National Repository of Grey Literature 31 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
LAN communication unit resistivity against Internet origination attacks
Valach, Michal ; Mlýnek, Petr (referee) ; Mišurec, Jiří (advisor)
This thesis is focused on crypto-module RCM 3700, which is used for encrypted data transmission. Following work analyses basic network protocols and some sort of attacks in Ethernet network. The main goal of these attacks is to collect information and services about the device and to analyze transmitted data. Based on these information attacks can be done more precisely than without them. The main target of these attacks is the denial of particulary service or data abuse. Furthermore, in the diploma thesis configuration of router CISCO 2801 is applied in order to improve the LAN security. The deveploment board, which includes reset function, supplied circuit and interface for RS 232, was designed for crypto-module RCM 3700.
Penetration testing of ANC
Dušek, Jakub ; Jakub,, Přibyl (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the evaluation of a security solution that was recently deployed by a British company renting office space. This validation system is based on a database of MAC addresses, a database of clients and active filtering of connected devices. The first part explains the concepts of computer network, VLAN and basic concepts needed to understand the function of dynamic assignment of VLAN and IP addresses. The second part is devoted to measurements based on hypotheses, according to which measures are proposed in the last part to solve these security problems.
System for Remote Monitoring of Electrical Values
Kvasnička, Pavel ; Kněžík, Jan (referee) ; Drahanský, Martin (advisor)
The work deals with the measurement of electrical quantities, distribution of data across the Ethernet network into the Internet and intelligent selection of the required values to be transmitted and stored on a central node. The work describes the communication protocols in scale that is necessary for implementation, discussed the requirements for computational resources and microcontroller control is proposed by flowcharts. Attached are source codes in C programming language for microcontroller and PHP scripts for storing and presenting data on Web server.
Laboratory exercises explaining network technologies and protocols
Coufal, Tomáš ; Dvořák, Jan (referee) ; Langhammer, Lukáš (advisor)
Diploma thesis deals with creation of laboratory exercises in ns-3 environment. Each one of three exercises consists of theoretical introduction and instructions to carry out the simulation. The first exercise´s topic is routing protocol BGP. The second exercise is focused on transport protocols TCP, UDP, SCTP. In the last exercise, the basic network devices and topologies are simulated. The ARP and RIPv2 protocols are simulated as well.
Intelligent lightning system
Harman, Ján ; Šír, Michal (referee) ; Bradáč, Zdeněk (advisor)
The aim of my master’s thesis is a system for control of the light intensity. It is electronic equipment which controls the intensity of the light circuits based on settings and input signals. This equipment could work on single-phase systems or multiphase systems. The equipment is controlled by the signal DMX-512 which is a standard for the control of lighting technologies. The set up of this equipment is based on a personal computer or in a limited form by a small connected display.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Modeling the Basic Principles of Communication Technologies
Ruiner, Michal ; Koláčková, Aneta (referee) ; Hošek, Jiří (advisor)
This bachelor thesis deals with the design of 5 laboratory tutorials where the basic principles of communication technologies are modelled. A reader is apprised with the available software first for the simulation of network technologies. The simulators and emulators are compared. Packet Tracer, a software developed by the Cisco company, is chosen for the lab exercises and Wireshark, a network protocol analyzer, for the traffic capturing on a local PC. Then the reference model ISO/OSI is described for the basic introduction to the principle of network communication. The Chapter 3 explains the basic problematics of network paths searching, the routing table contents and division according to the type of routing and routing protocols groups. In the next chapter, particular communication protocols used in the labs are analyzed in detail. Final part briefly describes the implementation of all laboratory exercises. Laboratory tutorials are provided in the appendices.
Penetration testing of ANC
Dušek, Jakub ; Jakub,, Přibyl (referee) ; Sedlák, Petr (advisor)
This diploma thesis deals with the evaluation of a security solution that was recently deployed by a British company renting office space. This validation system is based on a database of MAC addresses, a database of clients and active filtering of connected devices. The first part explains the concepts of computer network, VLAN and basic concepts needed to understand the function of dynamic assignment of VLAN and IP addresses. The second part is devoted to measurements based on hypotheses, according to which measures are proposed in the last part to solve these security problems.
Link layer LAN network security
Sedláček, Jiří ; Grenar, David (referee) ; Slavíček, Karel (advisor)
The bachelor‘s thesis is about security concerning local area networks of the data link layer. The goal of the thesis is to characterize basic functioning of the ISO/OSI reference model as well as describing how the data link layer works to understand the topic, specify the possibilities of attacking the data link layer (for example rogue DHCP server, ARP spoofing, CAM table overflow, attacking the spanning tree protocol and others) and possible security measures to protect against the attacks. The purpose of the thesis is also a suggestion for assembling an experimental network relating to the topic of the thesis. Theoretical part determines the most important protocols of the data link layer, methods of abusing them and protection of those protocols. The practical part contains a brief description of the attacks, used utilities for accomplishing the attacks, a network topology, execution of the attacks, detection and protection against the attacks as well as briefly summarizing the results. The thesis also sums up some of the possible recommended configuration to repel the attacks and suggesting how to behave in a cyber environment. For the purpose of simulating the attacks, Kali Linux and Windows 10 are the operating systems that were used the most in this thesis.
Laboratory exercises explaining network technologies and protocols
Coufal, Tomáš ; Dvořák, Jan (referee) ; Langhammer, Lukáš (advisor)
Diploma thesis deals with creation of laboratory exercises in ns-3 environment. Each one of three exercises consists of theoretical introduction and instructions to carry out the simulation. The first exercise´s topic is routing protocol BGP. The second exercise is focused on transport protocols TCP, UDP, SCTP. In the last exercise, the basic network devices and topologies are simulated. The ARP and RIPv2 protocols are simulated as well.

National Repository of Grey Literature : 31 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.