Národní úložiště šedé literatury Nalezeno 3 záznamů.  Hledání trvalo 0.01 vteřin. 
Distributed system for suppression of DoS attacks
Beneš, Dalibor ; Žádník, Martin (oponent) ; Šišmiš, Lukáš (vedoucí práce)
Protection against distributed denial of service (DDoS) attacks is one of the key areas of network security. One of the forms of defence is to use the DCPro DDoS Protector device developed by the CESNET association. The CESNET association also utilizes network monitoring and traffic analysis systems IPFIXcol2 and NEMEA, as well as the network monitoring protocol sFlow. The aim of this thesis was to propose and realize the integration of those systems, so that an effective distributed system for the mitigation of DDoS attacks could be created. During the work on this task, special focus was given to the effective utilization of existing solutions, reusability and the option for a future expansion of the distributed architecture.
DDoS Mitigation Configuration Tool
Beneš, Dalibor ; Vrána, Roman (oponent) ; Šišmiš, Lukáš (vedoucí práce)
Distributed Denial of Service (DDoS) attacks are a common security concern for computer networks and the services using them. One of the forms of defence is to use the DCPro DDoS Protector device developed by the CESNET association. The DDoS Protector actively mitigates ongoing attacks aimed at the protected network. The mitigation device is configurable using so-called mitigation rules. The goal of this work was to design and implement a command-line configuration tool for the DDoS Protector. A part of this work involved the creation of a reusable configuration API in Python. The configuration tool was implemented in Python using the API. It has been tested and successfully deployed as a part of the DCPro DDoS Protector package.
DDoS Mitigation Configuration Tool
Beneš, Dalibor ; Vrána, Roman (oponent) ; Šišmiš, Lukáš (vedoucí práce)
Distributed Denial of Service (DDoS) attacks are a common security concern for computer networks and the services using them. One of the forms of defence is to use the DCPro DDoS Protector device developed by the CESNET association. The DDoS Protector actively mitigates ongoing attacks aimed at the protected network. The mitigation device is configurable using so-called mitigation rules. The goal of this work was to design and implement a command-line configuration tool for the DDoS Protector. A part of this work involved the creation of a reusable configuration API in Python. The configuration tool was implemented in Python using the API. It has been tested and successfully deployed as a part of the DCPro DDoS Protector package.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.