National Repository of Grey Literature 169 records found  beginprevious146 - 155nextend  jump to record: Search took 0.01 seconds. 
Metrics for Intrusion Detection in Network Traffic
Homoliak, Ivan ; Chmelař, Petr (referee) ; Drozd, Michal (advisor)
Publication aims to propose and apply new metrics for intrusion detection in network traffic according to analysis of existing metrics, analysis of network traffic and behavioral characteristics of known attacks. The main goal of the thesis is to propose and implement new collection of metrics which will be capable to detect zero day attacks.
Analysis of Automated Generation of Signatures Using Honeypots
Bláha, Lukáš ; Barabas, Maroš (referee) ; Drozd, Michal (advisor)
In this paper, system of automatic processing of attacks using honeypots is discussed. The first goal of the thesis is to become familiar with the issue of signatures to detect malware on the network, especially the analysis and description of existing methods for automatic generation of signatures using honeypots. The main goal is to use the acquired knowledge to the design and implementation of tool which will perform the detection of new malicious software on the network or end user's workstation.
Analysis of the Possibility of Password Break through for RAR, ZIP and 7z Formats
Prustoměrský, Milan ; Přikryl, Zdeněk (referee) ; Hruška, Tomáš (advisor)
This Thesis deals with analysis of the possiblity of password breakthrough for common compression formats and password extraction from self-extraction archives used for malicious software. Structure of compression programs, ciphers and connection between cipher and archives is described. Common and specialized attacks on archives and ciphers are described. Structure of self-extracting archives and password location is used to create extractor of passwords in self-extracting archives.
Security Icon Checking Application
Ružička, Vladimír ; Jirák, Ota (referee) ; Ruttkay, Ladislav (advisor)
This work is about icons in Windows systems and about their format. The work shows the way, how the system use them and how malware can profit on icons. It explore how icons can be compared one to another. The work contains application, which tests icons.
Network Attack Capture Using Honeypots
Mlčoch, Tomáš ; Chmelař, Petr (referee) ; Richter, Jan (advisor)
This bachelor thesis deals with honeypot tools and adapting a Linux operating system into such tool. The thesis presents general categories of malicious codes and current trends in this area. The thesis also presents an existing honeypot tool Honeyd and its features. Next there are introduced tools and techniques to monitor a Linux system, compared the selected virtualization technology and explained the process of creating a virtual Linux honeypot.
Analysis of Security Incidents from Network Traffic
Serečun, Viliam ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
Analýza bezpečnostních incidentů se stala velmi důležitým a zajímavým oborem počítačové vědy. Monitorovací nástroje a techniky pomáhají při detekci a prevenci proti tímto škodlivým aktivitám. Tento dokument opisuje počítačové útoky a jejich klasifikaci. Také jsou tady opsaný některé monitorovací nástroje jako Intrusion Detection System nebo NetFlow protokol a jeho monitorovací software. Tento dokument také opisuje konfiguraci experimentální topologie a prezentuje několik experimentů škodlivých aktivit, které byly detailně kontrolovány těmito monitorovacími nástroji.
Metrics for Buffer Overflow Attacks Detection of UDP Network Services
Šulák, Ladislav ; Ovšonka, Daniel (referee) ; Homoliak, Ivan (advisor)
This bachelor thesis deals with problematic of network attacks and their detection in network traffic. The aim is to propose such collection of metric, that will describe network traffic according to its behaviour, and will be capable of detection of Zero-Day attacks as well. Following part of this thesis is to implement a tool for metric extraction.
Malware, internet threat - types and protection
Vaňková, Aneta ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis deals the world malware and what this word means. The theoretical part describes the particular division of malware, its history and development from the 70s to the present. Other chapters include targets of hackers, why malware exists and what is the motivation of its authors. Conclusion of the theoretical part describes other threats which are on the Internet. The practical part includes two explorations. The first is dedicated to antivirus, it represents the most frequently used programs, their functionality and user interface. Test of infected file demonstrates the functionality and level of security. Final summary assists users in selecting the appropriate antivirus for their computer. The second is realized as a questionnaire which determines the awareness of the general public about the danger of malware and defence against it. The conclusion evaluate results of explorations of the practical part, it compares targets of this bachelor thesis and monitors their achievement or provides information about extension of explorations.
Analysis of the current state of cybercrime in the EU
Veselý, Dominik ; Veber, Jaromír (advisor) ; Luc, Ladislav (referee)
My bacherols thesis on the topic Analysis of the current condition of cybernetic criminality in EU focuses in its theoretical part on the definition of the term cybercrime. This term is very comprehensive, therefore the vast majority of the paper consists of the variety of forms of cybercrime. There are talking specificaly about attacks againts personal computers and software systems, attacks, that lead up to misuse of computers, datas and other information, breaking the copyright and last, but not least using the computers againts the law. An integral part of the thesis is the current legislation, investigation of a cyber offense and the defense againts cybercrime. And interesting chapter are the trends from the years 2010 to 2016, where I mention the most interesting real-life cases of cybercrime. The main aim of the practical part of the thesis is unification of recommendations and rules concerning the defense againts cybercrime based on my obtained information and experience.
Malware Analysis: Tools and Techniques
Danilov, Marcel ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis adresses present day topic of broad interest, the topic of malware. This term stands for malicous software as viruses, worms, trojans, spyware etc. Simply put a software with intent to do harm to the users of computers or mobile devices, to their steal information or gain access to their private computer systems. This thesis is divided into several chapters. First few of them are theoretical. First one describes malware in general. It defines what malware is and divides it into categories. Second chapter introduces a discipline of malware analysis. A discipline where malware, its components and behaviour is analysed in laboratory environment. This chapter contains general description of malware analysis, categories in which is this analysis divided, and rules of said analysis. Third chapter goes even further into malware analysis. It describes and identifies its indiviual techniques and tools. Last chapter is focused on practical usage of malware analysis. Theoretical knowledge of malware analysis, specifically knowledge of tools and techniques described in previous chapters is demonstrated on real, live example of malware. Thanks to demonstration of tools and techniques; funcionality, structure and life cycle of mentioned piece of malware is also being analyzed. Goal of this thesis is to bring reader closer to the topic of malware, with emphasis on area of malware analysis. This contains an explanation what an malware analysis is, what is its purpose. Next goal is to develop a summary of malware analysis basic tools and techniques. Thesis contribution is application of knowledge of techniques and tools on real malware analysis. With the help of malware analysis, this thesis demonstrates its individual tools and techniques on live example of malware. Other contributions are deriving from analysis itself. Funcionality, structure and life cycle of analysed piece of malware is also being explained.

National Repository of Grey Literature : 169 records found   beginprevious146 - 155nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.