National Repository of Grey Literature 29,554 records found  beginprevious29535 - 29544next  jump to record: Search took 1.82 seconds. 

Analysis and Demonstration of Selected Network Attacks
Černeková, Alžbeta ; Zelený, Jan (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis contains theory of network attacks, attacks description and defense against them. Beside that this thesis includes technics used by attacker when preparing an attack. As a result, there were four demonstrational videos made, capturing ARP cache poisoning attac, TCP SYN Flood Attack, DHCP Spoofing attack and RIP redirection attack.

Automatic Transport Protocol Detection in Captured Communication
Lazárek, Zbyněk ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
The aim of this bachelor thesis is to create a library in C#, which will be able to automatically detect transport protocols in a captured network traffic. This library can recognize a transport protocol in tunnel traffic without the knowledge of tunneling protocol. The~thesis describes the unique signatures of TCP / IP protocols on which the automatic detection is based. Furthermore, it is described how the detection works. The conclusion is~subjected to automatic detection tests, which are designed to review its performance and efficiency.

Automatization of MitM Attack for SSL/TLS Decryption
Marušic, Marek ; Lichtner, Ondrej (referee) ; Pluskal, Jan (advisor)
SSL/TLS are protocols used to encrypt network traffic. They provide secure communication between clients and servers. The communication can be intercepted with MitM attack. This paper is aimed to describe the  automatization of MitM attack and  demonstrate its results. The  automatization is done by MitM probe and a python script, which configures the probe and starts the attack. The script is easy to use, without great effort. It takes care of configuration of the probe, then it starts the tools used for network traffic capture and at last it starts MitM tools to perform the attack. During the MitM attack, users are warned by client applications about insecure connection. The client applications either provide an option to establish a connection anyway or it forbids clients to establish the connection with insecure parameters. In this paper, the users can learn what are SSL/TLS protocols and about a possibility how to intercept the network traffic encrypted by these protocols.

Mathematical modelling of WWW network traffic
Papšík, Lukáš ; Růčka, Lukáš (referee) ; Molnár, Karol (advisor)
The aim of this thesis was to practically use theoretical knowledge of the semestral work. The scope of work was to analyze long term operation of an emphasis on obtaining the necessary parameters for selected models. Network analyzer was used for two programs that have received the required parameters. How do I edit the captured data that can be used in programs described in the work. In this work I focus on two models, the Stochastic model and Markov-modulated Poisson’s. Each of these models requires different parameters. These were obtained from the captured traffic. Furthermore, the modeled traffic compared with the real. It was found that none of the models is not sufficiently capable of accurately modeling the behavior of the network, if it comes to cluster of packets. However, if traffic shown linear character models were able to model this traffic.

Security system using mobile networks
Svoboda, Adam ; Wieser, Vladimír (referee) ; Hanus, Stanislav (advisor)
This master´s thesis deals with design of security system, which transmits captured video using mobile systems. There are chosen representatives of cameras and motion sensors that could be used in the construction. The thesis also deals with the theoretical design of the transmission system, which consists of a camera, a motion sensor, an USB modem and a microprocessor, that manages all operations. There is also a proposed block diagram of a communication method. The security system is designed and tested in various conditions.

Mathematical Analysis of Captured Network Traffic
Soós, Tibor ; Koutný, Martin (referee) ; Hošek, Jiří (advisor)
This thesis is considering with network traffic analysis and prediction of real networks default services. The first part of this paper is containing the theoretical explanation of the mathematical model’s needs. These models are mainly used as a part of simulation algorithms which are describing the processes of network traffic simulations. The second part is describing the process how to apply the models to mathematically analyze the captured traffic. The capture is including all kind of packet types which can appear on the real network. At the last part of the thesis is described the detailed design of the prediction algorithm’s which are developed in programing language of Matlab® Mathworks®.

IMS aplication creation
Nagy, Ľuboš ; Novotný, Vít (referee) ; Mácha, Tomáš (advisor)
This thesis describes basic principles of IP Multimedia Subsystem, known as the IMS, and shows the possibility for design applications using IMS. Firstly, a generic architecture IMS as layer model divided into four logic layer with definition the interfaces and the main entities is described. The IMS is based on SIP and IP protocols. Then is the architecture of SIP with the main entities explained. Structure of packet, request and response method in the part of SIP is also described. After that, three network services, namely presence services, instant messaging services and push over cellular services are presented. For each services the figuration of their architecture and the basic definition of their main entities are shown. Moreover, the graphical diagrams of SIP signalization are depicted for these services. In the next chapter, the self implementation of services was designed, namely presence services and services for speech transmission with next secondary function as sending email with registration information of user. The project was designed as client - server application in the development studio SDS Ericsson 4.1. The client application was simulated as java application and also as an application for Symbian emulator. The process of client registration was performed with the help of ICP platform. Finally, the diagram of analysis communication client - server is displayed with the captured packets explanation by the help of network analyzer WireShark. The video files, which were specially created for this thesis showing presentations for presence services and sending email. The most important results are summarized in the end of this article.

Security of wireless computer networks IEEE 802.11
Škodák, Jaroslav ; Jeřábek, Jan (referee) ; Koutný, Martin (advisor)
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.

Data capture for creation of DTM
Kobližek, Tomáš ; Vondrák,, Jiří (referee) ; Kalvoda, Petr (advisor)
The subject of this thesis was to collect data for digital terrain model in the western part of the valley Kombutského stream between the villages Kotvrdovice and Jedovnice. It was built a network of auxiliary measuring points of which were measured specified territory by using tacheometry method. Then were calculated coordinates and height of measurement points. It was tested accuracy of control-points. From the measured data was drawn thematical map with scale 1 : 500. The final data were serve for puposes of subject GE14 Field Training II.

Data capture for creation of DTM
Ondráček, Daniel ; Šváb,, Tomáš (referee) ; Kalvoda, Petr (advisor)
This thesis deals with the the capture of data for digital terrain model. The specified location was measured in cooperation with the student Tomáš Kobližek. Surveying networks were auxiliary survey points that were measured by GNSS. Measurements were connected to the system Uniform Trigonometric Cadastral Network and Baltic height system after the settlement. Detailed points were measured by tacheometry and comply with third accuracy class and have been tested by CSN 01 3410. The main result of this thesis is special map at scale of 1:500.