National Repository of Grey Literature 31 records found  beginprevious21 - 30next  jump to record: Search took 0.01 seconds. 
Input data for municipal waste collection routes optimization
Kulich, Marek ; Nevrlý, Vlastimír (referee) ; Pavlas, Martin (advisor)
The aim of the thesis is to describe the systems of collection of separated waste as well as collection monitoring, which includes identification of containers, sensors and data transfer. The data is then summarized and analyzed for use in the optimization software that uses advanced ARP models. The practical part is devoted to the analysis of real data sets. On selected geographical area are determined the parameters of waste, the plan of the collection routes and their evaluation. The use of local infrastructure will be then shown by cartographic representations of the routes in the maps.
Automation of MitM Attack on WiFi Networks
Vondráček, Martin ; Lichtner, Ondrej (referee) ; Pluskal, Jan (advisor)
Tato bakalářská práce se zaměřuje na výzkum v oblasti bezpečnosti bezdrátových sítí. Práce přináší studii široce využívaných síťových technologií a principů zajištění bezpečnosti bezdrátových sítí. Analyzované technologie a způsoby zabezpečení trpí slabinami, které mohou být zneužity k provedení útoku MitM . Práce zahrnuje přehled dostupných nástrojů zaměřených na využití jednotlivých slabin. Výsledkem této práce je balíček wifimitm a CLI nástroj, oba implementované v jazyce Python. Balíček poskytuje funkcionalitu pro automatizovaný útok MitM a může být použit jako součást dalšího software. Nástroj wifimitmcli je schopen úspěšného provedení plně automatizovaného útoku bez jakéhokoli zásahu útočící osoby. Tento výzkum nachází využití v oblasti automatizovaných penetračních testů a forenzního vyšetřování.
Enterprise Network IPS Security
Jakab, Vojtěch ; Babnič, Patrik (referee) ; Červenka, Vladimír (advisor)
This bachelor's thesis addresses the local area network security. The scope of this thesis is to explore the possibilities of security of these networks and introduction of some attacks which can threaten these networks. The main goal, however, is to design maximum security measures of testing network. CISCO router and Fortinet's firewall are available. Their configuration is limited by possibilities of their operating systems. By the appropriate programms the configuration of IPS configured on firewall is examined and they are used to try to evade this component. The last part of this work deals with executing particular network attacks. They are alaysed and agains successful attacks are proposed apropriate countermeasures.
System for Remote Monitoring of Electrical Values
Kvasnička, Pavel ; Kněžík, Jan (referee) ; Drahanský, Martin (advisor)
The work deals with the measurement of electrical quantities, distribution of data across the Ethernet network into the Internet and intelligent selection of the required values to be transmitted and stored on a central node. The work describes the communication protocols in scale that is necessary for implementation, discussed the requirements for computational resources and microcontroller control is proposed by flowcharts. Attached are source codes in C programming language for microcontroller and PHP scripts for storing and presenting data on Web server.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Design of IP Multicast Communication Tests
Stehura, Igor ; Matoušek, Petr (referee) ; Švéda, Miroslav (advisor)
This masters thesis is about mutlicast. There are explained 2nd and 3th layers of the ISO/OSI model multicast addressing. Routers in a network use multicast routing protocols to optimally route multicast packet through the network, this is also in this project. These multicast protocols are DVMRP, protocol PIM in his two modes, PIM Sparse Mode and PIM Dense Mode. Protocol DVMRP uses protocol IGMP, which is described as well. At practical section of this masters thesis is presented connections, by which tests was executed.
Implementation of ethernet communication inteface into FPGA chip
Skibik, Petr ; Fujcik, Lukáš (referee) ; Bohrn, Marek (advisor)
The thesis deals with the implementation of Ethernet-based network communication interface into FPGA chip. VHDL programming language is used for description of the hardware. The interface includes the implementation of link-layer Ethernet protocol and network protocols such as IPv4, ARP, ICMP and UDP. The final design allows bi-directional communication on the transport-layer level of TCP/IP model. The designed interface was implemented into Virtex5 FPGA chip on development board ML506 by Xilinx.
Intelligent lightning system
Harman, Ján ; Šír, Michal (referee) ; Bradáč, Zdeněk (advisor)
The aim of my master’s thesis is a system for control of the light intensity. It is electronic equipment which controls the intensity of the light circuits based on settings and input signals. This equipment could work on single-phase systems or multiphase systems. The equipment is controlled by the signal DMX-512 which is a standard for the control of lighting technologies. The set up of this equipment is based on a personal computer or in a limited form by a small connected display.
Attacks on active network elements
Ščepko, Richard ; Kacálek, Jan (referee) ; Polívka, Michal (advisor)
The bachelor thesis deals with the topic of the security of computer networks. The tasks of the bachelor thesis are the attacks on active network elements with the aim of the catching of data between two users. In the created structure with a stellate topology, the user stations have connect to the active element (switch). In the thesis, the individual ways of attacks and the significance of ARP proceedings to MAC addresses have describ. Several programmes have use in order to take control over the device. Due to a big amount of these active elements the source code of the programmes had to be alter. The work with the programmes ARPtool and ARPoison demanded the operational system Linux, in our case the distribution of Ubunt. The programme WinArpAttacker could be set off under the system Windows XP as well. The achieved results and the description of the practical part are discuss in detail in the summary of the thesis. The result is the catching communication with the help of the programme WireShark.
LAN communication unit resistivity against Internet origination attacks
Valach, Michal ; Mlýnek, Petr (referee) ; Mišurec, Jiří (advisor)
This thesis is focused on crypto-module RCM 3700, which is used for encrypted data transmission. Following work analyses basic network protocols and some sort of attacks in Ethernet network. The main goal of these attacks is to collect information and services about the device and to analyze transmitted data. Based on these information attacks can be done more precisely than without them. The main target of these attacks is the denial of particulary service or data abuse. Furthermore, in the diploma thesis configuration of router CISCO 2801 is applied in order to improve the LAN security. The deveploment board, which includes reset function, supplied circuit and interface for RS 232, was designed for crypto-module RCM 3700.

National Repository of Grey Literature : 31 records found   beginprevious21 - 30next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.