisor)
This bachelor thesis focuses on the extension of an existing VoIP communicator on a single board computer Raspberry Pi, which uses the SIP protocol. The thesis introduces, among other things, an extension for one-way video transmission and conditional relay switching. The resulting communicator is able to make a call with two-way communication, execute a defined code using DTMF codes after authorization of the called user and switch a relay. The entire device is housed in a box printed on a 3D printer. The IT security of the proposed solution has been analyzed and the code and 3D model of the chassis are available on GitHub.
Analysis of email spam sources
Caha, Tomáš ; Kubánková, Anna (referee) ; Komosný, Dan (advisor)
The first part of this thesis deals with an approach of designing and developing of application for IP geolocation using various geolocation databases. Methods of geographical location of network devices and amount of available data provided by chosen commercial and freely accessible geolocation databases are presented. The data are summarized with focus on methods of obtaining information about IP addresses from various databases. In the paper there are also presented ways used to develop the Python application and its parts, which can be easily reused in other programs. The command line program was created to demonstrate that all parts of the developed application work properly. The whole application is freely accesible under the conditions of the MIT license, published on GitHub (https://github.com/tomas-net/ip2geotools/) and in the Python package index PyPi. The second part of this thesis deals with the description of cyberthreats and the use of developed application to mass geolocation of IP addresses that are listed in chosen freely accessible lists as sources of email spam or cyberattacks. Geographical analysis of cyberattacks sources shows countries of origin. Results of analysis are presented in graphs and maps.
Production of support by forming
Caha, Tomáš ; Štroner, Marek (referee) ; Kopřiva, Miloslav (advisor)
This project developed within the bachelor degree in B-STG present proposal forging technology - parts from bar of circular cross-section of cold rolled 14 220. Based on the literature study problems of die forging and calculation was designed die forging with bottom ejector, designed for easy removal of the forging from die cavity. Die is circular cross section and is clamped with a dovetail groove in vertical forging press LZK 1600 (manufacturer ŠMERAL Brno), with a nominal forging force of 16MN. The lower and upper half of the die is made of steel 19 662, heat threated for the purposes forging.
Receiving RTTY decoder
Šuňal, Štefan ; Caha, Tomáš (referee) ; Lattenberg, Ivo (advisor)
This thesis deals with designing and implementing autonomous decoder for RTTY communication. Theoretical part of the thesis deals with researching the RTTY technology and FSK modulation, which it uses, focusing mainly on the methods of demodulation. Next part of the thesis compares suitability of available platforms. Practical part of the thesis describes the design and implementation of circuit board, firmware and computer application. The device is using STM32 microcontroller. Firmware was developed in C++ using Arduino. The computer application was created by using C\# and WPF. 3 methods of FSK demodulations were implmented. One is using a FFT algorithm. Other two calculate frequency based on the period of square signal.
Smart water pump for water container
Janík, Vladimír ; Lattenberg, Ivo (referee) ; Caha, Tomáš (advisor)
This thesis deals with the implementation of a system for measuring the amount of water in the tank using a 12V water pump. The whole system is controlled by the ESP32 microcontroller. The introduction deals with the theoretical analysis of various principles of measuring the level of liquids. The next part deals with the procedure of the construction of the measuring device and its theoretical analysis. The last part of the work deals with the control of the pump and the individual functions that provide this control. The ultrasonic distance sensor AJ-SR04M was chosen for the implementation of the device. The volume of water in the tank is calculated from its data. The ESP32 microcontroller provides system control via a web interface. The whole system was implemented and tested to measure the volume of water and its pumping in the IBC container.
Combi-Cycle with piston engine
Kubik, Martin ; Caha, Tomáš (referee) ; Fiedler, Jan (advisor)
The scope of this diploma thesis of focused on processing and calculation of the technological scheme for combi-cycle power plant with piston engine using heavy fuel oil. There are analyzed demands of piston engine for HFO and design of technological process preparation. This thesis analyzes the suitable locations, service options and alternative solution - heating plant with piston engines. Benefits of each option are assessed in the economic model, assuming power as a source of base load and providing support services. The results are intended to assess feasibility of the investment project.
Analysis of malware
Bláha, Michael ; Caha, Tomáš (referee) ; Člupek, Vlastimil (advisor)
The aim of my bachelor thesis is to design a safe environment for the analysis of malicious software. In the theoretical part of the work, I deal with the basic division of computer viruses. Next, I describe two main procedures for malware analysis, namely static and dynamic analysis. I describe why they are used and what tools fall into these categories. I also present my methodology for secure malware analysis. In the practical part of the work, I focus on creating an analytical environment on Windows 10 and Fedora platforms. I use a graphical environment and a command line to create virtual machines. For the analysis of network traffic, I create the so-called "Fake Internet" program with the INetSim program. In the last part of the work, I deal with a sample analysis of selected types of computer viruses. I follow the described methodology. For each analysis, I describe a brief summary and results. At the end of the work, I describe a possible defense against malicious software.
Antispam software plugin for e-mail filtering based on geolocation of the sender
Kovařík, Martin ; Komosný, Dan (referee) ; Caha, Tomáš (advisor)
This thesis deals with the creation of a module for antispam software providing email filtering using sender geolocation. The theoretical part of the thesis describes spam in general and the threats that spread through email communication, such as social engineering and malware. Then the principle of email and email headers, email filters and their methods to filter messages are described and lastly IP geolocation and machine location methods are described.The created filtering module Geolock was designed for the SpamAssassin antispam software and uses the IP2Location geolocation database. The embedding of the module into SpamAssassin is shown and the module itself and its different parts are described. The module is tested on a dataset and a real-life application is outlined. The Geolock module is published on GitHub under the MIT license (https://github.com/MartinKovarik/Geolock).

National Repository of Grey Literature : 45 records found   1 - 10nextend  jump to record:
See also: similar author names
1 Caha, T.
11 Caha, Tomas
Interested in being notified about new results for this query?
Subscribe to the RSS feed.