National Repository of Grey Literature 68 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Comparison of Cryptographic Libraries in Linux Environment
Bartoš, Milan ; Malinka, Kamil (referee) ; Barabas, Maroš (advisor)
Bachelor's thesis deals with the comparison of the three cryptographic libraries used in the Linux environment. These are GnuTLS/nettle, NSS and OpenSSL. These are compared in terms of support for basic cryptographic functionality (symmetric and asymmetric ciphers, hash algorithms, SSL/TLS), working with hardware tokens and SSL/TLS. Libraries are also compared in terms of API design with a focus on stability and work with certificates and the possibility of more independent use of the library in a single process.
Ransomware Obfuscation Techniques
Jacko, Jerguš ; Barabas, Maroš (referee) ; Kačic, Matej (advisor)
This master's thesis seeks to design, implement, and point out new techniques for obfuscation of ransomware activity using the entropy principles of data that do not fall within the detection capabilities of known anti-ransomware and anti-virus tools. The proposed techniques are aimed at changing the ransomware activity in the downgrading phase (encryption or obfuscation) of files on the infected system.
Tool for Security Auditing Of Linux/Unix/AIX OS
Koppon, Martin ; Homoliak, Ivan (referee) ; Barabas, Maroš (advisor)
The subject of this bachelor's thesis is in regards to an issue of automated testing of Linux, Solaris and AIX operating systems according to security configuration audit in consideration of applicable norms and established standards. The bachelor thesis deals with risk analysis, its assessment and risk mitigation and evaluation policy compliance. For this purpose, a tool was designed for operating systems mentioned earlier. It is implemented in the bash script language. The tool allows automated vulnerability management depending on established standards of SCAP: CCE, CVE, XCCDF, OVAL and CIS a NVD specifications. Moreover, it helps to reduce the time requirements during the auditing process while preserving an integrity of the auditing system.
Secure Development Framework for Web Applications
Mazura, František ; Ovšonka, Daniel (referee) ; Barabas, Maroš (advisor)
This thesis deals with the theoretical analysis of vulnerabilities in web applications, especially the most frequent vulnerabilities of OWAST TOP 10 are examined. These vulnerabilities are subsequently analyzed for the design of a web application development framework and practically implemented in this framework to prevent the vulnerabilities or, if necessary, defend itself. The main goal of the implementation is to achieve such a framework so that the programmer of the resulting web application is protected to the utmost.
Web Gateway for Access to Measurement Devices
Zsíros, Anton ; Barabas, Maroš (referee) ; Hanáček, Petr (advisor)
This Master's thesis deals with design and implementation of a system that can access remote devices through computer network. Specifically, the serial port devices and audio input devices. The first step of the thesis was to do a survey in the field of similar available, focusing on applications that could be integrated into the final system. For serial port devices, it was necessary to find a solution that would allow redirecting data from the physical device to a computer network and creating virtual serial ports on client systems, through which would users access these devices. To transfer audio streams from audio input devices through computer network was chosen RTP protocol, which is well suited for data transmission in real time. The thesis also contains the description of handling received RTP stream on a client system. The result is a complex system that integrates the functionality of mentioned tools into a single unit.
Tool for Database Model Visualization of Existing Database
Šišák, Ivan ; Kumpošt, Marek (referee) ; Barabas, Maroš (advisor)
This project tries to give information to the user in a simpler way. In the database system a lot of information exists  which describes the database model.   Text representation of this information is bulky and not well-arranged. You can get a much a more vivid view at the database model by using visualization and you can work with it easier.   You get information from a database system by using a tool developed in this project and after that you can visualize them in a editor or viewer of your choice. This tool can convert one file format to   another.
Cyber Threat Intelligence Platform
Jacko, Jerguš ; Barabas, Maroš (referee) ; Kačic, Matej (advisor)
Main goal of this thesis is to create an web application platform, which provides simplified characterization, adaptation and exchange of cyber threat incidents using the STIX, TAXII, CybOX and IDEA standards. Platform has implemented rest API to collect external events in IDEA format, tool for creating STIX formatted models of events and model exchange mechanism based on TAXII described services.
Integration of SELinux Audit Logs into ABRT Tool
Vrabec, Lukáš ; Kačic, Matej (referee) ; Barabas, Maroš (advisor)
The main aim of the thesis is to introduce the security of Linux operating systems and the access control list mechanism. The thesis focuses on processing security messages produced by the security mechanism into logging services and on displaying those messages. In addition, the thesis includes a concept solution and its implementation, which integrates security messages into a centralized system, keeps them and reports bugs in the Linux community distribution Fedora and in the Linux commercial distribution Red Hat Enterprise Linux.
Security analysis of network traffic using behavioral signatures
Barabas, Maroš ; Hujňák,, Petr (referee) ; Zelinka,, Ivan (referee) ; Hanáček, Petr (advisor)
This thesis focuses on description of the current state of research in the detection of network attacks and subsequently on the improvement of detection capabilities of specific attacks by establishing a formal definition of network metrics. These metrics approximate the progress of network connection and create a signature, based on behavioral characteristics of the analyzed connection. The aim of this work is not the prevention of ongoing attacks, or the response to these attacks. The emphasis is on the analysis of connections to maximize information obtained and definition of the basis of detection system that can minimize the size of data collected from the network, leaving the most important information for subsequent analysis. The main goal of this work is to create the concept of the detection system by using defined metrics for reduction of the network traffic to signatures with an emphasis on the behavioral aspects of the communication. Another goal is to increase the autonomy of the detection system by developing an expert knowledge of honeypot system, with the condition of independence to the technological aspects of analyzed data (e.g. encryption, protocols used, technology and environment). Defining the concept of honeypot system's expert knowledge in the role of the teacher of classification algorithms creates autonomy of the~system for the detection of unknown attacks. This concept also provides the possibility of independent learning (with no human intervention) based on the knowledge collected from attacks on these systems. The thesis describes the process of creating laboratory environment and experiments with the defined network connection signature using collected data and downloaded test database. The results are compared with the state of the art of the network detection systems and the benefits of the proposed approximation methods are highlighted.
Detection of Honeypot Systems in Network
Teknős, Martin ; Drozd, Michal (referee) ; Barabas, Maroš (advisor)
This thesis is focusing on detection of honeypot systems in network. It presents different techniques for detection of honeypot systems and then focuses on three of them: TCP/IP fingerprinting, clock skew estimation and service exercising. A console application was created, to test these selected techniques. The thesis describes a design of the application, its implementation and also presents results of experiments with the application and selected techniques.

National Repository of Grey Literature : 68 records found   previous11 - 20nextend  jump to record:
See also: similar author names
4 Barabáš, Martin
Interested in being notified about new results for this query?
Subscribe to the RSS feed.