National Repository of Grey Literature 58 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Application Data Extraction from Network Protocols
Januš, Filip ; Jeřábek, Kamil (referee) ; Holkovič, Martin (advisor)
This thesis is focused on design and implementation of tool for data extraction from captured network communication. The theoretical part deal with particular network protocols, its behavior, defines keywords and apprises with used tools. Second part is focused on design and implementation of extraction tool, design of declaration language for description of protocols. In the extractor are included third-party tools for analysis particular packets and reconstruction network flows. These tools together with designed declarative language are used due to requirement on easy extendability of designed tool. The end of this thesis is dedicated functional and performance testing of implemented tool.
Use of Heuristics for Password Recovery with GPU Acceleration
Gazdík, Peter ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis discusses various techniques to enhance the password recovery process with GPU acceleration. The first part introduces a Markov model and simple regular expressions. These techniques dramatically reduce the password space to be searched. This is based on observations of users and their use of letters in passwords. We propose the design of a parallel algorithm that combines both techniques. Last part of the thesis contains the results of experiments to prove benefits of Markov model.
Behaviour-Based Identification of Network Devices
Polák, Michael Adam ; Holkovič, Martin (referee) ; Polčák, Libor (advisor)
Táto práca sa zaoberá problematikou identifikácie sieťových zariadení na základe ich chovania v sieti. S neustále sa zvyšujúcim počtom zariadení na sieti je neustále dôležitejšia schopnosť identifikovať zariadenia z bezpečnostných dôvodov. Táto práca ďalej pojednáva o základoch počítačových sietí a metódach, ktoré boli využívané v minulosti na identifikáciu sieťových zariadení. Následne sú popísané algoritmy využívané v strojovom učení a taktiež sú popísané ich výhody i nevýhody. Nakoniec, táto práca otestuje dva tradičné algorithmy strojového učenia a navrhuje dva nové prístupy na identifikáciu sieťových zariadení. Výsledný navrhovaný algoritmus v tejto práci dosahuje 89% presnosť identifikácii sieťových zariadení na reálnej dátovej sade s viac ako 10000 zariadeniami.
Password Recovery of RAR, BZIP, and GZIP Archives Using GPU
Mikuš, Dávid ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis describes cryptographic protection and the implementation of file password of RAR, GZIP, BZIP formats. For password recovery multi platform Wrathion tool is used, the tool can obtain a password from an encrypted file by using its modules and password generators. The module provides parsing of input file and storing data, which are later used for password validation. To accelerate calculations, graphics card and OpenCL framework is used. The core of thesis is the implementation of Wrathion's modules for password recovery of the formats denoted above and measuring the speed and comparision with competeting tools.
Building Trading System Based on Time Range Breakout
Šťastný, Filip ; Hynek, Jiří (referee) ; Holkovič, Martin (advisor)
This thesis is focused on creation of automatical trading system for Forex exchange market. System is based on time range breakout principal and highly customizable by parameters. The thesis explains basic principals of trading on Forex, a designing of the strategy, an implementation of the strategy in Easy language, optimalizations and backtesting using Multicharts platform.
SDN Controlled According to User Identity
Holkovič, Martin ; Ryšavý, Ondřej (referee) ; Polčák, Libor (advisor)
The aim of this work is to connect dynamic identity management system developed under the project Sec6Net with a control of SDN network. The controller Pyretic is used for network control, which allows application development by using the match-action rules. Interface between the identity management system and controller Pyretic is designed and implemented in both systems. To prove the concept, selected use cases related to security, routing and accounting are created. The use cases are implemented as applications for Pyretic controller. All programs were tested in networking laboratory according to the possibilities. The main contribution of this work is to simplify and improve the management of computer networks while providing new capabilities to administrators of these networks and ultimately their users.
AOS: Tool for Graph Analysis
Siebert, Martin ; Holkovič, Martin (referee) ; Trchalík, Roman (advisor)
This Bachelor's thesis is focused mainly on design and implementation of a tool, that analyses price graphs. One of the main requirements of the design is modifiability and maintainability of source code. This goal is achieved with the MVC architecture and by creating independent system components. The application takes care of collecting the data from the trading platform, performs the calculation based on the requirements and displays the information in the graph. For each module, the calculation is being done independently, whereas the modules can form multiple sequences of different lengths. In this Bachelor's thesis, there are five analytical modules implemented and two sample case studies created.
Extending NetFlow Records for Increasing Encrypted Traffic Classification Capabilities
Šuhaj, Peter ; Jeřábek, Kamil (referee) ; Holkovič, Martin (advisor)
Master's thesis deals with selection of attributes proper for classification of encrypted traffic, with the extension of NetFlow entries with these attributes and with creating a tool for classify encrypted TLS traffic. The following attributes were selected: size of packets, inter-packet arrival times, number of packets in flow and size of the flow. Selection of attributes was followed by design of extending NetFlow records with these attributes for classifying encrypted traffic. Extension of records was implemented in language C for exporter of the company Flowmon Networks a.s.. Classifier for collector was implemented in language Python. Classifier is based on a model, for which training data were needed. The exporter contains the classifying algorithm too, the place of the classification can be set. The implementation was followed by creation of testing data and evaluation of the accuracy. The speed of the classifier was tested too. In the best case scenario 47% accuracy was achieved.
Application for Simulation of PROFINET Controller
Mazurek, Tomáš ; Holkovič, Martin (referee) ; Kreslíková, Jitka (advisor)
This bachelor's thesis deals with development of an application simulating the Profinet controller. The main function of such controller is to establish an application relation with a device, which is communicating via the Profinet technology. Through the application relation then takes place the entire exchange of information. The goal of the controller simulation, run on a desktop computer, is to facilitate the testing of input/output devices connected to the system via Ethernet interface. The resulting application allows to monitor and modify the communication much easier than the real control system.
Identity Detection in TCP/IP Architecture
Holkovič, Martin ; Matoušek, Petr (referee) ; Polčák, Libor (advisor)
This work deals with detection of users within computer networks on different layers of the TCP/IP architecture. These identities are identified by protocols running on the appropriate layers of the given architecture. PPPoE and SLAAC protocols were chosen as protocols that are used for network layer address assignments. The second type of protocol is the application protocol SMTP. We analysed communication using the chosen protocols in order to create metadata about the corresponding communication. The results of the analysis are finite state machines. Based on these finite state machines, software for legal interception was designed and implemented. Implemented software was tested on samples of data, in a specialized laboratory, and in a production network.

National Repository of Grey Literature : 58 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.