National Repository of Grey Literature 44 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Multiplatform password manager with multi-factor authentication
Bilka, Tomáš ; Frolka, Jakub (referee) ; Člupek, Vlastimil (advisor)
This bachelor thesis deals with the authentication of user with key element of information security. It presents various methos of user protection and authentication. The first chapter is dedicated to diverse types of authentications, such as single-factor, two-factor, and multi-factor authentication, with emphasis on password protection and possible attacks on passwords. It also describes other security methos, such as security tokens and biometric systems. Which can be used for user authentication. The second chapter focuses on passwords managers, specifically the applications LastPass, KeePassXC and Bitwarden. The third chapter describes the design of a password manager with multi-factor authentication, its interface, and functions such as record manipulation, password generation and synchronization between devices. The security of the password manager is also discussed. The fourth chapter is devoted to the implementation of the password managers. Its security, synchronization, advantages, limitations, and possible improvements. The conclusion summarizes the main findings and results of the thesis.
Detection of slow-rate DDoS attacks
Sikora, Marek ; Frolka, Jakub (referee) ; Blažek, Petr (advisor)
This diploma thesis is focused on the detection and protection against Slow DoS and DDoS attacks using computer network traffic analysis. The reader is introduced to the basic issues of this specific category of sophisticated attacks, and the characteristics of several specific attacks are clarified. There is also a set of methods for detecting and protecting against these attacks. The proposed methods are used to implement custom intrusion prevention system that is deployed on the border filtering server of computer network in order to protect Web servers against attacks from the Internet. Then created system is tested in the laboratory network. Presented results of the testing show that the system is able to detect attacks Slow GET, Slow POST, Slow Read and Apache Range Header and then protect Web servers from affecting provided services.
Application for batch management of Mikrotik network devices
Kloda, Tomáš ; Frolka, Jakub (referee) ; Krajsa, Ondřej (advisor)
The goal of the thesis is to describe and develop web application for large-scale management of MikroTik network devices. The theoretical part describes RouterOS operating system. This work also describes communication through MikroTik API service. Next section includes brief description of tools, which were used for the web application development. The practical part describes development and realization of the web application. The web application is intended for Linux based operating systems.
Presentation of data from a MySQL database in Windows Presentation Foundation
Polách, Michal ; Frolka, Jakub (referee) ; Lattenberg, Ivo (advisor)
In the thesis there is demonstrated and explained the creation of WPF MVVM design pattern based applications for brisk browsing, searching and editing of data in large library database stored on a MySQL server. Quick loading of data is achieved by using data virtualization using the paging method.
BCH codes
Frolka, Jakub ; Šilhavý, Pavel (referee) ; Šedý, Jakub (advisor)
The work deals with data security using BCH codes. In the work are described BCH codes in binary and non-binary form, and their most important subclass RS codes. Furthermore, this work describes the method of decoding Peterson-Gorenstein-Zierl, Berlekamp- Massey and Euclidean algorithm. For the presentation of encoding and decoding process, the application was created in Matlab, which has two parts – Learning BCH codes and Simulation of BCH codes. Using the generated application performance of BCH codes was compared at the last part of the work.
Methodology for testing the security and performance of firewalls
Sasko, Dominik ; Člupek, Vlastimil (referee) ; Frolka, Jakub (advisor)
This bachelor thesis focuses on analysis of security and performance of firewalls and designing a methodology for testing them. Theoretical part is devoted to explaining firewalls and its' division and describing functions of next generation firewalls. Beginning of practical part focuses on testing security using penetration programs and shows results of each security test. Practical part continues with performance tests in various scenarios using Spirent Avalanche and compares the results with values stated by the manufacturer of firewall Hillstone.
Evolution of link layer loop prevention protocols
Březina, Jiří ; Frolka, Jakub (referee) ; Slavíček, Karel (advisor)
This bachelor thesis deals with the possibility of eliminating and creation loops on theData Link layer of the OSI model. At first, it was necessary to determine what arethe loops and how they are formed. Then the solution of the problem with loops waspresented as the Spanning Tree protocol, where did the protocol come from, protocoloperation, his advantages and disadvantages. In next section were discussed other vari-ants of original STP, as well as his alternatives, like for example the TRILL or the SPBprotocol. The practical part of this work is based on the theoretical and shows howSpanning Tree protocols work in practice on real devices. This part is mainly focusedto testing the speed of convergence each of protocols and also their extensions. In theend is mentioned a laboratory task, which is part of the appendices and forms the mainbenefit of the whole thesis, because future students at school subject “network architec-ture” can try to configure protocols that was mentioned above and better understandhow these protocols work.
SDN for cloud computing
Kuklovský, Adam ; Frolka, Jakub (referee) ; Slavíček, Karel (advisor)
The theme of this bachelor work is SDN technology. It consists of both practical and theoretical part. In theory section, we described the main concept of the SDN network, functioning of OpenFlow protocol, comparison of individual open source SDN controllers and real onset of SDN technology. Practical section contains procedure of individual components being installed to create topology and to forward realization of laboratory task. The laboratory work also depicts the way of creation and modification of streams in the SDN network.
Analysis and Detection of RAT Malware
Sidor, Samuel ; Frolka, Jakub (referee) ; Hajný, Jan (advisor)
Goal of this bachelor’s thesis is studying problematics of various types of malware with specific focus on RAT (Remote Access Trojan) category. This thesis will also acquaint reader with static and dynamic binary analysis and terms like reverse engineering, sandboxing, decompilation, etc. Then chosen malware families will be analysed and for these families detection rules in YARA language will be created. Except this, reader will be acquainted also with protection against RAT malware and finally data acquired from detail analysis will be evaluated.
Monitoring of servers with OS Linux
Šuba, Filip ; Frolka, Jakub (referee) ; Komosný, Dan (advisor)
This bachelor’s thesis deals with monitoring of a servers in experimental network PlanetLab. The beginning of the thesis is about PlanetLab network, terminology used within it and also projects realized in it. For generating information about node, has been created a module in Python, which has been integrated into application Plbmng. Application has been published under the MIT license on \url{www.github.com} and on Python Package Index www.pypi.org. For the application has been created manual and for the module has been created documentation.

National Repository of Grey Literature : 44 records found   1 - 10nextend  jump to record:
See also: similar author names
3 Frolka, Jan
Interested in being notified about new results for this query?
Subscribe to the RSS feed.