National Repository of Grey Literature 95 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
SIP security
Tůma, Petr ; Šilhavý, Pavel (referee) ; Ježek, Jiří (advisor)
This bachelor thesis focuses on security issues of the SIP signalling protocol. The goal was to carry out three attacks and design defences against them. The chosen attacks were a flood attack, a modified message attack and a man-in-the-middle attack. The attacks were conducted against the Asterisk PBX and the results show that some attacks were able to prevent communication between the PBX and clients. Defensive measures are described for each attack in the mitigation subchapter.
Design and implementation of an IMS network with extended functions using Open IMS Core.
Šulgan, Peter ; Šilhavý, Pavel (referee) ; Ježek, Jiří (advisor)
The bachelor thesis focuses on the architecture of the IP Multimedia Subsystem, its main elements and extension functions. It also deals with the implementation of the IMS network in the simulation environment Open IMS Core, which is also briefly described. The first chapter describes the IMS architecture divided into layers and it also defines the basic elements such as CSCF and HSS. In addition, it briefly characterizes the most commonly used communication protocols and the structure of identity in IMS. The second chapter deals with the open source environment Open IMS Core, it briefly defines the individual parts and contains a list of configuration files. The third chapter introduces the additional services offered by the IMS architecture. It characterizes their basic functions and their way of working. The fourth chapter focuses on the practical part of the bachelor thesis. It describes configuration procedure of the Open IMS Core and testing of its functionality. It is divided into four sections according to the individual configuration steps.
Implementation of application that demonstrates mobile application vulnerabilities
Šrůtková, Karolína ; Šilhavý, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This master thesis is focused on an implementation of application for Android operating system that demonstrates mobile application vulnerabilities. Theoretical part contains security of mobile applications and its current state including a description of the biggest security risks and vulnerabilities. In addition, general development of mobile applications for Android is mentioned. In a practical part of the thesis a custom design of the application is described including vulnerabilities analysis, design of basic application blocks and selection of suitable tools for implementation. The section describing the implementation of the application describes the preparation of the environment, the structure of the created application and especially its implementation. The last part contains an example of implemented application vulnerabilities and also the result of its testing.
G.mgfast transmission technology
Rada, Dominik ; Ježek, Jiří (referee) ; Šilhavý, Pavel (advisor)
The master thesis deals with G.fast and G.mgfast transmission technologies, including their parameters. The work deals with the principle of vector DMT modulation and the possibility of time duplex TDD and full-duplex FDX in two-way communication used in these technologies. The following is a description of the line using the KHM model, which is suitable for simulations in the transmission band using G.fast and G.mgfast technologies. Subsequently, the disturbing effects of crosstalk at the near end of NEXT and the far end of FEXT and their elimination with these technologies are discussing. Part of the work explains supporting calculations to determine the SNR and bit allocation to calculate the baud rate. The work describes the methods of compensation of crosstalk FEXT and NEXT, which affect the resulting baud rate. The work also includes an application for simulation of transmission speed as a function of distance for G.fast and G.mgfast technologies, allowing changing input parameters and adjusting the transmission bandwidth based on G.9700 and G.9701 standards. Also, in work, an application is created to display the compensation of the influence of the transmitted signal crosstalk FEXT and NEXT, which allow the import of measured crosstalk between individual participants. The issue of influencing crosstalk for accurate measurements in the laboratory is also discussing. An application in the MATLAB environment is creating to display the measured characteristics.
Collection of meteorological data using the MQTT protocol
Filippov, Andrii ; Šilhavý, Pavel (referee) ; Lattenberg, Ivo (advisor)
Cílem této práce je sběr meteorologických dat pomocí protokolu MQTT ze dvouvytvořených meteorologických stanic založených na mikrokontrolérech typu ESP32 a ESP8266. Práce pojednává o textovému formátu JSON, jeho struktuře podle řady kritérií a jeho dalšímu využití při přenosu dat z meteorologické stanice. Další fází je studium a srovnání hlavních charakteristik mikrokontrolérů ESP32 a ESP8266. Na základě zadání byly pak vytvořeny autonomní meteorologické stanice. Dále byly porovnány existující MQTTservery pro sběr, ukládání a přenos meteorologických dat mezi klientem a serverem. Závěrečnou fází práce byla tvorba programu v jazyce C#, který generuje grafy na základě hodnot aktuální teploty a relativní vlhkosti přijatých ze serveru MQTT. Výzkumný projekt se skládá ze dvou autonomních meteorologických stanic, ze kterých jsou přenášena meteorologická data v reálném čase na server MQTT prostřednictvím bezdrátového připojení. Server pak dále poskytuje data pro aplikaci v počítači uživatele, kde program kreslí v reálném čase grafy na základě dat přijatých z MQTT serveru.
