National Repository of Grey Literature 232 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Application-based Anomalous Communication Detection
Dostál, Michal ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis deals with the analysis, design and implementation of a system for detecting anomalous network communication activities using high-level characteristics. The thesis contains a theoretical basis for the detection of anomalies using countries, autonomous systems and applications that are used to communicate. It also contains information about the techniques and methods of machine learning needed for implementation. The practical part describes the design, use and implementation of individual technologies. The result of this work is detection based on multiple machine learning methods, mostly classification.
Scalable 1-out-of-k Blockchain-Based Voting with Privacy of Votes
Stančíková, Ivana ; Očenášek, Pavel (referee) ; Homoliak, Ivan (advisor)
The main subject of this work is the assessment of electronic voting systems with regard to their required and achieved properties. The goal of this project is designing an electronic voting protocol that satisfies the requirements for privacy protection while also being scalable and fault-tolerant. Existing protocols are examined and compared according to their properties. The design proposed in this work uses smart contracts on blockchain and combines the approaches from the examined solutions. Scalability is achieved by dividing the process of voting between several smart contracts. Each of these contracts carries out the voting in small scale with only a subset of voters and the partial results are then aggregated. The problem of finding a suitable platform for implementation of the proposed protocol is also addressed in this work.
Log Analysis and Hardware Utilization
Kuchyňka, Jiří ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
The goal of this thesis is to design and implement a system for long-term monitoring of the state of Linux systems located in a production environment. The thesis focuses mainly on situation in which the system does not have the ability to send the collected data for analysis over the network, so data collection must be completely automatic and data must be transferred from monitored systems to a central system for collection, analysis and visualization. A substantial part of the work is devoted to the design and implementation of a web application used to export data from monitored systems to the transmission medium and import them from it to the system for data collection. The resulting solution aims to simplify the collection of data from systems, previously performed directly by system administrators, so that it can be performed by anyone who can physically approach the monitored system and thus reduce the costs associated with monitoring these remote systems.
Analysis of Malicious Encrypted Network Traffic
Dubec, Branislav ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis deals with the analysis of malicious encrypted network traffic using artificial intelligence methods. A solution is to create a system for detecting security intrusions using detection analysis methods. Theoretical part describes methods of anomaly detection, and explains the concept of artificial neural network. In the practical part, it experiments with various anomaly detection techniques in order to obtain the best results.
Anomaly Detection Based on SNMP Communication
Štěpán, Daniel ; Drga, Jozef (referee) ; Očenášek, Pavel (advisor)
The aim of this thesis was to develop a practically applicable set of methods for classification and detection of anomalies in computer network environments. I have created extensions to the network monitoring system in the form of two modules for an open source network monitoring tool based on machine learning. The created modules can learn the characteristics of normal network traffic. The first module, based on the algorithm Random Forest Classifier, detects and is able to classify several known denial-of-service attacks. The second module, based on the algorithm Local Outlier Factor, detects anomalous levels of network traffic. Attacks that the first module is able to classify are the following: TCP SYN flood, UDP flood and ICMP flood. Moreover, it was trained to detect the SSH Bruteforce attacks and the slow and fragmented Slowloris attack. While working on this thesis, I tested the device using the methods mentioned above. The experiments showed that the classification-based module is able to detect known attacks, except for the Slowloris attack, whose characteristics are not very different from normal traffic. The second module sucessfully detects higher levels of network traffic, but does not perform the classification.
Automated Testing of Smart Cards
Yadlouski, Pavel ; Očenášek, Pavel (referee) ; Homoliak, Ivan (advisor)
Tato bakalářská práce se zabývá automatizovaným testováním podpory Smart Karet v RHEL. Problém manuálního testování je vyřešen vytvořením nové testovací knihovny. Tato knihovna je zodpovědná za konfiguraci testovacího prostředí a poskytuje testerovi rozhraní pro automatizovanou manipulaci s tímto prostředím. Jako výsledek jsme vytvořili univerzální knihovnu pro testování podpory smart karet. Primárním cílem je implementace samotné knihovny, pak následující převod existujících manuálních testů do kódu za pomoci teto knihovny a zprovozněni těchto testů ve vnitřní pipelině Red Hat.
HTTP Application Anomaly Detection
Rádsetoulal, Vlastimil ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
The goal of this work is to introduce anomaly detection principles and review its possibilities, as one of the intrusion detection methods in HTTP traffic. This work contains theoretical background crucial for performing an anomaly detection on HTTP traffic, and for utilising neural networks in achieving this goal. The work proposes tailored design of an anomaly detection model for concrete web server implementation, describes its implementation and evaluates the results. The result of this work is successful initial experiment, of modeling normal behavior of HTTP traffic and creation of the mechanism, capable of detection of anomalies within future traffic.
Camera Recording Management System
Šulc, Ondřej ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
The aim of this bachelor thesis is to create a network security system focusing on compatibility with the widest possible group of IP cameras from various manufacturers and support for remote access to records even from places outside the local network. This problem is solved using two closely cooperating applications. The first application runs on a device in the local network (in our case miniPC Raspberry Pi). The application creates the records by receiving and storing RTSP transmissions from individual cameras. It then modifies these records into a form usable for display on websites and sends the second application from which the user can access them. This application is referred to in the text as agent or agent application. The second application has a web user interface and serves the end user as a tool to manage agents, IP cameras and captured records. By principle of the application, it is important for it to be accessible on a publicly available domain. This application is referred to in the text as web or web application. The use of this architecture does not violate any of the network communication standards, which include, in particular, the initialization of communication from the network behind the NAT service.
Censorship in the Internet
Rajecký, Michal ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
Internet censorship is a phenomenon of the time, which significantly restricts freedom of speech. The aim of this work was to find out the current state of Internet censorship in China. As part of the analysis, I designed and implemented a tool for testing website availability and detecting censorship of potentially blocked keywords. This tool verified different levels of access to a target server. The analysis showed that the city of Beijing forms a significant part of China's system in the implementation of censorship, as it loses a large part of Internet communication, up to 97% of all lost data. Testing also revealed the variability of censorship over time. On average, 57.6% of websites received different results during the testing period. This article provides an up-to-date picture of the state of Chinese Internet censorship and its impact on users. Censorship in China can be considered centralized, very extensive and variable over time.
Application for Verification of Data Accuracy in the SAP HCM Module
Kolb, Jakub ; Očenášek, Pavel (referee) ; Bartík, Vladimír (advisor)
Main goal of this bachelors thesis is to show issue of data checking in system SAP. Since this system is extensive, it is nearly impossible to control the data manually. In this bachelor thesis I am describing particular proposals for improving the processes including their use in practice. This bachelor thesis is divided into three parts. In first part is mentioned necessary theory used for implementing application for data checking. Next I describe particular important data dividing with proposal of class and domain diagram. In last part of thesis I pay attention to realization and programming itself in programming language ABAP.  

National Repository of Grey Literature : 232 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.