National Repository of Grey Literature 43 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Detection of slow-rate DDoS attacks
Sikora, Marek ; Frolka, Jakub (referee) ; Blažek, Petr (advisor)
This diploma thesis is focused on the detection and protection against Slow DoS and DDoS attacks using computer network traffic analysis. The reader is introduced to the basic issues of this specific category of sophisticated attacks, and the characteristics of several specific attacks are clarified. There is also a set of methods for detecting and protecting against these attacks. The proposed methods are used to implement custom intrusion prevention system that is deployed on the border filtering server of computer network in order to protect Web servers against attacks from the Internet. Then created system is tested in the laboratory network. Presented results of the testing show that the system is able to detect attacks Slow GET, Slow POST, Slow Read and Apache Range Header and then protect Web servers from affecting provided services.
Application for batch management of Mikrotik network devices
Kloda, Tomáš ; Frolka, Jakub (referee) ; Krajsa, Ondřej (advisor)
The goal of the thesis is to describe and develop web application for large-scale management of MikroTik network devices. The theoretical part describes RouterOS operating system. This work also describes communication through MikroTik API service. Next section includes brief description of tools, which were used for the web application development. The practical part describes development and realization of the web application. The web application is intended for Linux based operating systems.
Presentation of data from a MySQL database in Windows Presentation Foundation
Polách, Michal ; Frolka, Jakub (referee) ; Lattenberg, Ivo (advisor)
In the thesis there is demonstrated and explained the creation of WPF MVVM design pattern based applications for brisk browsing, searching and editing of data in large library database stored on a MySQL server. Quick loading of data is achieved by using data virtualization using the paging method.
BCH codes
Frolka, Jakub ; Šilhavý, Pavel (referee) ; Šedý, Jakub (advisor)
The work deals with data security using BCH codes. In the work are described BCH codes in binary and non-binary form, and their most important subclass RS codes. Furthermore, this work describes the method of decoding Peterson-Gorenstein-Zierl, Berlekamp- Massey and Euclidean algorithm. For the presentation of encoding and decoding process, the application was created in Matlab, which has two parts – Learning BCH codes and Simulation of BCH codes. Using the generated application performance of BCH codes was compared at the last part of the work.
Methodology for testing the security and performance of firewalls
Sasko, Dominik ; Člupek, Vlastimil (referee) ; Frolka, Jakub (advisor)
This bachelor thesis focuses on analysis of security and performance of firewalls and designing a methodology for testing them. Theoretical part is devoted to explaining firewalls and its' division and describing functions of next generation firewalls. Beginning of practical part focuses on testing security using penetration programs and shows results of each security test. Practical part continues with performance tests in various scenarios using Spirent Avalanche and compares the results with values stated by the manufacturer of firewall Hillstone.
Evolution of link layer loop prevention protocols
Březina, Jiří ; Frolka, Jakub (referee) ; Slavíček, Karel (advisor)
This bachelor thesis deals with the possibility of eliminating and creation loops on theData Link layer of the OSI model. At first, it was necessary to determine what arethe loops and how they are formed. Then the solution of the problem with loops waspresented as the Spanning Tree protocol, where did the protocol come from, protocoloperation, his advantages and disadvantages. In next section were discussed other vari-ants of original STP, as well as his alternatives, like for example the TRILL or the SPBprotocol. The practical part of this work is based on the theoretical and shows howSpanning Tree protocols work in practice on real devices. This part is mainly focusedto testing the speed of convergence each of protocols and also their extensions. In theend is mentioned a laboratory task, which is part of the appendices and forms the mainbenefit of the whole thesis, because future students at school subject “network architec-ture” can try to configure protocols that was mentioned above and better understandhow these protocols work.
SDN for cloud computing
Kuklovský, Adam ; Frolka, Jakub (referee) ; Slavíček, Karel (advisor)
The theme of this bachelor work is SDN technology. It consists of both practical and theoretical part. In theory section, we described the main concept of the SDN network, functioning of OpenFlow protocol, comparison of individual open source SDN controllers and real onset of SDN technology. Practical section contains procedure of individual components being installed to create topology and to forward realization of laboratory task. The laboratory work also depicts the way of creation and modification of streams in the SDN network.
Analysis and Detection of RAT Malware
Sidor, Samuel ; Frolka, Jakub (referee) ; Hajný, Jan (advisor)
Goal of this bachelor’s thesis is studying problematics of various types of malware with specific focus on RAT (Remote Access Trojan) category. This thesis will also acquaint reader with static and dynamic binary analysis and terms like reverse engineering, sandboxing, decompilation, etc. Then chosen malware families will be analysed and for these families detection rules in YARA language will be created. Except this, reader will be acquainted also with protection against RAT malware and finally data acquired from detail analysis will be evaluated.
Monitoring of servers with OS Linux
Šuba, Filip ; Frolka, Jakub (referee) ; Komosný, Dan (advisor)
This bachelor’s thesis deals with monitoring of a servers in experimental network PlanetLab. The beginning of the thesis is about PlanetLab network, terminology used within it and also projects realized in it. For generating information about node, has been created a module in Python, which has been integrated into application Plbmng. Application has been published under the MIT license on \url{www.github.com} and on Python Package Index www.pypi.org. For the application has been created manual and for the module has been created documentation.
Data transmition security with BCH codes
Frolka, Jakub ; Tejkal, Vladimír (referee) ; Němec, Karel (advisor)
The bachelor thesis Data transmission security with BCH codes deals with class of random error correction cyclic codes which are able to protect data in binary form. BCH codes operate over algebraic structures called Galois fields. Encoding of these codes is same as encoding cyclic codes and can be used cyclic shift register, but decoding is more complex and can be done with many algorithms, in this thesis are mention three: Peterson algorithm, Matrix method and Berlekamp-Massey algorithm. In this thesis are described characteristics BCH codes, their usage in communication devices and their posibility implementation. An example BCH code which is able to correct four independent errors is created. This example is used for presentation of encoding and decoding methods. In the end is described implementation of data protection codec for FGPA devices.

National Repository of Grey Literature : 43 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.