DLMS concentrator simulator
Buš, Ondřej ; Šilhavý, Pavel (referee) ; Lieskovan, Tomáš (advisor)
This work is focused on a field of smart metering and data concentrators. The first part of this paper describes the DLMS/COSEM specification. The first section contains DLMS protocol specification, the process of communication between devices and services that allows data communication. COSEM classes and objects can be found in the second section. These objects are used to access a specific data stored inside smart meters. Lastly, there is an section that is focused on OBIS objects which are used for addressing. In the second part, the concentrator's basic functionalities are described. These functionalities include device management and configuration file storage. The last part then focuses on a web server. The web server allows a user to manage the concentrator by adding, editing and removing connected smart meters.
Open Source IMS implementations
Ježek, Jiří ; Číž, Radim (referee) ; Šilhavý, Pavel (advisor)
The diploma thesis deals with open source implementations of IMS technology. The theoretical part describes the functioning of IMS and its architecture, including the protocols used, the process of registration and connection establishment, as well as potential security threats to IMS systems. Two open source IMS projects were selected, Open IMS Core and Project Clearwater, on which the work is focused. In its next part, the diploma thesis deals with the description of selected open source IMS projects, this part also includes a description of the implemented security of both projects and a detailed procedure of system installation with any necessary configuration. In its practical part, the diploma thesis focused on performance testing of selected projects using the Abacus 5000 hardware tester. First, initialization tests were performed, which verified the possibility of communication between the tester and the tested projects. Subsequently, it was possible to perform performance testing of selected projects. In performance testing, emphasis is placed on system stability, performance in the area of call set-up speed and response time of SIP messages and speed of user registration in the network, at different load levels. The systems have been tested for both call set-up and user registration. Part of the testing is also the implementation of the flood DoS inviteflood attack and the system's response to the increasing intensity of the attack. The last chapter is devoted to the comparison of selected IMS projects, where the test results are clearly presented. This chapter is partly based on publicly available information, such as the technical documentation of individual projects and possibly publicly available mailing lists. Part of the diploma thesis is also a laboratory task in which the student tries to work with Open IMS Core. The laboratory task focuses on the process of creating a user and his registration in the IMS network, establishing a call between individual users and internal routing in IMS networks. The task focuses mainly on signaling processes within the implemented tasks.
VDSL2 vplus and G.fast technologies and their testing
Vehera, Vladyslav ; Číž, Radim (referee) ; Šilhavý, Pavel (advisor)
This semester work focuses on the basic characteristics of the VDSl2 and G.fast technologies that allow to transfer data using old telephone lines. The theoretical part of the work describes the main parameters of all currently known profiles for VDSL and G.fast. There is also a description of DMT modulation, used in both types of DSL connections. Moreover, the theoretical part presents a vectoring technique that helps to increase the data transfer rate using a twisted pair. The work also provides methods for testing networks using the recommendations of RFC 2455, ITU-T Y.1564 and RFC6349. The practical part of this thesis contains all conducted tests and measuring, which were described in detail. The results od these tests were presented in the format of graphs and tables.
Automatic Detection of Cryptography Used in Code
Mička, Richard ; Šilhavý, Pavel (referee) ; Hajný, Jan (advisor)
This thesis covers the topic of automatic detection of cryptography used in application code, which currently requires a lot of manual effort to analyze for a given unknown program sample. In this thesis, a possibility of implementing an automated tool for analysing the usage of Microsoft CryptoAPI cryptographic library by analysed programs is researched. This library is distributed with Microsoft Windows and can be misused by an attacker to cause significant harm to a victim. By recognizing cryptographic operations used and by presenting the summary of their use, it is in certain situations possible to distinguish malicious programs just based on the presented analysis summary. Main objective of this thesis was creation of such automatic analyser module integrated into Cuckoo sandbox. Along with the design proposal of such analyser, this thesis includes CryptoAPI library and Cuckoo sandbox functionality exploration and description. Proposed automatic analyser was successfully created, deployed and tested in production environment and the achieved results were discussed.
Graphical user interface for Network Assessment Tool
Šrůtková, Karolína ; Šilhavý, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This thesis is focused on design and implementation of graphical user interface for Network Assessment Tool which is used for measuring and evaluation of network parameters in order correct functionality of Skype for Business application. Theoretical part of the thesis describes chosen network parameters and network testing. Then this part covers information about Skype for Business and Network Assessment Tool. Practical part consists of the design and developing graphical user interface. Finally, the developed application is tested.

National Repository of Grey Literature : 95 records found   1 - 10nextend  jump to record:
See also: similar author names
2 Šilhavý, Petr
Interested in being notified about new results for this query?
Subscribe to the RSS feed.