National Repository of Grey Literature 39 records found  beginprevious21 - 30next  jump to record: Search took 0.00 seconds. 
Analysis of User Behavior in the Wireless Networks
Jacko, Michal ; Homoliak, Ivan (referee) ; Kačic, Matej (advisor)
This paper deals with a problem of analysys of user behavior in the wireless networks. Paper describes design and implementation of a method, which can classify users by their behavior.
Analysis of wireless network attacks
Kačic, Matej ; Dočkal,, Jaroslav (referee) ; Zbořil, František (referee) ; Hanáček, Petr (advisor)
This work describes security mechanisms of wireless network based on 802.11 standard and security enhancement 802.11i of these networks known as WPA2, where the analysis of vulnerabilities and attacks on these networks were performed. The work discusses two major security issues. The first is unsecure management frames responsible for vulnerability with direct impact on availability and the other is the vulnerability that allows executing the impersonalize type of attacks. The system for generation attacks was designed to realize any attack very fast and efficient. The core of the thesis is the design of a system for attack analysis using the principle of trust and reputation computation. The conclusion of the work is devoted to experimenting with the proposed system, especially with the selection of suitable metrics for calculating the trust value.
Ransomware Obfuscation Techniques
Jacko, Jerguš ; Barabas, Maroš (referee) ; Kačic, Matej (advisor)
This master's thesis seeks to design, implement, and point out new techniques for obfuscation of ransomware activity using the entropy principles of data that do not fall within the detection capabilities of known anti-ransomware and anti-virus tools. The proposed techniques are aimed at changing the ransomware activity in the downgrading phase (encryption or obfuscation) of files on the infected system.
Content Document Classification
Borčík, Filip ; Kačic, Matej (referee) ; Třeštíková, Lenka (advisor)
This work deals with document classification based on standard family ISO/IEC 27000. Points to a need, but also issues of classification in corporate environment. The work also implements system for MS office documents classification based on content analysis using defined rules. This system is introduced into DocTag application developed by AEC company.
Artificial Intelligence Document Classification
Molnár, Ondřej ; Kačic, Matej (referee) ; Třeštíková, Lenka (advisor)
This paper deals with document classification using artificial intelligence. It describes the principles of classification and machine learning. It also introduces AI methods and presents Naive Bayes classification method in detail. Provides practical implementation of the classifier in MS Office and discusses other possible extensions.
Tool for AutoCAD Sketches Protection
Smejkal, Adam ; Kačic, Matej (referee) ; Ovšonka, Daniel (advisor)
The main goal of this thesis is to develop a tool that helps to protect sensitive data in drawings created by AutoCAD 2016 using methods employed by information rights management systems (IRM). It studies general principles of data leak prevention, closely describes IRM systems and analyzes suitable methods to extend the functionality of AutoCAD with a goal of integrating it into an IRM system as a client application.
Security Metrics of SAP Platform
Třeštíková, Lenka ; Barabas, Maroš (referee) ; Kačic, Matej (advisor)
Main goal of this thesis is analyzing potential security risks of the SAP NetWeaver platform and identifying various vulnerabilities, that are results of poor system configuration, incorrect segregation of duties or insufficient patch management. Methodology for platform evaluation is defined by vulnerabilities, security requirements and controls will be created.
Integration of SELinux Audit Logs into ABRT Tool
Vrabec, Lukáš ; Kačic, Matej (referee) ; Barabas, Maroš (advisor)
The main aim of the thesis is to introduce the security of Linux operating systems and the access control list mechanism. The thesis focuses on processing security messages produced by the security mechanism into logging services and on displaying those messages. In addition, the thesis includes a concept solution and its implementation, which integrates security messages into a centralized system, keeps them and reports bugs in the Linux community distribution Fedora and in the Linux commercial distribution Red Hat Enterprise Linux.
Cyber Threat Intelligence Platform
Jacko, Jerguš ; Barabas, Maroš (referee) ; Kačic, Matej (advisor)
Main goal of this thesis is to create an web application platform, which provides simplified characterization, adaptation and exchange of cyber threat incidents using the STIX, TAXII, CybOX and IDEA standards. Platform has implemented rest API to collect external events in IDEA format, tool for creating STIX formatted models of events and model exchange mechanism based on TAXII described services.
System for Detection of APT Attacks
Hujňák, Ondřej ; Kačic, Matej (referee) ; Barabas, Maroš (advisor)
The thesis investigates APT attacks, which are professional targeted attacks that are characterised by long-term duration and use of advanced techniques. The thesis summarises current knowledge about APT attacks and suggests seven symptoms that can be used to check, whether an organization is under an APT attack. Thesis suggests a system for detection of APT attacks based on interaction of those symptoms. This system is elaborated further for detection of attacks in computer networks, where it uses user behaviour modelling for anomaly detection. The detector uses k-nearest neighbors (k-NN) method. The APT attack recognition ability in network environment is verified by implementing and testing this detector.

National Repository of Grey Literature : 39 records found   beginprevious21 - 30next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.