National Repository of Grey Literature 72 records found  beginprevious52 - 61nextend  jump to record: Search took 0.01 seconds. 
Neural Networks for Network Anomaly Detection
Matisko, Maroš ; Martinásek, Zdeněk (referee) ; Blažek, Petr (advisor)
This bachelor thesis is focused on creating a system to mitigate computer network attacks. One of the most common groups of attacks is Distributed Denial of Service (DDoS) attacks, against which this system should protect internal network. In the theoretical part of the thesis are described DDoS attacks, existing systems for their mitigations, neural networks principle and their use. Practical part consists of choosing communication parameters, constructing a neural network with use of these parameters, implementation of this neural network in real–time attack mitigation system and a result of testing of this system.
Advanced network security methods against attacks
Kusy, Filip ; Kubánková, Anna (referee) ; Krajsa, Ondřej (advisor)
This student work focuses on security against network attacks. It focus on network attacks and ways to prevent them. Subsequently, it deals with the Snort variant of the IPS/IDS system. It deal with the connection between Mikrotik and the Snort Linux server
Intrusion detection and prevention systems at border devices
Bína, Zdenko ; Frolka, Jakub (referee) ; Blažek, Petr (advisor)
This bachelor thesis is focusing on testing the endurance of networks against DDoS attacks. The theoretical part consists of an introduction to the problematics of these attacks and current trends regarding DDoS attacks, focusing on IDS and IPS systems, and Spirent Avalanche 3100b machine, designed to generate network traffic. The practical part is about the configuration of the software web server Apache, which runs on Linux Debian OS, and it is testing this system for endurance against five DDoS attacks. The server is put through attacks before and after application of systems NIDS and NIPS, using Snort and Suricata software. The goal of the thesis is comparing NIDS and NIPS servers based on the results of testing.
Laboratory task demonstrates Intrusion Protection System
Bronda, Samuel ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
This bachelor thesis is divided into two parts. The theoretical part describes security systems, various types of attacks and details of systems to protect computer networks. The practical part focuses on the workplace, where will operate IDS / IPS system Snort and Suricata, the necessary adjustments and simulation of attacks. The bachelor thesis also includes putting the system into real terms.
Intrusion detection and prevention systems
Pitschmann, Andrej ; Blažek, Petr (referee) ; Martinásek, Zdeněk (advisor)
The terminal essay aims to introduce the issue of IDS and IPS and their incorporation into a network. An analysis of pros and cons of used open source IDS/IPS systems will be created together with their inclusion into the network. In addition, we focus on the issue of NIDS that will be located in the network’s path of communication among end users. Following the appropriate setting of NIDS of a client we will be receiving and analyzing all communication directed from the attacker with the help of Snort and Suricata programs. The activities will be conducted thanks to a downloaded package and in the case of a need we will use our own rules that will guide the NIDS system of data control. Regarding the testing phase, we have used the SYN flood attack on server via program Hping3 in OS Linus Kali, which is a distribution created with an aim to conduct a penetration tests and in addition it includes several useful programs. The NIDS will help us to gradually control captured packets.
Behavioral Analysis of Network Traffic and (D)DoS Attack Detection
Chapčák, David ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
The semestral thesis deals with the analysis of the modern open-source NIDPS tools for monitoring and analyzing the network traffic. The work rates these instruments in terms of their network location and functions. Also refers about more detailed analysis of detecting and alerting mechanisms. Further analyzes the possibilities of detection of anomalies, especially in terms of statistical analysis and shows the basics of other approaches, such as approaches based on data mining and machine learning. The last section presents specific open-source tools, deals with comparison of their activities and the proposal allowing monitoring and traffic analysis, classification, detection of anomalies and (D)DoS attacks.
Detection of denial of service attacks
Gerlich, Tomáš ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
Master's thesis is focused on intrusion detection for denied of service attacks. These distributed DoS attacks are threat for all users on the Internet, so there is deployment of intrusion detection and intrusion prevention systems against these attacks. The theoretical part describes the DoS attacks and its variants used most frequently. It also mentioned variants for detecting DoS attacks. There is also described, which tools are used to detect DDoS attacks most frequently. The practical part deals with the deployment of software tools for detecting DDoS attacks, and create traffic to test detection abilities of these tools.
Security inspection of network traffic
Kult, Viktor ; Havránek, Martin (advisor) ; Ladislav, Ladislav (referee)
Thesis topic concerns the issue of information security in corporate environments. Literature search includes information obtained by studying articles and literature in the field of information security. Resources were selected with a focus on the security risks, security technologies and legislative regulation. Attention is focused on technology that supports monitoring of communication flows in the data network. Overview of traffic operating a data network provides important information for the prevention or investigation of security incidents. Monitoring also serves as a source of information for the planning of the network infrastructure. It can detect faults or insufficient transmission capacity. The practical part is dedicated to implementation of the monitoring system in the real corporate networks. Part of the experience is the analysis of the network structure and choice of appropriate tools for actual implementation. When selecting tools, you can use the scoring method of multicriterial analysis options. The integration of the monitoring system is also the configuration of active network elements. Subsequent analysis of network traffic provides information about the most active users, most used applications or on the sources and targets of data transmitted. It provides a source of valuable information that can be used in case of failure on the network or security incident. The conclusion is a summary of the results and workflow.
Intrusion detection system for Mikrotik-based network
Zvařič, Filip ; Frolka, Jakub (referee) ; Krajsa, Ondřej (advisor)
This bachelor's thesis focuses on network attacks and ways to defend against them. It discusses the most common attacks that can be encountered and their impact on computer networks and end user. Finally, it includes steps for implementing a protection system in collaboration with the preventive software Snort and RouterOS operating system. This system's toughness is tested and results are processed.
Proposal of Computer Network Security in a Small Software Company
Špičák, Jan ; Kastner, Miloš (referee) ; Ondrák, Viktor (advisor)
The bachelor thesis is concerned with the analysis of the current conditions of computer network security and its optimalization in a small software company. The thesis presents solutions how to improve the security of the computer network. The solutions are supposed to prevent the computer network from the Internet attacks and thus avoid losing important data and information.

National Repository of Grey Literature : 72 records found   beginprevious52 - 61nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.