National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Switches security risks
Halaška, Peter ; Novotný, Bohumil (referee) ; Sobek, Jiří (advisor)
The aim of this thesis was to study and subsequently process issues of securing switches operating at the data link layer of OSI/ISO model. Map individual switch attacks with their review. On the basis of this information realize chosen attacks with presented results.
Generator of Cyber Attacks
Halaška, Peter ; Burda, Karel (referee) ; Hajný, Jan (advisor)
This work deals with the security of computer networks based on TCP/IP protocol stack. The main objective is to develop a generator of DoS flooding attacks which carries out attacks such SYN flood, RST flood, UDP flood, ICMP flood, ARP flood, DNS flood and DHCP starvation. The theoretical part describes the features of the mentioned attacks and protocols or mechanisms associated with them. Next part deals with the comparison of selected tools (Hping3, Mausezahn, Trafgen) in terms of number of packets per second (pps) and the link utilization (MB/s). The practical part describes design and implementation of the new attacking tool. There is explained the importance of it’s individual modules, it’s installation and usage options. New tool is also being tested. Then there is described the development, options and installation of control interface which is in the form of web application.
Switches security risks
Halaška, Peter ; Novotný, Bohumil (referee) ; Sobek, Jiří (advisor)
The aim of this thesis was to study and subsequently process issues of securing switches operating at the data link layer of OSI/ISO model. Map individual switch attacks with their review. On the basis of this information realize chosen attacks with presented results.
Generator of Cyber Attacks
Halaška, Peter ; Burda, Karel (referee) ; Hajný, Jan (advisor)
This work deals with the security of computer networks based on TCP/IP protocol stack. The main objective is to develop a generator of DoS flooding attacks which carries out attacks such SYN flood, RST flood, UDP flood, ICMP flood, ARP flood, DNS flood and DHCP starvation. The theoretical part describes the features of the mentioned attacks and protocols or mechanisms associated with them. Next part deals with the comparison of selected tools (Hping3, Mausezahn, Trafgen) in terms of number of packets per second (pps) and the link utilization (MB/s). The practical part describes design and implementation of the new attacking tool. There is explained the importance of it’s individual modules, it’s installation and usage options. New tool is also being tested. Then there is described the development, options and installation of control interface which is in the form of web application.

See also: similar author names
2 Halaška, Petr
Interested in being notified about new results for this query?
Subscribe to the RSS feed.