National Repository of Grey Literature 26 records found  previous7 - 16next  jump to record: Search took 0.02 seconds. 
Network-Based Application Recognition
Štourač, Jan ; Barabas, Maroš (referee) ; Malinka, Kamil (advisor)
This thesis introduces readers various methods that are currently used for detection of network-based applications. Further part deals with selection of appropriate detection method and implementation of proof-of-concept script, including testing its reliability and accuracy. Chosen detection algorithm is based on statistics data from network flows of tested network communication. Due to its final solution does not depend on whether communication is encrypted or not. Next part contains several possible variants of how to integrate proposed solution in the current architecture of the existing product Kernun UTM --- which is firewall produced by Trusted Network Solutions a.s. company. Most suitable variant is chosen and described furthermore in more details. Finally there is also mentioned plan for further developement and possible ways how to improve final solution.
Detection of Dynamic Network Applications
Juránek, Michal ; Kaštil, Jan (referee) ; Tobola, Jiří (advisor)
This thesis describes methods of detection of simple voice communications of encrypted VoIP calls between two Skype clients. The elements of network and its communication principles are described. Three approaches to classification are analyzed. The first approach performs the classification by content of network packets using Pearson's chi2 test of goodness of fit, the second approach by characteristics of network flows by means of naive Bayesian classification. The third approach describes ways of detecting signaling messages. The detector application is implemented on the basis of chosen methods.
Audio steganography and IP telephony
Hrinčárová, Monika ; Drápal, Aleš (advisor) ; Kozlík, Andrew (referee)
Steganography is a technique which hides secret information. In this work, we will hide a secret information in the packets which are produced during a Skype call. Skype is one of the best known and the most widely used VoIP applications. We will propose, describe and implement a steganography method by which we will send the secret message during the Skype call. For embedding the message into packets and extracting them, we will use steganographic method called matrix encoding. To avoid packet loss, we will increase the robustness of this method by error-correcting and self-synchronising codes. As error-correcting codes, we will use the binary Hamming (7, 4) -codes and for the self-synchronising, we will use T-codes. 1
Analysis of voice over IP protocols
Boháček, Milan ; El Bashir, Robert (advisor) ; Hojsík, Michal (referee)
In the presented work we focus on both implementation and protocol of the voice over IP application Skype. We analyse several versions of Skype clients and deduce inner workings of the Skype protocol. We present details about the cryptographic primitives used by the Skype clients and their impact on the security of the communication. We emphasize several places of suspicious leaks of the internal states of random generators and deduce rules for the detection of the Skype traffic on the firewall. In the end, we mention a simple enhancement of the current Skype clients that, in practice, can detect an ongoing eavesdropping.
Network-Based Application Recognition
Štourač, Jan ; Barabas, Maroš (referee) ; Malinka, Kamil (advisor)
This thesis introduces readers various methods that are currently used for detection of network-based applications. Further part deals with selection of appropriate detection method and implementation of proof-of-concept script, including testing its reliability and accuracy. Chosen detection algorithm is based on statistics data from network flows of tested network communication. Due to its final solution does not depend on whether communication is encrypted or not. Next part contains several possible variants of how to integrate proposed solution in the current architecture of the existing product Kernun UTM --- which is firewall produced by Trusted Network Solutions a.s. company. Most suitable variant is chosen and described furthermore in more details. Finally there is also mentioned plan for further developement and possible ways how to improve final solution.
Audio steganography and IP telephony
Hrinčárová, Monika ; Drápal, Aleš (advisor) ; Kozlík, Andrew (referee)
Steganography is a technique which hides secret information. In this work, we will hide a secret information in the packets which are produced during a Skype call. Skype is one of the best known and the most widely used VoIP applications. We will propose, describe and implement a steganography method by which we will send the secret message during the Skype call. For embedding the message into packets and extracting them, we will use steganographic method called matrix encoding. To avoid packet loss, we will increase the robustness of this method by error-correcting and self-synchronising codes. As error-correcting codes, we will use the binary Hamming (7, 4) -codes and for the self-synchronising, we will use T-codes. 1
Audio steganography and IP telephony
Hrinčárová, Monika ; Drápal, Aleš (advisor) ; Kozlík, Andrew (referee)
Steganography is a technique which hides secret information. In this work, we will hide a secret information in the packets which are produced during a Skype call. Skype is one of the best known and the most widely used VoIP applications. We will propose, describe and implement a steganography method by which we will send the secret message during the Skype call. For embedding the message into packets and extracting them, we will use steganographic method called matrix encoding. To avoid packet loss, we will increase the robustness of this method by error-correcting and self-synchronising codes. As error-correcting codes, we will use the binary Hamming (7, 4) -codes and for the self-synchronising, we will use T-codes. 1
The transfer and protection of information in mobile telecommunications
Pacák, Pavel ; Ivánek, Jiří (advisor) ; Pavlásková, Eliška (referee)
Charles University in Prague Faculty of Arts Institute of Information Studies and Librarianship Study program: Information Studies and Librarianship Field of study: Information Studies and Librarianship Pavel Pacák The transfer and protection of information in mobile telecommunications Bachelor thesis abstract The work focuses on the transfer and protection of information in mobile telecommunications. First, historical development of each technology used is introduced. Also different forms of thread which user can face in every day use of his cell phone are listed. In the end few possible solutions of security policy are presented. Possible ways of communication with higher level of security which can be used with your cell phone are the conclussion.
Analysis of voice over IP protocols
Boháček, Milan ; El Bashir, Robert (advisor) ; Hojsík, Michal (referee)
In the presented work we focus on both implementation and protocol of the voice over IP application Skype. We analyse several versions of Skype clients and deduce inner workings of the Skype protocol. We present details about the cryptographic primitives used by the Skype clients and their impact on the security of the communication. We emphasize several places of suspicious leaks of the internal states of random generators and deduce rules for the detection of the Skype traffic on the firewall. In the end, we mention a simple enhancement of the current Skype clients that, in practice, can detect an ongoing eavesdropping.
Proposal for Efficient Comunication Change in a Company.
Prudil, Radek ; Věčorková, Dagmar (referee) ; Konečná, Zdeňka (advisor)
I am focused on importance of bussines communication and taking advances of electronical communication, which are improving and accelerating of dataway.

National Repository of Grey Literature : 26 records found   previous7 - 16next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.