National Repository of Grey Literature 267 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Detection of attacks targeted at web applications
Jégrová, Eliška ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis is dealing with vulnerabilities of web applications. The aim of the work is to create tools for attack detection of certain attacks, specifically Same Origin Method Execution (SOME), XML Signature Wrapping attack, XPATH Injection, HTTP Response Smuggling and Server-Side Includes (SSI) injection. Another aim is to create logs that display detected attacks. In the first part, the theory is analyzed and vulnerabilities of chosen attacks are described including their misuse. In the next section there are web application implemented which contain vulnerabilities for successful execution of the attacks. Furthermore, in Python language detection methods are designed and developed for these attacks, which are accompanied by a log entry.
Power line transfer function generator
Vlček, Josef ; Martinásek, Zdeněk (referee) ; Mlýnek, Petr (advisor)
This bachelor's thesis deals with data communication over powerline (PLC). It describes the PLC technology, its basic division, the current opportunity to use, the sources of interference and the types of modulation. It analyzes the basic parameters of transmission line by means of which it is possible to create the equivalent transmission line model in two different ways either the mathematical model with multipath propagation or by using two-port with cascade parameters. The practical part contains measurement transfer function on different topologies. The measured values are compared with the numerical models. Furthermore, the transfer function generator was created which simulates the properties real distribution network.
Detection of attacks on the L2 layer
Štefánik, Jaromír ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
Bachelor thesis is focused on cybernetic attacks on the second layer of the reference model OSI, namely: DHCP starvation, MAC flooding, Eavesdropping. The first, theoretical, part of the bachelor thesis is focused on the OSI model, types of cybernetic attacks and methods used by cybercriminals (attackers). In the practical part of the bachelor thesis an experimental workplace was set up (local network), the cybernetic attacks were realized, detection algorithms for given attacks were theoretically designed and programs designed to detect the given attacks were created.
Broadband services over power lines
Svoboda, Jan ; Martinásek, Zdeněk (referee) ; Stančík, Peter (advisor)
The Bachelor´s thesis is intend on assembly of basic informations from area of PLC systems. It envisages the modern problems in area of communication on the energy supply networks. By the aim is provide compact informations about particular areas of usage PLC systems – both in a household, an automatic exercises and in a possibilities of broadband. The first part of thesis includes the theoretical informations about PLC network. The second part considers by testing of basic parameters PLC network. Of all the made measurements are draw conclusions and valorize the usability of metering devices.
Electromagnetic analysis
Kolofík, Josef ; Reichert, Pavel (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with electromagnetic analysis and applications of electromagnetic side channel. The first and second part describes the basics of cryptography, function of cryptographic module and side-channel attacks. The third part discusses the electromagnetic analysis, construction of probe, a description of the laboratory workplace, the electromagnetic emission of PIC16F84A, AES and preparation for laboratory measurements. The fourth part describes specific laboratory measurements and extracting the useful signal. In the fifth part of the thesis presents the results of processing the measured values, the outputs generated by scripts and found the link between measured curves and AES encryption key. In the sixth part of the thesis are analyzed the basics of defense against side channel attack.
Internet Connection variants using present TV cable wiring
Lukáč, Michal ; Martinásek, Zdeněk (referee) ; Stančík, Peter (advisor)
This dissertation examines data transfers along the existing lines of cable TV. PLC equipment has been selected as the focus of this examination. The essay examines the question of Multicarrier modulation and focuses more specifically onto the problem of OFDM modulation, which is being used by the selected equipment. It further describes the process of integration of PLC equipment into the cable TV network, modifications of the CATV and the basic topology of the created data networks. The essay also offers a closer look onto a PLC modem and Head End from Corinex that have been used in the implementation of a data network in a selected rural settlement. The author has also raised the issue of the problems connected with cable wires connected with this particular type of data transfers and the solutions of some of the encountered problems. The characteristics of this network have then been measured during normal operation of the created network. Measurements have been carried out in order to determine the transfer speed on a physical and transfer level, the SNR of specific connections and the signal attenuation. The measurements have confirmed the suitability of the used PLC equipment for the purposes of data transfer along the cable TV lines as far as data speed and signal strength was concerned. A map of the particular cable TV lines and the PLC equipment has been included in the attachment.
IMS multimedia services
Dohnálek, Václav ; Martinásek, Zdeněk (referee) ; Mácha, Tomáš (advisor)
This master thesis refers to a new technology in a mobil services IP multimedia subsystem. First, the theoreticl part, refers to the architectury of this technology and elementary protocols. Although it is real-time services, is nesessary to refer about the Quality of Services, that it ensures the condent transmition of data. The second, practisy part refers to a the development background SDS 4.0 FD1 from Ericsson ltd., that it is used develop aplications for IMS technology. It will be to develop the aplication , that it used to the IMS and it refers to the elementary function and comunication.
Secure deployment and testing of oVirt platform
Vágner, Vojtěch ; Martinásek, Zdeněk (referee) ; Dzurenda, Petr (advisor)
Virtualizační platforma oVirt nabízí široké spektrum možných konfigurací. Avšak žádná z~těchto konfigurací není bezpečnou bez předchozího zásahu v kontextu slepého nasazení platformy. Bezpečné konfigurace jsou definovány bezpečnostními standardy, se kterými je daná konfigurace v souladu. Jelikož oVirt je komunitní projekt, není lehké tento typ softwaru certifikovat v oblasti bezpečnostních standardů. Certifikace v oblasti bezpečnostních standardů je drahou záležitostí. Naštěstí, oVirt sdílí stejný základ s produktem Red~Hat~Virtualization, vůči kterému jsou určité bezpečnostní standardy aplikovatelné (FIPS 140-2, DISA STIG, Common Criteria). Most mezi Red~Hat~Virtualization a oVirt dává možnost bezpečných konfigurací i pro oVirt. Záměr této práce je následně určit, které konfigurace jsou podporovány danými standardy, tedy bezpečné, a jak ověřit, že jsou přítomné v dané nasazené platformě. To je realizováno pomocí skriptu ve formě Ansible Playbook, který zahrnuje Ansible Role. Každá role v rámci skriptu obhospodařuje evaluaci shody pro daný bezpečnostní standard.
Performance and security testing of network applications
Matej, Michal ; Martinásek, Zdeněk (referee) ; Zeman, Václav (advisor)
The aim of this Master's thesis is to design and to implement the security test in considering a resistance of the device under test to the effects of the distributed denial of service attack DDoS SYN Flood. After processing the test results is developed a protocol about security test of the device under test. In this thesis are tested two devices, namely CISCO ASA5510 firewall and a server with the specified name Server. The theoretical part of the thesis discusses the primary types of network attacks such as reconnaissance, gain access and denial of service attacks. Explained the concept of DoS and its principle, further types of DoS attacks and distributed denial of service attacks DDoS.

National Repository of Grey Literature : 267 records found   1 - 10nextend  jump to record:
See also: similar author names
1 Martinasek, Z.
6 Martinasek, Zdenek
Interested in being notified about new results for this query?
Subscribe to the RSS feed.