National Repository of Grey Literature 34 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Design and implementation of network collector
Bošeľa, Jaroslav ; Horváth, Tomáš (referee) ; Oujezský, Václav (advisor)
This master’s thesis deals with description of information protocol of network flow, mainly definition of Cisco NetFlow version 9. Describes it’s features, message format and attributes of transmitted data. The thesis is primarly focused onto NetFlow v9 transmitted template, which defines fileds and data in consecutive data flow. The essence of the thesis consists in implementation of simple NetFlow v9 parser, which has been programmed in Python prog.language, it’s tests of captured UDP data from file and port capture testing on development server in lab. There is a possibility of saving captured and parsed data into prepared database within implementation as output from capturing.
Android mobile application security
Michálek, Jakub ; Škorpil, Vladislav (referee) ; Oujezský, Václav (advisor)
The thesis's objectives are to introduce a computing platform for Android mobile devices and its security risks for the average user. The application that was created presents these risks on practical examples. The first part of the diploma thesis introduces the Android operating system, its architecture, version, and basic components. Security risks of this operating system are described in a second part. The following section is devoted to Android permission and the danger which can arise from their authorization. The final section of the work delves into design and implementation of the application from the programming point of view.
Simulation of Triple Play services in passive optical networks with OMNeT++ application
Puchrík, Matej ; Oujezský, Václav (referee) ; Horváth, Tomáš (advisor)
The thesis deals with dynamic bandwidth allocation in passive optical networks of NG- PON2 standard. The paper also describes the so-called. triple play services and the practical part is a simulation of these services in passive optical networks NG-PON2 in the simulation environment OMNeT ++. As part of this work modules for passive optical network NG-PON2 were created as an expansion of project INET. Namely ONU, OLT and splitter modules were created. The first four chapters are theoretical and descibe older standards PON networks, further NG-PON2 networks and DBA algorithm then describes triple play services and explains their current status respectively. In another part a description of the programm OMNeT++ a description of the structure of simulation models. The practical part contains a description of modules, implementation of DBA algorithm and its modification, design simulated topology and detailed description of the configuration simulation. At the end of the practical part presents the results of simulations with the corresponding explanations.
Converged Networks and Traffic Tomography by Using Evolutionary Algorithms
Oujezský, Václav ; Sýkora, Jiří (referee) ; Polívka, Michal (referee) ; Škorpil, Vladislav (advisor)
Nowadays, the traffic tomography represents an integral component in converged networks and systems for detecting their behavioral characteristics. The dissertation deals with research of its implementation with the use of evolutionary algorithms. The research was mainly focused on innovation and solving behavioral detection data flows in networks and network anomalies using tomography and evolutionary algorithms. Within the dissertation has been proposed a new algorithm, emerging from the basics of the statistical method survival analysis, combined with a genetics’ algorithm. The proposed algorithm was tested in a model of a self-created network probe using the Python programming language and Cisco laboratory network devices. Performed tests have shown the basic functionality of the proposed solution.
Security risks according to ISO 27001
Doubková, Veronika ; Oujezský, Václav (referee) ; Horváth, Tomáš (advisor)
This diploma thesis deals with the management of security information, according to ISO/IEC 27005 and it is implementation in the Verinice software environment. The risk information management process is applied to a critical infrastructure, that is connected to a optical fiber network. The work focuses on incidents aimed at threatening data from optical threats and active network elements in transmission systems. The result of the work is defined as a risk file in the .VNA format containing identified risks, for which appropriate measures are implemented in connection with the requirements of ISO/IEC 27001, for the protection of critical infrastructures and transmitted data in the transmission system.
