National Repository of Grey Literature 50 records found  beginprevious21 - 30nextend  jump to record: Search took 0.00 seconds. 
Vulnerability testing of cloud solutions by Slowloris attack
Šrámek, Michal ; Sikora, Marek (referee) ; Šeda, Pavel (advisor)
This bachelor's thesis addresses the issue of distributed Slowloris attack implemented in the Apache JMeter module. This module is then used to demonstrate the vulnerability in the Microsoft Azure cloud environment. The outcome of the thesis is an extension of the module, enabling testing from multiple IP addresses. The SlowHTTPTest tool, which the module utilizes for the attack, is also modified. In the introduction, the basic concepts related to cloud services and their classification are established. This is followed by chapters defining the current security threats to the cloud and how they compare between the three largest cloud providers. The technologies and configurations used in Azure environments are also described. Finally, the thesis focuses on modifying the attack module to support multiple addresses and tests it on both local and cloud infrastructures.
Detection of plagiatorism in software projects in the BDS course
Szymutko, Marek ; Přinosil, Jiří (referee) ; Šeda, Pavel (advisor)
Plagiarism is a widespread problem, which can be fought by prevention or detection methods. This thesis contains a summary of plagiarism detection methods through automated means. To parse source code, an open-source abstract syntax tree compiler was employed. The functionality of this compiler was demonstrated in this thesis. To reduce the mutual visibility of students’ projects, a proposal for the submission process was created. GitLab cloud service was employed for this purpose. Initialization of these students’ spaces is performed via Bash scripts. Other scripts to archive and create spaces for groups of students in the GitLab service were also created. A similarity-detecting tool was created in Python programming language. This tool was specialized to be employed in the subject BPC-BDS for the detection of plagiarism in students’ assignments written in Java or Python. It can also be used in other subjects though. For similarity detection, numerical metrics and abstract syntax trees were used. The comparison output of the projects and their individual parts is represented with integer value and outputted into a tabular file of the format xlsx. This thesis also summarizes the strengths and weaknesses of the implemented solution and lists problems that were encountered in the process of implementation. A case study about plagiarism in the subject BDS in the academic year 2022/2023 is also included in this thesis.
Java Implementation of DNP3 Protocol
Zárecký, Martin ; Šeda, Pavel (referee) ; Zeman, Kryštof (advisor)
The theoretical part of the bachelor thesis starts with IoT technologies, Human-toHuman and Machine-to-Machine communication schemes. It then goes into greater depth on industrial SCADA protocols and the DNP3 protocol. It continues with a detailed description of this protocol and also introduces the OpenMUC framework. In the practical part, a library of this protocol is also built, and an outstation is created that implements this library. The main part then consists of the OpenMUC framework into which we implement the DNP3 protocol. Finally, we build the communication between OpenMUC with DNP3 implemented and the DNP3 outstation.
Network Scanner for PowerShell
Sabota, Dominik ; Šeda, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This study focuses on the development and implementation of a network scanning tool for the scripting language Powershell version 5.1 and higher. This tool, named Oculus, was specifically designed for the use of sophisticated network scanning methods during penetration testing and other security audits, thereby becoming part of the broader context of cybersecurity. Within the set requirements and limitations, the Oculus tool was successfully implemented. This work thoroughly analyzes the process of development and implementation of this tool, its limitations, and their impact on overall effectiveness, which is subsequently tested and evaluated. Although the development process brought certain challenges, the testing results confirmed that the Oculus tool provides valuable outputs, thereby confirming its usability in the matter of improving cybersecurity.
TLS/SSL Interoperability Across Systems
Leitmann, Peter ; Malina, Lukáš (referee) ; Šeda, Pavel (advisor)
Hlavným cieľom tejto bakalárskej práce je pridanie nových testov interoperability do vybraných open-source projektov. Dôvod pre toto pramení v dôraze na zefektívňovanie práce vývojových tímov. Táto práca hlavne popisuje široko používané bezpečnostné protokoly -- Secure Sockets Layer (SSL) and Transport Layer Security (TLS). Ďalej sa zameriava na popis postupu, ako by mal byť softvér vyvíjaný s použitím CI/CD (priebežného integrovania a priebežného nasadzovania), čo pozostáva nie len z vytvárania kódu ale aj jeho testovania. Preto je v práci vysvetlený známy cyklus vývoja SDLC (Software Development Life Cycle) a aj cyklus testovania STLC (Software Testing Life Cycle). V praktickej časti je popísaný proces vyberania vhodných testov, konfigurácia rôznych CI systémov a následné testovanie vyvíjaného softvéru. Testovacie prostredie je výhradne operačný systém Fedora a testy sú závislé na open-source nástroji Test Management Tool.
