National Repository of Grey Literature 34 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Smart meter simulation on KYPO platform
Morawiec, Daniel ; Gerlich, Tomáš (referee) ; Lieskovan, Tomáš (advisor)
This bachelor thesis is focused on problematics of smart grids, smart meters and protocols which are used in the energy industry. The part of thesis is dedicated to DLMS protocol and COSEM specification. Cloud platform OpenStack and cyber range platforms, more specifically KYPO CRP, are subsequently described in this work. In the last part of the bachelor thesis deployment of platforms OpenStack and KYPO CRP is executed and testing scenario with common elements of energy networks is commissioned on the platform KYPO.
System for Automated Server Administration
Pavelka, Martin ; Pánek, Richard (referee) ; Krčma, Martin (advisor)
The goal of this diploma thesis is to design the user interface and implement the information system as a web application. Using the custom implemented library the system communicates with GraphQL server which manages the client data. The thesis describes possible solutions for physical servers automatization. The application provides the application interface to manage virtual servers. Automatization is possible without human interaction. Connection to the virtualization technologies is handled by web interface APIs or custom scripts running in the virtual system terminal. There is a monitoring system built over project components. The thesis also describes the continuous integration using Gitlab tools. Running the configuration task is solved using the Unix CRON system.
Virtualization platform for cyber range
Horváthová, Estera ; MU, Pavel Šeda, KPSK FI (referee) ; Lieskovan, Tomáš (advisor)
The bachelor thesis deals with the creation and operation of sandboxes for selected scenarios using the sandbox-creator tool, which is compatible with the KYPO project and uses the OpenStack platform. The theoretical section describes the technologies and tools used to create training platforms. Virtualization, containerization and cloud computing are described in the technologies and VirtualBox is described in the tools, Docker or OpenStack. The work also describes selected cyber range platforms that use these technologies. The practical part describes the compatibility of the selected platform with the KYPO project, the configuration tools used, the preparation of the experimental environment, the creation and operation of sandboxes for laboratory exercises, which are listed in the annex.
DLMS/COSEM protocol security
Tomko, Tomáš ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
The aim of this thesis is to familiarize the reader with the DLMS/COSEM protocol, which is mainly used in the power industry. The thesis introduces the concept of smart grids along with their development and basic legislation. In the following section, all the protocols used in smart energy networks are discussed with most emphasis on the mentioned DLMS/COSEM protocol and its security features and vulnerabilities. Furthermore, the thesis aims to introduce the reader to the security risks in industrial networks and the Cyber Range KYPO platform. It was important to familiarize with the capabilities that this platform offers. The next task of this thesis is to operationalize the KYPO platform in a laboratory environment with a security scenario focused on DLMS/COSEM security. The security scenario that we have managed to create involves the interception of communication and the exploitation of at least two security vulnerabilities of the DLMS/COSEM protocol. All the programs and tools that we have used to achieve the objectives of this thesis have been summarized in more detail in a separate chapter, which is dedicated to the practical part of the thesis. The thesis describes the procedure and the problems that we encountered while completing the thesis assignment. The actual virtual scenario that we prepared runs on a server at the premises of the BUT. On this server is installed Cyber Range platform KYPO in all-in-one configuration. The created security scenario using the DLMS/COSEM protocol contains two users and one attacker located in the same network, as we have defined it. We used a simple text editor to define the network configuration and defined it for the KYPO platform in YAML format, which is used to automate the data in a form that is easy for humans to read. We also used the same YAML format to define playbooks, which serve as the easiest way in Ansible to automate repetitive tasks. We used them to install packages, update existing packages, and prepare the virtual environment to exploit DLMS/COSEM protocol vulnerabilities.
Configurable Parallel Execution of System Tests within the Strimzi Project
Orsák, Maroš ; Rogalewicz, Adam (referee) ; Češka, Milan (advisor)
V poslednych rokoch mnoho spolocnosti prijalo Kubernetes a architekturu mikrosluzieb, ktoru umoznuje. Tato technologia otvorila nove moznosti nielen pre velke spolocnosti, ale aj pre malych vyvojarov softveru. Kubernetes je system riadenia kontajnerov a nedavno sa objavil novy koncept, ako efektivnejsie organizovat kontajnery - vzor operatora. Jeden takyto operator je vyvinuty a udrziavany v ramci open-source projektu s nazvom Strimzi. Projekt Strimzi spaja niekolko nastrojov, ktore sa staraju o nasadenie Apache Kafka na Kubernetes. Kedze Kafka je komplexny, horizontalne skalovatelny, distribuovany system, viete si predstavit, ze jeho instalacia je pomerne zlozita akcia. Preto jednou z najvacsich vyziev pouzivania Kubernetes je, ako efektivne a rychlo otestovat projekty ako Kafka a Strimzi a zaroven overit integraciu s inymi podobnymi produktmi. Zdroje, ktore potrebuje Kubernetes, su ovela narocnejsie v porovnani s nasadenim Kafka na virtualne stroje alebo typicke instancie kontajnerov. Aby sme tento problem vyriesili, prijali sme principy par- alelneho vykonavania a vytvorili mechanizmus v ramci systemovych testov Strimzi, ktory paralelne spusta testy iba proti jedinemu klastru Kubernetes. Okrem toho sme navrhli uplne novu architekturu pre end-to-end testy. Vylepsenia su zamerane na skalovatelnost a skratenie casu vykonavania . Prostrednictvom niekolkych experimentov tato praca ukazuje, ze navrhovany mechanizmus s roznymi konfiguraciami klastra Kubernetes (vratane pocet uzlov Kubernetes , pocet paralelne vykonavanych testov a sad ) vyrazne urychlil vykonavanie testov.