Design of labs for Cisco academy courses
Oujezský, Václav ; Růčka, Lukáš (referee) ; Jeřábek, Jan (advisor)
This master's work deals with the design of laboratory exercises for Cisco Academy courses. Especially is oriented on Cisco technology. The theoretical part describes various devices used in the laboratory and the issue of functionality of these devices, such as switching, routing and solve any problems with the configurations of these elements. The practical part is directly generated designs laboratory exercises, focusing on specific examples of the problems from the configuration and network management with Cisco. An integral part of work consists of supporting the presentation of individual laboratory tasks, including configuration files, settings of the device. Create labs and verify the functionality of their configuration has been realized in the laboratory Cisco Academy Brno.
Methodology for Testing of High-speed FPGA Cards
Šulc, Tomáš ; Oujezský, Václav (referee) ; Škorpil, Vladislav (advisor)
This work deals with design and implementation of a methodology for testing RAM memories connected to an FPGA circuit on Combo cards. In theoretical part of the work RAM faults are sorted by the way they affect the function of the memory and the algorithms to detect them are specified. In practical part, the methodology for testing RAM memories located on Combo cards are proposed, implemented and verified. The NetCOPE framework was used for the implementation. Within the NetCOPE structure, the project was divided into a hardware accelerated application for an FPGA circuit and a software application for a host computer. The project was designed with respect to an easy transfer to other versions of Combo cards.
Technologies for Quality of Service Assurance in IP Networks and their mutual Cooperation
Oujezský, Václav ; Skořepa, Michal (referee) ; Hošek, Jiří (advisor)
This barchelor thesis deals with complex description of technologies and particular ways providing quality services in IP networks. It is especially oriented on architecture of IntServ and DiffServ and their possible ways of mutual cooperation. In practical part, the testing of architectures mentioned is made and their characteristics in network emulator program GNS3.
System for monitoring changes in passive optical networks
Pancák, Matej ; Oujezský, Václav (referee) ; Holík, Martin (advisor)
This diploma thesis describes a design and implementation of a system for monitoring events in passive optical networks, specifically in GPON networks. The main technologies used in the implementation of this system are Apache Kafka, Docker and the Python programming language. Within the created application, several filters are implemented. This filters obtain essential information from the captured frames in terms of traffic analysis on the given network. The result of the thesis is a functional system that from the captured GPON frames obtains information about the network traffic and stores them in the Apache Kafka, where the stored data is accessible for further processing. The work also provides examples of how to process the stored data, along with information about their meaning and structure.
Spam detection methods
Rickwood, Michal ; Horváth, Tomáš (referee) ; Oujezský, Václav (advisor)
Hlavním cílem této práce je navrhnout a implementovat detekční algoritmus na spam, který využívá výhradně záznamy provozu v podobě Netflow zpráv. Poskytovatelé internetových služeb musí spam detekovat, aby zabránili označování celých jejich subnetů za spammery. Algoritmus byl navržen na základě analýzy mnohých datasetů obsahující Netflow záznamy. Tyto datasety obsahovaly validní emaily, spam a také běžný internetový provoz. Algoritmus v prvním kroku využívá domain name system blacklistů pro verifikaci spammovací stanice. Veškerá komunikace ze stanic, které se objeví na některém ze seznamů jsou okamžitě zahozeny. Filtrační kritéria algoritmu jsou aplikována pouze na stanice, které nejsou blacklisty označeny. Tato kritéria byla rozdělena na akceptační a seřaďovací. Akceptační kritérium bylo navrženo k nalezení potenciálně významných stanic. Bylo formulováno pět kritérií určených k seřazování těchto vybraných IP adresy dle pravděpodobnosti, že se jedná o spamovací stanice. Za každým kritérium stojí matematická rovnice vracející hodnotu mezi 0 a 1. Celkový součet takto vrácených hodnot se u spamovacích stanic blíží k pěti, zatímco legitimní stanice mají hodnoty znatelně nižší. Výstupem vyvinutého algoritmu je seznam potenciálních spamovacích stanic seřazených podle pravděpodobnosti, že se jedná o spamovací stanice.

National Repository of Grey Literature : 34 records found   1 - 10nextend  jump to record:
See also: similar author names
7 Oujezský, Václav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.