Design and implementation of a module for load testing of HTTPS requests in Apache JMeter
Čížek, Šimon ; Člupek, Vlastimil (referee) ; Šeda, Pavel (advisor)
The Bachelor Thesis focuses on DDoS attacks over the HTTPS protocol and their simulations from a single network interface. Based on the analysis of options for sending requests from spoofed IPv4 and IPv6, a plugin module was developed for Apache JMeter software. Subsequently, module impacts were tested using a created scenario on Nginx and Apache2 test servers. The conclusion presents the results of the generated load on both servers.
System supporting cybersecurity training for computer exercises
Sladký, Martin ; Martinásek, Zdeněk (referee) ; Šeda, Pavel (advisor)
The present bachelor thesis deals with a system supporting cybersecurity games for computer exercises. The aim of the thesis is to create a simplified platform for cybersecurity games together with the creation of a suitable task and its testing on a sample of students. The theoretical part includes a research of cybersecurity games, the design of a web platform and the presentation of the obtained statistics. The practical part presents the implementation of the web platform and the cybersecurity game.
A tool for obtaining contextual information from open sources
Šťovíček, Petr ; Šeda, Pavel (referee) ; Martinásek, Zdeněk (advisor)
The thesis focuses on the design and implementation of a tool that can retrieve and present contextual information from several open sources such as Shodan or VirusTotal for a given input (e.g. IP address or domain name). The tool allows for the addition of other sources and can be integrated into other tools through the created clients or API. The theoretical part of the thesis defines the term indicator of compromise, describes some open sources of information and compares similar information aggregation tools.
Integration and automation of deployment of updated load testing modules
Jedlička, Jakub ; Člupek, Vlastimil (referee) ; Šeda, Pavel (advisor)
This thesis focuses on performance testing using JMeter and developing modules for denial of service (DoS) attacks. The thesis first deals with the theory, where performance testing is described, the tools used for this type of testing and finally the types of DoS attacks. The practical part starts with the migration of the operating system of the load tester on which the testing was performed. It also describes the upgrade of the JMeter tool from version 4.0 to version 5.5, updating the custom add-on modules and fixing bugs in modules so that the modules can be used without errors with the JMeter tool in version 5.5. The updated JMeter tool and custom add-on modules are uploaded to the load tester. For future updates, automation scripts are created to update the system packages of the load tester, updating both the custom add-on modules and the JMeter tool. The module extensions that have been made to increase the scope of the tests are then discussed. These extensions add mainly link layer parameters and support for IPv6. The final section describes the newly created parts of the DDoS module. The new parts of the module extend the capabilities of testing web applications using multiple IP addresses or testing using slow attacks.
Optimization of Wireless Networks Infrastructure Using Artificial Intelligence Methods
Šeda, Pavel ; Assoc. Prof. Sergey Andreev, D.Sci. (Tech.) (referee) ; Araniti, Giuseppe (referee) ; Hošek, Jiří (advisor)
Dizertační práce je zaměřená na úlohy optimalizace síťových infrastruktur s využitím algoritmů umělé inteligence. Vzhledem k rostoucím požadavkům na síťový provoz v 5G+ sítích jsou nutné zásadní úpravy síťových infrastruktur. Tyto požadavky vytyčují řadu otázek v oblasti výzkumu. Hlavním cílem této dizertační práce je proto návrh optimalizačního modelu a algoritmů lokalizujících vhodná místa k nasazení základnových stanic. Pro vytvoření takového optimalizačního modelu bylo nezbytné reflektovat zásadní požadavky bezdrátového pokrytí v soudobých sítích, jako jsou požadované kapacity (základnových stanic a koncových uživatelů), již existující infrastruktura, interference mezi základnovými stanicemi či dosah pokrytí. Protože algoritmus hledání řešení této úlohy má exponenciální složitost a pro velké instance není možné najít optimální řešení v dostupném čase, bylo nutné aplikovat metody umělé inteligence. Vzhledem k charakteru výpočtu byly zvoleny a implementovány meta-heuristické algoritmy, které jsou dále v práci detailněji rozebrány. Navržené optimalizační modely a algoritmy jsou následně verifikovány pomocí vhodných simulací pro městské, předměstské či venkovské oblasti. Praktické využití navrženého řešení je uvažováno jako dodatečný modul do existujících nástrojů, doporučující místa nasazení nových základnových stanic při změně charakteru sítě (např. vyšší kapacitní požadavky v určitých oblastech), sloužící jako podklad pro další praktické ověření. Hlavním přínosem práce je návrh a implementace vlastní modifikace genetického algoritmu a návrh původních matematických modelů smíšeného celočíselného programování, výrazně rozšiřujících klasickou úlohu pokrytí. Včetně jejich následného ověření na instancích se statisíci prvky a jejich publikace v impaktovaných časopisech a na mezinárodních konferencích.

National Repository of Grey Literature : 50 records found   beginprevious21 - 30nextend  jump to record:
See also: similar author names
13 Seda, Pavel
3 Šeda, Petr
1 Šedá, P.
Interested in being notified about new results for this query?
Subscribe to the RSS feed.