National Repository of Grey Literature 30 records found  previous11 - 20next  jump to record: Search took 0.01 seconds. 
Benchmarking Performance of WiFi Networks
Hrabčak, Miroslav ; Kašpárek, Tomáš (referee) ; Čejka, Rudolf (advisor)
This bachelor project discusses throughput problems of the WIFI networks. Project analyzes typical problems and factors, that affect decrease of their capacity and concentrates on typical problems of their signal path. Describes techniques of monitoring, detection and debugging causes, which affects decrease of network throughput. The project also includes the experimental testing and analyzes of standards 802.11b/g and 802.11n on the labs WiFi network.
Cryptocurrency Node Monitoring
Zaujec, Andrej ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
Cielom tejto bakalarskej prace je monitorovanie uzlov v Bitcoin peer-to-peer sieti a odhadnutie velkosti siete v danom case. Monitorovanie uzlov zahrnna zbieranie metadat o danych uzloch a tiez aj vytvaranie zaznamov cinnosti o tom ako dlho boli jednotlive uzly sucastou siete. Navrhnute riesenie vyuziva Bitcoin Core klienta bez dalsich modifikacii na zistenie vsetkych informacii o sieti a uzloch. Implementovana platforma umoznuje zbieranie metadat (verzia protokolu, verzia agenta, ponukane sluzby, IP adresa, cislo portu) o najdenych uzloch. Taktiez je schopna ziskavat informacie o tom, ktore uzly sa nachadzaju v sieti v danom case. Vytvorene API ponuka zozbierane data z platformy. Kazda komponenta platformy je zapuzdrena v Docker kontajneroch co umoznuje jednoduche nasadenie celej platformy v priebehu niekolkych minut.
Remote access to control systems
Kozovský, Matúš ; Beran,, Jan (referee) ; Hynčica, Ondřej (advisor)
This work deals with the possibility of remote programming of industrial devices like PLCs or HMIs and other devices of similar aim, as well as the possibility of remote monitoring of their status. The work also includes an overview of usable tools for this purpose, possible settings and rough overview of possibilities of available HW. There is also a basic proposal of developed system for programming and monitoring, with all essential parts. This work also includes a description of the implementation of the necessary programs subsequently testing them. Furthermore, the measurement results evaluated the whole solution was tested on real examples.
Employing Network Intelligence for Deanonymization of Cryptocurrency Users
Horňák, Peter ; VUT), Marcel Marek (FIT (referee) ; Grégr, Matěj (referee) ; Jeřábek, Vladimír (referee) ; Veselý, Vladimír (advisor)
Cieľom tejto práce je analyzovať peer-to-peer sieť Ethereum a uzly pripojené k sieti. Pre zber potrebných údajov navrhujeme monitorovací systém, ktorý dokáže prehľadávať sieť objavovaním nových peerov a pravidelne o nich zbierať informácie. Implementujeme verziu 4 a verziu 5 Ethereum discovery protokolu, ktorý slúži na komunikáciu s nájdenými uzlami siete. Platforma je postavená na architektúre mikroslužieb pre lepšiu škálovateľnosť a modularitu, pričom je zapuzdrená v Docker kontajneroch pre jednoduchšie nasadenie. Monitorovací systém zhromažďuje a ukladá základné informácie, ako sú adresy IP, čísla portov a asymetrické verejné kľúče, do databázy časových radov. Na overenie výsledkov sa potom výsledky porovnávajú s verejne dostupnými zdrojmi.
Communication with external devices in laboratory
Vachna, Michal ; Kodyš, Peter (advisor) ; Lokoč, Jakub (referee)
In the present work the goal is to map present circumstances of computer infrastructure in the physical laboratory, examine the demands and problems at work in the laboratory such as data backup, remote control, disk space sharing, access organization of processes to external devices, version control of measuring application development, running processes on remote hosts. Assess existing solutions, consider the possibility of improvements and propose new solutions appropriate to the needs of the laboratory. As far as possible, in regard to the current operations of the laboratory, implement solutions to selected problems and requirements. The work has to be methodical material and guide for further development of the laboratory in the coming years.
Profiling of Network Entities to Improve Situational Awareness
Bolf, René ; Tisovčík, Peter (referee) ; Žádník, Martin (advisor)
Having a good situational awareness is an important part of computer security. Knowing what is connected to the network, where it is located, and who is communicating can help make better and faster decisions when security incidents occur. This thesis is focusing on the profiling of network entities at the device level. More specifically, it focuses on the passive identification of operating systems. Every packet transferred in the network carries a specific information in its packet header that reflects the initial settings of a host's operating system. The set of these information is called the "fingerprint" of an operating system. In the thesis, there is described an implementation of a machine learning classifier using the decision tree method, which uses features from TCP and IP headers. The classifier was evaluated on a data set containing data from real network traffic and has achieved accuracy of 96 % when classifying into 9 classes of operating systems.
Detection of Mobile Apps in Network Traffic Using JA3 Fingerprinting
Vavro, Ján ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
In recent years, mobile network communication became more secure. The reason is encapsulation with TLS protocol, that encrypts transmitted data. User security was increased, but on the other hand it limits network monitoring possibilities, because the data are encrypted. This thesis researches possibilities of monitoring mobile applications in network traffic using JA3 and JA3S fingerprints. The aim is to implement tools for automated creation of fingerprints database and consecutive detection.
Supervision and Control System for a Hotel Implemented by IoT Means
Hockicko, Matej ; Smrčka, Aleš (referee) ; Janoušek, Vladimír (advisor)
This work solves the design and prototype implementation of supervision and control system for a hotel implemented by IoT means. The solution is based on ESP microcontrollers, which control the connected sensors and actuators. ESP devices are futher grouped and connected to central point within range. Using this point, MQTT communication is futher transmitted to the cloud. The cloud runs the IoT Core service, which allows to control and store the status of devices. There is also a Node-RED developmnet tool, in which a graphical interface was created for this system. The result of this work allows remote monitoring and control of the hotel using sensors and actuators connected to this network. 
Cryptocurrency Node Monitoring
Zaujec, Andrej ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
Cielom tejto bakalarskej prace je monitorovanie uzlov v Bitcoin peer-to-peer sieti a odhadnutie velkosti siete v danom case. Monitorovanie uzlov zahrnna zbieranie metadat o danych uzloch a tiez aj vytvaranie zaznamov cinnosti o tom ako dlho boli jednotlive uzly sucastou siete. Navrhnute riesenie vyuziva Bitcoin Core klienta bez dalsich modifikacii na zistenie vsetkych informacii o sieti a uzloch. Implementovana platforma umoznuje zbieranie metadat (verzia protokolu, verzia agenta, ponukane sluzby, IP adresa, cislo portu) o najdenych uzloch. Taktiez je schopna ziskavat informacie o tom, ktore uzly sa nachadzaju v sieti v danom case. Vytvorene API ponuka zozbierane data z platformy. Kazda komponenta platformy je zapuzdrena v Docker kontajneroch co umoznuje jednoduche nasadenie celej platformy v priebehu niekolkych minut.
Secure Remote Computer Management System
Heško, Peter ; Hranický, Radek (referee) ; Polčák, Libor (advisor)
Deployment and management of remote systems poses several problems. Their administration and monitoring is much faster and more cost-effective when done remotely than when physical access to the system is required. Software that allows this is in many cases not freely available or has limited functionality. In this work I deal with the analysis of available solutions and then design and implementation of an application that combines all the required features. The result is software that provides secure access to and monitoring of remote computers running Ubuntu 16.04.

National Repository of Grey Literature : 30 records found   previous11 - 20next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.