Národní úložiště šedé literatury Nalezeno 4 záznamů.  Hledání trvalo 0.00 vteřin. 
Detection of Cyber Attacks in Local Networks
Sasák, Libor ; Gerlich, Tomáš (oponent) ; Malina, Lukáš (vedoucí práce)
This bachelor thesis focuses on the detection of attacks in the local network and the use of open source tools for this purpose. The first chapter deals with cyber attacks and also describes some of them. The second chapter focuses primarily on intrusion detection systems in general and also mentions and describes some open source systems. The third chapter briefly deals with the general division of attack detection methods. The fourth chapter introduces and describes the selected tool Suricata, which is also tested in the fifth chapter in the detection of various attacks, during which the behaviour and output of this tool are tracked. In the sixth chapter, the ARPwatch tool is presented and tested for ARP spoofing attack detection. The seventh and eighth chapters deal with the design and successful implementation of an attack detection system that provides output in the form of logs indicating malicious or suspicious traffic on the network. The ninth chapter deals with the design and implementation of the application with a graphical user interface, which clearly presents the mentioned logs and also allows other operations, including the essential control of the detection tools.
System for network device detection and recognition of used protocols
Sasák, Libor ; Fujdiak, Radek (oponent) ; Holasová, Eva (vedoucí práce)
This master's thesis deals with the recognition of used protocols in a network using machine learning and the creation of a system for this purpose. It focuses on the most widely used industrial and common application protocols and describes selected well-proven machine learning techniques for their recognition. However, priority is given to artificial neural networks. It briefly describes databases and the specific implementation SQLite3 used in the final system implementation. A virtual environment for simulating selected Modbus/TCP, DNP3, HTTPS and FTP protocols is also created and described. Part of the thesis is devoted to the collection, analysis and processing of the data needed to recognize the protocols. Furthermore, it covers the creation and testing of machine learning models for the given protocols. Last but not least, the thesis is devoted to the design of the recognition system and its implementation with a graphical user interface. It also includes testing and evaluation of its advantages and limitations.
System for network device detection and recognition of used protocols
Sasák, Libor ; Fujdiak, Radek (oponent) ; Holasová, Eva (vedoucí práce)
This master's thesis deals with the recognition of used protocols in a network using machine learning and the creation of a system for this purpose. It focuses on the most widely used industrial and common application protocols and describes selected well-proven machine learning techniques for their recognition. However, priority is given to artificial neural networks. It briefly describes databases and the specific implementation SQLite3 used in the final system implementation. A virtual environment for simulating selected Modbus/TCP, DNP3, HTTPS and FTP protocols is also created and described. Part of the thesis is devoted to the collection, analysis and processing of the data needed to recognize the protocols. Furthermore, it covers the creation and testing of machine learning models for the given protocols. Last but not least, the thesis is devoted to the design of the recognition system and its implementation with a graphical user interface. It also includes testing and evaluation of its advantages and limitations.
Detection of Cyber Attacks in Local Networks
Sasák, Libor ; Gerlich, Tomáš (oponent) ; Malina, Lukáš (vedoucí práce)
This bachelor thesis focuses on the detection of attacks in the local network and the use of open source tools for this purpose. The first chapter deals with cyber attacks and also describes some of them. The second chapter focuses primarily on intrusion detection systems in general and also mentions and describes some open source systems. The third chapter briefly deals with the general division of attack detection methods. The fourth chapter introduces and describes the selected tool Suricata, which is also tested in the fifth chapter in the detection of various attacks, during which the behaviour and output of this tool are tracked. In the sixth chapter, the ARPwatch tool is presented and tested for ARP spoofing attack detection. The seventh and eighth chapters deal with the design and successful implementation of an attack detection system that provides output in the form of logs indicating malicious or suspicious traffic on the network. The ninth chapter deals with the design and implementation of the application with a graphical user interface, which clearly presents the mentioned logs and also allows other operations, including the essential control of the detection tools.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.