National Repository of Grey Literature 29 records found  beginprevious20 - 29  jump to record: Search took 0.00 seconds. 
Analysis of Sharing Networks
Blažek, Libor ; Mašek, Pavel (referee) ; Horváth, Tomáš (advisor)
The aim of the thesis is the design and implementation of the protocol in OPNET Modeler. In this work will be developed all the elements have been used no default settings. In the first chapters, making simulation are defined packets. Another chapter consists of a block diagram of workstations, which are assigned to function blocks. The central process is created by the process model, also for the router. The individual elements are inserted into a variety of elements and subsequently used in the simulation. Connection is a new service that has been defined separately. One of the simulations will be created on a smaller scale and the other on a global scale with more features.
Detection of Peer-to-Peer Communication
Letý, Pavel ; Kováčik, Michal (referee) ; Bartoš, Václav (advisor)
This thesis is focused on issues in detection of P2P network from NetFlow. In the theoretical part of this work are introduced actual techniques in detection of this communication in network. There are presented their advantages and disadvantages too. The biggest attention is focused on the classification scheme of Mr. Bashir which deals with a detection of a protocol BitTorrent and a Skype application from Netflow. Following this scheme is designed a detection module for a modular system of a traffic analysis Nemea, developed by Cesnet organization. In the practical part of this work is introduced the implementation of this module. There are also presented results of experiments with real data.
Detection of Dynamic Network Applications
Oroš, Petr ; Kaštil, Jan (referee) ; Tobola, Jiří (advisor)
This work deals with the detection of dynamic network applications. It describes a general method for detection of any application layer protocol and automatically searches for the detection rules. The practical part deals with general detection protocol to the automatically generated designs. A special section is devoted detect bittorrent protocol.
Detecting P2P Networks Using NetFlow
Starigazda, Michal ; Čejka, Rudolf (referee) ; Matoušek, Petr (advisor)
This thesis addresses the problem of identifying P2P networks within NetFlow traces. There are presented different methods for identifying P2P networks. Their advantages and disadvantages are discussed in compare to a method using NetFlow technology. This method is based on traffic characteristics and  behaviour of specific application. The theoretical section presents characteristic features of P2P systems in general. A system based on these and more application-specific features is proposed to detect selected P2P application -- BitTorrent. Finally, a NfSen plugin for detecting BitTorrent protocol within network traffic (using NFDUMP tools)  is implemented. Detection targets users of BitTorrent protocol using NetFlow traces without inspecting the payload of the packets.
Network Protection Using NetFlow Data
Čegan, Jakub ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This thesis deals with the using of NetFlow data for computer network protection. First are described some types of network security threats. After study of these threats and many experiments were designed detection rules for them. New detection form were designed too. It is working with two step detection of threats.
Identifying P2P Users Using Traffic Analysis
Jalsovszky, Zoltán ; Tobola, Jiří (referee) ; Žádník, Martin (advisor)
Bachelor's thesis deals with methods of detection of P2P users like BitTorrent, DC++, Gnutella and others. An application was created, which is able to detect these users using multiple ways. This method combines analysis of packet payload and analysis of network traffic and flows, so more exact detection is possible. Application is written in C++ programming language, and is built on open-source tool L7-filter.
Robot for P2P Network Scanning
Holub, Michal ; Schäfer, Jiří (referee) ; Janoušek, Vladimír (advisor)
Bachelor's thesis describes the types of P2P networks, their most common mutations and protocols, and design and implementation of the system for browsing P2P networks. The purpose of the system for browsing P2P network is to search for files with unrecognized malicious code. This system is capable to search files on P2P network based on given set of keywords, download them to local disk and to determine whether they are executable or not.
Detection of Dynamic Network Applications
Burián, Pavel ; Drahošová, Michaela (referee) ; Kaštil, Jan (advisor)
This thesis deals with detection of dynamic network applications. It describes some of the existing protocols and methods of their identification from IP flow and packet contents. It constitues a design of a detection system based on the automatic creation of regular expressions and describes its implementation. It presents the created regular expressions for BitTorrent and eDonkey protocol. It compares their quality with the solution of L7-filter.
Detection and Analysis of P2P Network BitTorrent Sync
Kutlák, Martin ; Polčák, Libor (referee) ; Matoušek, Petr (advisor)
Bachelor's thesis is focused on issues with detection of the P2P network BitTorrent Sync in network traffic. In the theoretical part of this work is introduced architecture of the P2P networks, BitTorrent Sync protocol and possible methods for P2P network detection. On the base of this knowledge is designed tool for detection of BitTorrent Sync network traffic. In the practical part of this thesis is presented implementation of the whole monitoring system. In the end of practical part are presented results of conducted tests with monitoring system.
Podpora automatizovaného multiplatformního sdílení a synchronizace souborů
Košíček, Michal
KOŠÍČEK, M. Support for automated cross-platform sharing and files synchronization. Brno, 2013. This thesis examines the issue of sharing and synchronizing files between different types of devices. It deals with the possible tools and technologies for the realization of automated sharing. It performs analysis of applications to share data and on the basis of this knowledge determines the appropriate procedures and techniques for the implementation application for data sharing.

National Repository of Grey Literature : 29 records found   beginprevious20 - 29  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.