National Repository of Grey Literature 29 records found  previous11 - 20next  jump to record: Search took 0.00 seconds. 
BitTorrent Seedbox Detection
Grnáč, Martin ; Jeřábek, Kamil (referee) ; Polčák, Libor (advisor)
Bachelor's thesis is focused on issues with monitoring and detection of seedboxes in BitTorrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architecture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this knowledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools.
Detecting P2P Networks Using NetFlow
Starigazda, Michal ; Čejka, Rudolf (referee) ; Matoušek, Petr (advisor)
This thesis addresses the problem of identifying P2P networks within NetFlow traces. There are presented different methods for identifying P2P networks. Their advantages and disadvantages are discussed in compare to a method using NetFlow technology. This method is based on traffic characteristics and  behaviour of specific application. The theoretical section presents characteristic features of P2P systems in general. A system based on these and more application-specific features is proposed to detect selected P2P application -- BitTorrent. Finally, a NfSen plugin for detecting BitTorrent protocol within network traffic (using NFDUMP tools)  is implemented. Detection targets users of BitTorrent protocol using NetFlow traces without inspecting the payload of the packets.
Network Protection Using NetFlow Data
Čegan, Jakub ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This thesis deals with the using of NetFlow data for computer network protection. First are described some types of network security threats. After study of these threats and many experiments were designed detection rules for them. New detection form were designed too. It is working with two step detection of threats.
Analyzing BitTorrent Behavior
Horáček, Pavel ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
This thesis is focused on analysis of the BitTorrent network, from theoretical view point by analyzing protocols used by this network, as well as practical view by inspecting individual clients implementing these protocols. The aim of this thesis was to develop a monitoring method used to detect communication used by this network. Due to possible illegal data sharing as well as unwanted usage of the network bandwidth, it's important for network administrators to detect this kind of communication. Another aim of this thesis was to familiarize the reader with real communication used by clients that implement protocols used in the BitTorrent network. This thesis contains descriptions of individual phases used in three selected clients, as well as three experiments performed with one of these clients.
BitTorrent Seedbox Detection
Grnáč, Martin ; Jeřábek, Kamil (referee) ; Polčák, Libor (advisor)
Bachelor's thesis is focused on issues with monitoring and detection of seedboxes in BitTorrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architecture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this knowledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools.
BitTorrent Traffic Detection
Florek, Daniel ; Hranický, Radek (referee) ; Polčák, Libor (advisor)
This thesis deals with a topic of BitTorrent protocol detection within a pcap file. I managed to design and implement a tool based on deep packet inspection which can detect IP adresses and their ports that were involved in a BitTorrent communication. This detection is extendable with flow analysis which may lead into more results but at the same time in a higher chance of false positives. Therefore this kind of detection is just optional.
BitTorrent Tracker-Less Peer Monitoring
Vaško, Martin ; Pluskal, Jan (referee) ; Polčák, Libor (advisor)
The goal of this thesis is to effectively monitor peers within BitTorrent network. This research is based on distributed hash tables, specifically MLDHT. In the last decade, focus has also been on efficiency of monitoring within network. Existing algorithms do not provide actual efficiency therefore it is recommended to introduce an estimate accuracy using Bernoulli process. The goal of monitoring is to ensure the highest success of peer search. The work focuses on designing and implementing Bernoulli process model. The measurements show that, the in-depth search (LIFO) is better in the short run. The work focuses on the efficiency of time monitoring, estimation of the peer search error and efficiency using the modeled Bernoulli process. Result of this work is the recommended monitoring time with high efficiency.
Torrent Peer Monitoring
Bezděk, David ; Pluskal, Jan (referee) ; Polčák, Libor (advisor)
This master's thesis deals with analysis and implementation of methods for BitTorrent monitoring focusing on the Mainline DHT protocol. The aim of the thesis was to create a system, that will be looking for BitTorrent peers that participe in the illegal file distribution. Another task of the system was to collect and analyze data for counting size of the BitTorrent network. That was achieved by taking over of existing method. The system was designed and implemented as a module for monitoring of cybernetic crime. It also defines an interface for storing and sharing data, that provides data evaluation, easy data manipulation and serves for possible future extensions.
Analysis of Sharing Networks
Blažek, Libor ; Mašek, Pavel (referee) ; Horváth, Tomáš (advisor)
The aim of the thesis is the design and implementation of the protocol in OPNET Modeler. In this work will be developed all the elements have been used no default settings. In the first chapters, making simulation are defined packets. Another chapter consists of a block diagram of workstations, which are assigned to function blocks. The central process is created by the process model, also for the router. The individual elements are inserted into a variety of elements and subsequently used in the simulation. Connection is a new service that has been defined separately. One of the simulations will be created on a smaller scale and the other on a global scale with more features.
Analysis of Sharing Networks
Blažek, Libor ; Mašek, Pavel (referee) ; Horváth, Tomáš (advisor)
The aim of the thesis is the design and implementation of the protocol in OPNET Modeler. In this work will be developed all the elements have been used no default settings. In the first chapters, making simulation are defined packets. Another chapter consists of a block diagram of workstations, which are assigned to function blocks. The central process is created by the process model, also for the router. The individual elements are inserted into a variety of elements and subsequently used in the simulation. Connection is a new service that has been defined separately. One of the simulations will be created on a smaller scale and the other on a global scale with more features.

National Repository of Grey Literature : 29 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.