National Repository of Grey Literature 29,554 records found  beginprevious29541 - 29550next  jump to record: Search took 1.80 seconds. 

IMS aplication creation
Nagy, Ľuboš ; Novotný, Vít (referee) ; Mácha, Tomáš (advisor)
This thesis describes basic principles of IP Multimedia Subsystem, known as the IMS, and shows the possibility for design applications using IMS. Firstly, a generic architecture IMS as layer model divided into four logic layer with definition the interfaces and the main entities is described. The IMS is based on SIP and IP protocols. Then is the architecture of SIP with the main entities explained. Structure of packet, request and response method in the part of SIP is also described. After that, three network services, namely presence services, instant messaging services and push over cellular services are presented. For each services the figuration of their architecture and the basic definition of their main entities are shown. Moreover, the graphical diagrams of SIP signalization are depicted for these services. In the next chapter, the self implementation of services was designed, namely presence services and services for speech transmission with next secondary function as sending email with registration information of user. The project was designed as client - server application in the development studio SDS Ericsson 4.1. The client application was simulated as java application and also as an application for Symbian emulator. The process of client registration was performed with the help of ICP platform. Finally, the diagram of analysis communication client - server is displayed with the captured packets explanation by the help of network analyzer WireShark. The video files, which were specially created for this thesis showing presentations for presence services and sending email. The most important results are summarized in the end of this article.

Security of wireless computer networks IEEE 802.11
Škodák, Jaroslav ; Jeřábek, Jan (referee) ; Koutný, Martin (advisor)
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.

Data capture for creation of DTM
Kobližek, Tomáš ; Vondrák,, Jiří (referee) ; Kalvoda, Petr (advisor)
The subject of this thesis was to collect data for digital terrain model in the western part of the valley Kombutského stream between the villages Kotvrdovice and Jedovnice. It was built a network of auxiliary measuring points of which were measured specified territory by using tacheometry method. Then were calculated coordinates and height of measurement points. It was tested accuracy of control-points. From the measured data was drawn thematical map with scale 1 : 500. The final data were serve for puposes of subject GE14 Field Training II.

Data capture for creation of DTM
Ondráček, Daniel ; Šváb,, Tomáš (referee) ; Kalvoda, Petr (advisor)
This thesis deals with the the capture of data for digital terrain model. The specified location was measured in cooperation with the student Tomáš Kobližek. Surveying networks were auxiliary survey points that were measured by GNSS. Measurements were connected to the system Uniform Trigonometric Cadastral Network and Baltic height system after the settlement. Detailed points were measured by tacheometry and comply with third accuracy class and have been tested by CSN 01 3410. The main result of this thesis is special map at scale of 1:500.

Webmail Traffic Reconstruction
Slivka, Miroslav ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
Webmail applications are very popular these days. Besides typical usage, thanks to ciphered communication, they can be used for malicious activity like confidential data loss. This thesis discusses webmail events detection based on common webmail signatures in captured network traffic. Also there will be discussed SSL/TLS interception and decryption for further data analysis. The modules in this thesis are designed and implemented for Netfox.Framework forensics analysis tool. The Netfox project is developed at FIT BUT under security research project SEC6NET.

Reconstruction of Captured Communication on iOS Platform
Letavay, Viliam ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
These days our mobile devices along with social networks are giving us an opportunity to be in touch with our friends and family at any time. Howerver they could be also used for criminal activity. This thesis therefore deals with reconstruction of communication of the iOS applications Google Hangouts, Twitter and Facebook Messenger for use of forensics analysis with the main focus on an abillity to recover their chat communication. Later it also deals with the implementation of Netfox Detective tool extensions, allowing the reconstruction of this communication.

Mathematical modelling of HTTP network traffic
Miklica, Jan ; Vajsar, Pavel (referee) ; Molnár, Karol (advisor)
The aim of this thesis is to capture network tradic on the HTTP protocol. Then from the captured tradic to analyze parameters using selected models and compare them with the achal properties of real network traffic. This bachelor´s thesis describes the HTTP protokol and mathematical modeling, and simulation models developed for it. The document described the capture of data tradic on HTTP using Wireshark. In the next part are performed elemental analysis of selected models. In conclusion the analysis results of the selected models are described.

Trans-European energy networks - selected issues
Kočí, Luboš ; Němcová, Ingeborg (advisor) ; Vošta, Milan (referee)
This thesis deals with Trans-European energy networks (TEN-E), a program of the EU which has recently undergone significant changes. The main objective of this thesis is to capture the impact of activities of The EU in the framework of TEN-E and energy policy on the status and development of Europe's energy infrastructure and apply the findings to energy networks of the Czech Republic. The thesis is divided into four chapters. The first one deals with network industries and their economic specifics. The second chapter deals with energy policy of the EU and development of the internal energy market. The third chapter focuses on TEN-E program and final chapter brings the issues of Czech energy networks.

Network Attack Capture Using Honeyd Tool
Bláha, Lukáš ; Chmelař, Petr (referee) ; Drozd, Michal (advisor)
The bachelor thesis deals with Honeyd tool and its effectivity in capturing network attacks. At the beginning, there is a description of honeypots and its utilization in network security. An important part of the thesis is constituted by a practical implementation of network attacks and their analysis. The main goal is to create an extension for Honeyd tool which can emulate file sharing in operation systems Microsoft Windows XP, especially its free accessible part called null session. As results there are tests evaluating the level of detection of computer attacks by the created tool.

Monitoring of network attacks with honeypot systems
Krula, Jiří ; Vasilenko, Alexandr (advisor) ; Rostislav , Rostislav (referee)
This thesis focuses on the topic of honeypots technology and their use for network attacks monitoring. It theoretically analyzes the honeypots and their variants honeynet and honeytoken. The practical part describes how to deploy two open source solutions of honeypot, Kippo and Dionaea. Kippo honeypot can be classified, despite its limitations, as a high interactive honeypot. This solution emulates the SSH service and it is primarily intended for the detection and capture of brute force attacks on the service. Dionaea is a honeypot designed primarily for capturing malware. It aims to capture malware in the trap using the vulnerabilities of offered and exposed network services with the aim to obtain a copy of the malware for subsequent analysis. Data obtained from the real deployment of the proposed solutions are presented and measures in relation to the SIEM instruments are proposed as well as improved security of the protected network.