National Repository of Grey Literature 314 records found  beginprevious294 - 303nextend  jump to record: Search took 0.00 seconds. 
Modelling of Distance-Vector Routing Protocols
Trhlík, Jiří ; Matoušek, Petr (referee) ; Veselý, Vladimír (advisor)
This master thesis deals with the implementation of the RIPng routing protocol in the OMNeT++/INET environment. It describes the RIPng protocol and its specifics on the Cisco devices. It clarifies important concepts such as IPv6 and distance-vector routing protocols. The thesis also describes the OMNeT++ environment and the INET Framework, where it focuses on the current status of implementation of the components required for the RIPng protocol integration.
Compiler of State Diagram Language to CHILL Language
Goldmannová, Zuzana ; Matoušek, Petr (referee) ; Ryšavý, Ondřej (advisor)
This thesis deals with the grammar of an existing proprietary state diagram language, which is used to simulate state diagrams employed in telephone exchanges. The goal of this work is to analyze the grammar and existing compiler of this language to CHILL language and also to design and implement a new compiler. This new compiler will be easier to manage and will eliminate errors and imperfections of the current arrangement. Finally this compiler is tested using existing files, that were formerly created for the current compiler, and also using files I created for testing purposes.
Extended Functionality of Honeypots
Soóky, Peter ; Polčák, Libor (referee) ; Matoušek, Petr (advisor)
Bakalářska práce pod názvem Rozšířené funkce honeypotů je zaměřena na vývoj bezpečnostních systémů určitých typů nazvaných honeypoty. Po představení principů technik honeypotů se zabýva s výhodami ich používaní v porovnaní s inými bezpečnostními systémy. Následne popisuje rozdelení typů honeypotu a ich charakteristiky. Další část je věnován obeznámení nástrojů CONPOT a GLASTOPF. Cílem práce je navrhnút a implementovat rozšíření těchto nástrojů zaměrem ich vylepšení. Součástí popisů jednotlivých rozšíření je představení a analýza problému, implementace a testování navrhnutých rozšíření. Použití rozšíření poskytují užívatelům těchto honeypotů zvýšenú bezpečnost a širší okruh využití. V závěre jsou popsány možnosti dalšího rozšíření.
Detection and Analysis of P2P Network BitTorrent Sync
Kutlák, Martin ; Polčák, Libor (referee) ; Matoušek, Petr (advisor)
Bachelor's thesis is focused on issues with detection of the P2P network BitTorrent Sync in network traffic. In the theoretical part of this work is introduced architecture of the P2P networks, BitTorrent Sync protocol and possible methods for P2P network detection. On the base of this knowledge is designed tool for detection of BitTorrent Sync network traffic. In the practical part of this thesis is presented implementation of the whole monitoring system. In the end of practical part are presented results of conducted tests with monitoring system.
VoIP Traffic Monitoring and Management in OnePK Enabled Networks
Antolík, Dávid ; Matoušek, Petr (referee) ; Ryšavý, Ondřej (advisor)
The main goal of this master's thesis is to apprise of principles of Cisco One Platform Kit based on software defined networks and with monitoring techniques in that type of networks. The focus is concentrated on monitoring the quality of Voice over IP communication. Next part of this thesis is a proposal and implementation of the extensible monitoring environment OneMon on the Cisco One Platform Kit. It is possible to extend OneMon environment using specific analyzers to monitor various types of network traffic. The part of this master's thesis is also implementation of VoIP traffic analyzer for SIP and RTP protocols. This analyzer provides information about phone calls and their quality in a monitored segment of a computer network.
