Národní úložiště šedé literatury Nalezeno 4 záznamů.  Hledání trvalo 0.01 vteřin. 
Detection of fake access points
Lővinger, Norbert ; Gerlich, Tomáš (oponent) ; Martinásek, Zdeněk (vedoucí práce)
The risk of cyber-attacks in the local networks is constantly increasing due to the underestimation of their security. In wireless LANs, an attacker does not require physical access to the network. These types of attacks are almost impossible to spot. The typical signature of fake access point is the same configuration as the legitimate access point, which increases the effectivness of the attack. Detection systems are used to detect these cyber-attacks in local networks. Detection systems offer advanced methods for real-time analysis of captured network communication. In this bachelor thesis two open detection systems – Suricata and Kismet are analysed and compared. Custom implementation of detection system is based on functionality analysis of these two detection systems. Custom implemetation is programmed in Python at an affordable Raspberry Pi 4. The success of detecting cyber-attacks using fake access point was tested in 4 different scenarios at the experimental testbed.
Data and Privacy Protection in Smart Transport Services
Lővinger, Norbert ; Dzurenda, Petr (oponent) ; Malina, Lukáš (vedoucí práce)
Smart Transportation Services are innovative means of user transportation. They offer numerous advantages including improved user comfort, enhanced safety, increased efficiency or better sustainability. A variety of sensors and units are collecting enormous volume of data including users’ private information. This could result in serious consequences, if the data will not be preserved. Whether in services such as Smart Parking Services or Car Sharing Services, which are part of Smart Services, it is necessary to implement tools and techniques to provide protection for these data. In this thesis, Privacy Enhancing Technologies, which could protect data against multiple cyberattacks when implemented correctly, are further elaborated and analyzed in more detail. With the use of these techniques of data privacy protection, several phases of the car sharing process are described, in which these tools have been implemented as proof-of-concept in the Python programming language. Overall, 5 phases have been developed and evaluated, from which the conclusions are made. Privacy Enhancing Technologies are suitable for Car Sharing Services when they are applied in an appropriate way.
Detection Of Fake Access Points
Lővinger, Norbert
Wireless networks have become a common part of our everyday life. This paper describes the cyber-attacks that employ fake access points. These types of attacks are dangerous for users due open communication medium and automatic connection of end stations. In order to prevent attacks, we can implement Wireless Intrusion Detection System to monitor a wireless network. In this article, we analyze Kismet system in experimental testbed that prevents fake access points attacks.
Detection of fake access points
Lővinger, Norbert ; Gerlich, Tomáš (oponent) ; Martinásek, Zdeněk (vedoucí práce)
The risk of cyber-attacks in the local networks is constantly increasing due to the underestimation of their security. In wireless LANs, an attacker does not require physical access to the network. These types of attacks are almost impossible to spot. The typical signature of fake access point is the same configuration as the legitimate access point, which increases the effectivness of the attack. Detection systems are used to detect these cyber-attacks in local networks. Detection systems offer advanced methods for real-time analysis of captured network communication. In this bachelor thesis two open detection systems – Suricata and Kismet are analysed and compared. Custom implementation of detection system is based on functionality analysis of these two detection systems. Custom implemetation is programmed in Python at an affordable Raspberry Pi 4. The success of detecting cyber-attacks using fake access point was tested in 4 different scenarios at the experimental testbed.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.