National Repository of Grey Literature 120 records found  beginprevious101 - 110next  jump to record: Search took 0.01 seconds. 
Search Engine Optimization (SEO) Analysis Information System
Karlík, Ondřej ; Ruttkay, Ladislav (referee) ; Tobola, Jiří (advisor)
The thesis describes collecting of recently used information for users optimizing their web applications for search engines. Details of SEO parameters and principles of their processing are discussed here. The thesis also learns about problems appearing when the information system is used frequently.
Network Protocol Analyzer
Pšorn, Daniel ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
Object of this thesis is to find the way how to program network protocol analyzer on the highest level of ISO/OSI model. We need to use some of the methods for detection of application protocols. The software described in this thesis uses traditional application level traffic identification method and signature-mapping-based method. Basic platform is FreeBSD operating system. Programming language is C using libpcap library.
Web Portal for Network Traffic Reporting
Zapletal, Petr ; Straka, Martin (referee) ; Tobola, Jiří (advisor)
This thesis deals with the design and implementation of web portal with reports about network traffic. This system is designed for easy network monitoring with transparent charts a tables. To obtain statistics from network traffic, NetFlow technology, which is the key part of system, is used. Portal is platform independent and is built around HTML and PHP technologies. Portal also allows export proccessed data through periodic email service or files in PDF format.
Detection of Network Attacks Based on NetFlow Data
Kulička, Vojtěch ; Tobola, Jiří (referee) ; Žádník, Martin (advisor)
With rising popularity of the internet there is also rising number of people misusing it. This thesis analyzes the problem of network attack detection based on NetFlow data. A program is designed to point out anomalous behaviour by analyzing the flow records using data mining techniques. The method of TCM-KNN utilizing the fact that attacks statistically deviate is implemented. Thus even new types of attacks are detected
Network Protection Using NetFlow Data
Sedlář, Petr ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This document provides information about Cisco NetFlow technology and its usage to protect networks from different types of attacks. Part of the document is a summary of common security risks in term of their detection on network and transport layer. There are specified characteristics of NetFlow data containing samples of security risks. On the basis of these characteristics, an application for detection these risks is designed and implemented.
Flexible Network Flow Measurement
Varga, Ladislav ; Tobola, Jiří (referee) ; Žádník, Martin (advisor)
This thesis deals with designing the probe used for measuring network flows. It contains theoretical analysis of network measurment topic, description of algorithms and principles used for network flow measurement. Emphasis on the probe architecture lies on efficient indexing algorithm and flow record flexibility, such that user is able to define format of flow record.
VoIP Quality Analyzer
Havelka, Ondřej ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This master thesis deals with the design and implementation of an application for analyzing Voice over IP quality using NetFlow. In the beginning, there is summarized basic information about VoIP technology and NetFlow - its principles, the most used protocols, factors that have influence on call quality and call quality rating methods. Later there is presented proposal of application and then described its implementation. The created application was tested on samples, which simulate calls in network with delays and packet-loss. Within testing was made the comparison with commercial application and the results are discussed.
Network Protection Using NetFlow Data
Hlavatý, Ivo ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This document focuses on Cisco Netflow technology and its possible usage in monitoring networks and detecting network anomalies. Based on the analysis of attacks at the network and transport layer is designed an application for selected security threats which detects its presence. The implementation section provides a system for predicting network traffic and related detecting deviations from the baseline on the basis of statistical data. Use of NetFlow technolgy is demonstrated on examples where the results of other current security and monitoring techniques have failed or did not provide sufficiently good results.
Longest Prefix Match Algorithms
Weigner, Martin ; Puš, Viktor (referee) ; Tobola, Jiří (advisor)
The speed of computer network is increasing. One of the basic tasks which has to be solved by the network devices is longest prefix match. Many algorithms are able to solve this task but it's necessary to solve it very fast because of increasing transfer speed and the routing standard IPv6. This standard has longer addresses and it's necessary to search prefixes in much bigger sets. The thesis describes present algorithms that solve the problem. These are confronted with new algorithm HashTreeBitmap which is also described in the work. On the tests is documented that this algorithm is able to cope with high demands which are placed on it.
Hardware Packet Preprocessing for Acceleration of Network Applications
Vondruška, Lukáš ; Mikušek, Petr (referee) ; Tobola, Jiří (advisor)
This thesis particularly deals with design and implementation of FPGA unit, which performs hardware acclerated header field extraction of network packets. By utilizing NetCOPE platform it is proposed flexible and effective high-peformance solution for high-speed networks. A theoretical part presents a classical protocol model and an analysis of the Internet traffic. Main part of the thesis is further focused on key issues in hardware packet preprocessing, such as packet classification and deep packet inspection. The author of this thesis also discusses possible technology platforms, which can be utilized to acceleration of network applications.

National Repository of Grey Literature : 120 records found   beginprevious101 - 110next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.