Detection of Dictionary Attacks on Network Services Using IP Flow Analysis
Činčala, Martin ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
Existing research suggests that it is possible to detect dictionary attacks using IP flows. This type of detection was successfully implemented for SSH, LDAP and RDP protocols. To determine whether it is possible to use the same methods of detection for e-mail protocols virtual test environment was created. I deduced the characteristics of attacks in flows from the data, which I gained from this virtual environment. Than I chose the statistical value that separates the attacks from legitimate traffic. Variance of specific flow parameters was chosen as main characteristic of attacks. IP addresses with flows that have small variance of chosen parameters and high frequency of packet arrival are considered untrustworthy. Variance is calculated from IP history to rule out false positives. The IP history of legitimate user contains variation of flows which prevents marking this IP address as dangerous. On the basis of this principal the script, which detects the attacks from the nfdump output, was created. The success of detection of the attacks was tested on classificated data from the real environment. The results of tests showed, that with good configuration of marginal values the percentage of detected attacks is high and there are no false positives. Detection is not limited only on mail protocols. With regard to universal design, the script is able to detect dictionary attacks on SSH, LDAP, SIP, RDP, SQL, telnet and some other attacks.
Session Monitoring and Accounting in IMS Networks
Karpíšek, Filip ; Ryšavý, Ondřej (referee) ; Matoušek, Petr (advisor)
This thesis describes protocols used in IP Multimedia Subsystem (IMS) networks. Freely available implementations of IMS system are described. The main goal is to describe design and implementation of a tool for analyzing communication between users and IMS system. The tool seeks and decodes signaling messages. These messages are analyzed for information about sessions which are necessary for session monitoring and accounting. Final gathered information are exported in a form of extended NetFlow/IPFIX records. We used open-source Open IMS Core implementation for building IMS network and creating test data. As endpoints we used another open-source application for Android OS called IMSDroid.
Framework for DNS Server Testing
Novák, Martin ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
This thesis deals with the modifications of the framework designed for DNS servers testing. Framework is developed by NIC.CZ association and is used primarily for testing the DNS server Knot DNS. The aim of this work are modifications of the framework that will allow simpler testing with this framework, such as: support for multiple implementations of DNS servers, parallel testing, components dummy server and box-in-the-middle, division into multiple components and overall modification of the existing framework. Introduction of thesis is dedicated to the authoritative DNS servers and to the foundations of testing. The remaining part of the thesis deals with the state of the existing framework and the state and testing of modified framework.
Evaluating the effectiveness of complex protection measures in cadastral area Jerlochovice in Husí potok Watershed
Matoušek, Petr ; Sobotková, Veronika (referee) ; Dumbrovský, Miroslav (advisor)
A subject of this Thesis is the design of the complex system of measures of soil conservation in given catchment area, which will serve as a concept of complex land consolidation in cadaster Jerlochovice. Based on the analysis and the land survey, a feasible solution was designed using the hydrological and erosive tools of ArcGIS. For the identification of areas endangered by erosion and for the identification of runoff conditions, the Universal Soil Loss Equation of Wischmeier-Smith was used (in grid modification). Based on the calculated values, the suitable technical and agrotechnical measures of soil erosion control were designed. Each component was designed for the values of Qn from the model DesQ. Subsequently the efectivity of the designed measures was evaluated by the comparison of results of erosive and runoff conditions before and after the aplication of the soil and water conservation measures.
Potential for Misuse of Products of Civil Pyrotechnics
Matoušek, Pavel ; Bartošková, Monika (referee) ; Němčák,, Ondřej (advisor)
This thesis analyses misuse potential of category 1, 2 and 3 firework´s products. An algorithm for selection of pyrotechnic products with the biggest potential of misuse was created and experimetally tested on common firework products. An experiment replicating the Boston incident was also conducted. And in this experiment was found out, that pyrotechnical compositions used in common firework products could have been used.

National Repository of Grey Literature : 314 records found   beginprevious294 - 303nextend  jump to record:
See also: similar author names
8 MATOUŠEK, Pavel
14 MATOUŠEK, Petr
6 Matoušek, Patrik
8 Matoušek, Pavel
14 Matoušek, Petr
1 Matoušek, Philip
Interested in being notified about new results for this query?
Subscribe to the RSS feed.