Jump server preparation and implementation for game scenarios in Cyber Arena
Komárek, Ladislav ; Šeda, Pavel (referee) ; Stodůlka, Tomáš (advisor)
Bachelor's thesis deals with the problematics of the containerization and virtualization. Thesis focuses on the OpenStack platform and the creation of a Jump server. The main purpose of the thesis is to create a Jump server with the SSH connection to the OpenStack instances. Thesis is divided into three parts - theoretical and practical, which has two parts. The analysis of virtualization and containerization possibilities for Jump server is included in the theoretical part of the paper. Description of the OpenStack platform and its functions is also contained in the theoretical part. Based on the theoretical analysis, a~Jump server was created in second and third part. After manually verifying the functionality of the Jump server, its creation was automated on the Openstack platform.
Jump server preparation and implementation for game scenarios in Cyber Arena
Komárek, Ladislav ; Šeda, Pavel (referee) ; Stodůlka, Tomáš (advisor)
Bachelor’s thesis deals with the problematics of the containerization and virtualization. Thesis focuses on the OpenStack platform and the creation of a Jump server. The main purpose of the thesis is to create a Jump server with the SSH connection to the OpenStack instances. Thesis is divided into two parts - theoretical and practical. The analysis of virtualization and containerization possibilities for Jump server is included in the theoretical part of the paper. Description of the OpenStack platform and its functions is also contained in the theoretical part. Based on the theoretical analysis, a Jump server was created in the practical part. After manually verifying the functionality of the Jump server, its creation was automated on the Openstack platform.
Automation of Cyber Arena backup and recovery processes in Ansible AWX
Fišarová, Veronika ; Lieskovan, Tomáš (referee) ; Stodůlka, Tomáš (advisor)
The master thesis focuses on the cyber range Cyber Arena and the OpenStack cloud platform, on which the Cyber Arena is built. The theoretical part of the work is dedicated to three essential technologies used in the construction of cyber ranges. These technologies are virtualization, containerization, and cloud computing. In the next part, the analysis focuses on the OpenStack platform and its essence in the Cyber Arena. This is followed by an introduction to the Ansible AWX automation platform, which acts as an intermediary between the Cyber Arena and OpenStack. The last part of the theory is dedicated to the issues of backups and recovery of OpenStack with the aim of improving the life cycle of the Cyber Arena. In the practical part, the creation of a development environment is described, consisting of the OpenStack platform and the AWX platform, in such a way as to best match the environment with the Cyber Arena. In this environment, an Ansible project is then implemented, which automates the creation of backups and subsequent recovery of the main OpenStack services. The project is implemented in such a way that the processes are transferable to new versions of OpenStack while maintaining the same deployment method.
Introduction of Cyber Arena
Stodulka, T. ; Martinasek, Z.
This article describes the current state of a private cyber range named Cyber Arena that is developed by our university. First chapter briefly explains the current problematic and describes the sequence diagram of exemplary communication between the main Cyber Arena components that are OpenStack, ansible AWX, and web-based Training application. Second chapter focuses on Arena architecture and the following chapters briefly explain all mentioned main Arena components.
Configurable Parallel Execution of System Tests within the Strimzi Project
Orsák, Maroš ; Rogalewicz, Adam (referee) ; Češka, Milan (advisor)
V poslednych rokoch mnoho spolocnosti prijalo Kubernetes a architekturu mikrosluzieb, ktoru umoznuje. Tato technologia otvorila nove moznosti nielen pre velke spolocnosti, ale aj pre malych vyvojarov softveru. Kubernetes je system riadenia kontajnerov a nedavno sa objavil novy koncept, ako efektivnejsie organizovat kontajnery - vzor operatora. Jeden takyto operator je vyvinuty a udrziavany v ramci open-source projektu s nazvom Strimzi. Projekt Strimzi spaja niekolko nastrojov, ktore sa staraju o nasadenie Apache Kafka na Kubernetes. Kedze Kafka je komplexny, horizontalne skalovatelny, distribuovany system, viete si predstavit, ze jeho instalacia je pomerne zlozita akcia. Preto jednou z najvacsich vyziev pouzivania Kubernetes je, ako efektivne a rychlo otestovat projekty ako Kafka a Strimzi a zaroven overit integraciu s inymi podobnymi produktmi. Zdroje, ktore potrebuje Kubernetes, su ovela narocnejsie v porovnani s nasadenim Kafka na virtualne stroje alebo typicke instancie kontajnerov. Aby sme tento problem vyriesili, prijali sme principy par- alelneho vykonavania a vytvorili mechanizmus v ramci systemovych testov Strimzi, ktory paralelne spusta testy iba proti jedinemu klastru Kubernetes. Okrem toho sme navrhli uplne novu architekturu pre end-to-end testy. Vylepsenia su zamerane na skalovatelnost a skratenie casu vykonavania . Prostrednictvom niekolkych experimentov tato praca ukazuje, ze navrhovany mechanizmus s roznymi konfiguraciami klastra Kubernetes (vratane pocet uzlov Kubernetes , pocet paralelne vykonavanych testov a sad ) vyrazne urychlil vykonavanie testov.

National Repository of Grey Literature : 34 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.