National Repository of Grey Literature 6 records found  Search took 0.01 seconds. 
The Use of GPU to Searching for the Secured Wireless Network Keys
Tyrala, Radek ; Pospíchal, Petr (referee) ; Jaroš, Jiří (advisor)
This bachelor thesis proposes an analysis of wireless networks security with a particular focus on Wi-Fi type networks. In order to define the central elements of the thesis, let us follow a description of the main steps, namely: The characteristics of the currently applied security standards are provided together with a discussion of their weak points. A somewhat closer insight is offered into the WPA2 security standard as well as into the related breaking possibilities. A description is realized of the principle of dictionary attacks and their acceleration using parallel processing on the GPU. Another important point presented consists in a comparison of the GPU and CPU performance for an application implementing dictionary attack on wireless networks protected with the 802.11i standard.
Application generating and verifying configurations of network devices
Korček, Juraj ; Tyrala, Radek (referee) ; Jeřábek, Jan (advisor)
The aim of this master's thesis is a design and implementation of a program for finding security and operational deficiencies of network devices and afterwards, resolving them by generating corrective configuration. Due to a lack of security and misconfiguration, there are a lot of devices exposed to the risk of a security incident. Therefore, the program compares settings with various standards, recommendations, and best practices and generates a report with findings. Afterwards, deficiencies can be eliminated by automatic resolution or manually if automatic resolving is not possible. The program uses regular expressions to find problem settings in previously exported configurations. Implementation is written in Python, and YAML markup language is used too. Another output of this thesis is a checklist, which can be used for the creation of future modules for support of other network device vendors and thus extend the program.
Evolutionary Design of Collective Communications Accelerated by GPUs
Tyrala, Radek ; Dvořák, Václav (referee) ; Jaroš, Jiří (advisor)
This thesis provides an analysis of the application for evolutionary scheduling of collective communications. It proposes possible ways to accelerate the application using general purpose computing on graphics processing units (GPU). This work offers a theoretical overview of systems on a chip, collective communications scheduling and more detailed description of evolutionary algorithms. Further, the work provides a description of the GPU architecture and its memory hierarchy using the OpenCL memory model. Based on the profiling, the work defines a concept for parallel execution of the fitness function. Furthermore, an estimation of the possible level of acceleration is presented. The process of implementation is described with a closer insight into the optimization process. Another important point consists in comparison of the original CPU-based solution and the massively parallel GPU version. As the final point, the thesis proposes distribution of the computation among different devices supported by OpenCL standard. In the conclusion are discussed further advantages, constraints and possibilities of acceleration using distribution on heterogenous computing systems.
Application generating and verifying configurations of network devices
Korček, Juraj ; Tyrala, Radek (referee) ; Jeřábek, Jan (advisor)
The aim of this master's thesis is a design and implementation of a program for finding security and operational deficiencies of network devices and afterwards, resolving them by generating corrective configuration. Due to a lack of security and misconfiguration, there are a lot of devices exposed to the risk of a security incident. Therefore, the program compares settings with various standards, recommendations, and best practices and generates a report with findings. Afterwards, deficiencies can be eliminated by automatic resolution or manually if automatic resolving is not possible. The program uses regular expressions to find problem settings in previously exported configurations. Implementation is written in Python, and YAML markup language is used too. Another output of this thesis is a checklist, which can be used for the creation of future modules for support of other network device vendors and thus extend the program.
Evolutionary Design of Collective Communications Accelerated by GPUs
Tyrala, Radek ; Dvořák, Václav (referee) ; Jaroš, Jiří (advisor)
This thesis provides an analysis of the application for evolutionary scheduling of collective communications. It proposes possible ways to accelerate the application using general purpose computing on graphics processing units (GPU). This work offers a theoretical overview of systems on a chip, collective communications scheduling and more detailed description of evolutionary algorithms. Further, the work provides a description of the GPU architecture and its memory hierarchy using the OpenCL memory model. Based on the profiling, the work defines a concept for parallel execution of the fitness function. Furthermore, an estimation of the possible level of acceleration is presented. The process of implementation is described with a closer insight into the optimization process. Another important point consists in comparison of the original CPU-based solution and the massively parallel GPU version. As the final point, the thesis proposes distribution of the computation among different devices supported by OpenCL standard. In the conclusion are discussed further advantages, constraints and possibilities of acceleration using distribution on heterogenous computing systems.
The Use of GPU to Searching for the Secured Wireless Network Keys
Tyrala, Radek ; Pospíchal, Petr (referee) ; Jaroš, Jiří (advisor)
This bachelor thesis proposes an analysis of wireless networks security with a particular focus on Wi-Fi type networks. In order to define the central elements of the thesis, let us follow a description of the main steps, namely: The characteristics of the currently applied security standards are provided together with a discussion of their weak points. A somewhat closer insight is offered into the WPA2 security standard as well as into the related breaking possibilities. A description is realized of the principle of dictionary attacks and their acceleration using parallel processing on the GPU. Another important point presented consists in a comparison of the GPU and CPU performance for an application implementing dictionary attack on wireless networks protected with the 802.11i standard.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.