National Repository of Grey Literature 58 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Tunneled Data Extraction into Separate Flows
Nahálka, Roman ; Hranický, Radek (referee) ; Holkovič, Martin (advisor)
The goal of this work is to design and implement an application for extraction of tunneled data into seperate flows. The app will be removing all layers of encapsulation, that the file contains.The use of the app lays in better analysis and diagnostics of network communication. Thanks to removing the tunnels from the network flow, it will only contain data we can use. In the theoretical part, the work focuses on network architecture TCP/IP, the tunneling protocols and ways of capturing communication on the network. The practical part describes the way of retrieving test data, it also contains a design of the target application, as well as implementation of this design and testing of the final application.
Attack on Encrypted Disk Volumes Using GPU
Sedlo, Ondřej ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
The aim of this thesis is to create an extension of the Fitcrack tool, which will recover passwords from disk volumes encrypted by TrueCrypt. The introduction part describes the Fitcrack tool which is used for password recovery and supports many different formats of files, and OpenCL framework which is used for computation acceleration. The thesis also deals with the TrueCrypt tool, and its possibilities of use, encrypted disk volumes analysis and cryptographic algorithms used by TrueCrypt to encrypt disk volumes. Furthermore, the work includes a concept and implementation of the Fitcrack module which will be used to recover passwords from disk volumes encrypted by TrueCrypt. At the end of the work we can see results of our experiments that compare speeds of CPU and GPU.
Vulnerability Detection in Computer Network
Šuhaj, Peter ; Hranický, Radek (referee) ; Holkovič, Martin (advisor)
Bachelor's thesis deals with analysis of chosen network protocols, finding their vulnerabilities and with designing and implementation of a tool for their detection. A vulnerability, for example, is using unencrypted communication. First of all the chosen protocols are studied, next methods for capturing and processing network traffic are analyzed. Based on research the design of the tool for detecting vulnerabilities is created and design of the format of vulnerabilities is created. Afterwards the implementation of the design is created in language Python and YAML configuration files are created containing entries of vulnerabilities. The program checks the input PCAP based on the content of these files. Testing took place on files of different size containing captured network traffic.
Server Data Monitoring with Android Notification
Bohuš, Michal ; Polčák, Libor (referee) ; Holkovič, Martin (advisor)
Thesis is concerned with server data monitoring, messages generation and mobile application development for receiving notifications from server. Monitoring of the user's selected data takes place on the server. For data monitoring purposes were as source chosen NoSQL databases, SQL database and terminal within OS. Messages are generated based on user's specified rules over the monitored data. They can be sent both to an individual or group of people to e-mail or mobile application. Through the mobile application it is possible to subscribe or unsubscribe to receive messages and view recieved message.
Diagnosis of Communication Problems in Captured Network Traffic
Marko, Peter ; Holkovič, Martin (referee) ; Kořenek, Jan (advisor)
This thesis deals with a system for measuring the quality of captured data on the network. The focus is mainly on packet loss caused by insufficient capture rate. The quality of captured network traffic is evaluated on TCP protocol, which implements sequence and acknowledgment numbers. Based on these numbers, we can detect data, that has been correctly transmitted, but we do not see them in the capture. Existing tools, such as capTCP or Wireshark, are not suitable for this analysis because they cannot comprehensively analyze the quality of captured communication, filter communication flows according the metrics and do not fit into system DISTANCE. This thesis is also focused on configuration problems of DHCP protocol.
Web Simulator of Football Leagues and Championships
Urbanczyk, Martin ; Holkovič, Martin (referee) ; Hynek, Jiří (advisor)
This thesis is about the creation of a simulator of football leagues and championships. I studied the problematics of football competitions and their systems and also about the base of machine learning. There was also an analysis of similar and existing solutions and I took inspiration for my proposal from them. After that, I made the design of the whole simulator structure and of all of its key parts. Then the simulator was implemented and tested. The application allows simulating top five competitions in UEFA club coefficients rating.
Anonymization of PCAP Files
Navrátil, Petr ; Hynek, Jiří (referee) ; Holkovič, Martin (advisor)
This diploma thesis deals with the design and implementation of an application suitable for the anonymization of PCAP files. The thesis presents TCP/IP model and for each layer highlights attributes that can be used to identify real people or organizations. Some of the anonymization methods suitable to modify highlighted attributes and sensitive data are described. The implemented application uses TShark tool to parse byte data of PCAP format to JSON format that is used in the application. TShark supports lots of network protocols which allows the application to anonymize various attributes.  Anonymization process is controlled by anonymization politics that can be customized by adding new attributes or anonymization methods.
Generic Flow Analysis in Computer Networks
Jančová, Markéta ; Holkovič, Martin (referee) ; Kolář, Dušan (advisor)
Tato práce se zabývá problematikou popisu síťového provozu pomocí automaticky vytvořeného modelu komunikace. Hlavním zaměřením jsou komunikace v řídicích systémech , které využívají speciální protokoly, jako je například IEC 60870-5-104 . V této práci představujeme metodu charakteristiky síťového provozu z pohledu obsahu komunikace i chování v čase. Tato metoda k popisu využívá deterministické konečné automaty , prefixové stromy  a analýzu opakovatelnosti. Ve druhé části této diplomové práce se zaměřujeme na implementaci programu, který je schopný na základě takového modelu komunikace verifikovat síťový provoz v reálném čase.
Detection of Network Attacks Using Tshark
Dudek, Jindřich ; Ryšavý, Ondřej (referee) ; Holkovič, Martin (advisor)
This diploma thesis deals with the design and implementation of a tool for network attack detection from a captured network communication. It utilises the tshark packet analyser, the meaning of which is to convert the input file with the captured communications to the PDML format. The objective of this conversion being, increasing the flexibility of input data processing. When designing the tool, emphasis has been placed on the ability to expand it to detect new network attacks and on integrating these additions with ease. For this reason, the thesis also includes the design of a complex declarative descriptions for network attacks in the YAML serialization format. This allows us to specify the key properties of the network attacks and the conditions for their detection. The resulting tool acts as an interpreter of proposed declarative descriptions allowing it to be expanded with new types of attacks.
Graphical Visualization of Incident Handling
Markovičová, Veronika ; Holkovič, Martin (referee) ; Hynek, Jiří (advisor)
This bachelor thesis describes the proposal and implementation of components that visualize data on incidents and their states. These components aims to create a clear visualization of incidents and their states that would facilitate the search for information on incidents and thus streamlining their work. One of the components created shows a detailed description of individual states of incident. The second created component shows either one or more incidents as the sequence of their states on the timeline. As a suitable tool for visualization and demonstration of created components, dashboard has been chosen. Components were consulted and tested with Flowmon.

National Repository of Grey Literature : 58 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.