National Repository of Grey Literature 268 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Bluetooth device security testing
Hlaváček, Jan ; Martinásek, Zdeněk (referee) ; Dzurenda, Petr (advisor)
The aim of the thesis is analysis and inventory security risks of Bluetooth technology, assembly Bluetooth adapter and proposal and poposal of testing procedures, which will helps evaluate security of tested device.
Methods for the measurement of bit rates in data networks
Franc, Jan ; Martinásek, Zdeněk (referee) ; Zeman, Václav (advisor)
The target of this master's thesis were the known methods for testing the quality of transfer parameters of data networks. I have studied the RFC 2544 document to analyze these tests. From that information and by studying other existing web-based applications I was able to design a concept of my own application that will allow to measure basic quality parameters of transfers made through the Internet (the parameters: downstream, upstream, latency, variance of these and a traced route). My application doesn't require any modifications on the user's system. It's built on the server-based programming language PHP and uses the relational database engine MySQL to store measurement and user data. On the client side, it's assisted by the JavaScript scripting language. Both registered users and visitors are allowed to perform the listed measurements. Registered users are able to browse the history of their own benchmark results and also to send messages to others. There is an administrative account to oversee the operations. Another part of my thesis work is an application for Windows that performs the same measurements but does not use JavaScript.
Neural Networks for Network Anomaly Detection
Matisko, Maroš ; Martinásek, Zdeněk (referee) ; Blažek, Petr (advisor)
This bachelor thesis is focused on creating a system to mitigate computer network attacks. One of the most common groups of attacks is Distributed Denial of Service (DDoS) attacks, against which this system should protect internal network. In the theoretical part of the thesis are described DDoS attacks, existing systems for their mitigations, neural networks principle and their use. Practical part consists of choosing communication parameters, constructing a neural network with use of these parameters, implementation of this neural network in real–time attack mitigation system and a result of testing of this system.
Secure Communication in the Internet of Vehicles
Kolaja, David ; Martinásek, Zdeněk (referee) ; Malina, Lukáš (advisor)
Public roads can get dangerous if a police force is trying to stop a vehicle in which the driver is running away from hit-and-run situation. This fact increases the probability of causing more harm to the public. It is also why it should be made possible for police to safely and remotely stop the vehicle using modern technologies. This master thesis deals with possibilities of utilizing Internet of Vehicles (IoV) technologies, in which Cooperative Intelligent Transport Systems (C-ITS) play a big role. We can find description of C-ITS security architecture in the theoretical introduction. The task is to design a secure infrastructure and communication for applications which can remotely stop a vehicle. The security of such communication should be made using modern cryptography algorithms which ensure unauthorized access and usage of the application. Lastly, the security implementation is tested on an On-Board Unit on which the memory consumption and time delay is evaluated.
Power side channel
Zapletal, Ondřej ; Mácha, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis deals with side-channel cryptoanalysis. It is focused on power side-channel attack on cryptographic device. The microcontroller PIC is used as the cryptographic device. This microcontroller performs encryption through the symmetrical algorithm AES. For the purpose of simple and differential power analysis, we designed and constructed an experimental printed circuit board. The power consumption of the microcontroller PIC working with instruction AddRoundKey and SubBytes was scanned by a Tektronix CT-6 current probe. Data obtained by measuring were processed on the computer with relevant software and provided important information about the encryption key that was used.
Information System Efectiveness Assessment and Proposal for ICT Modification
Zdražilová, Eva ; Martinásek, Zdeněk (referee) ; Neuwirth, Bernard (advisor)
This thesis deals with the assessment of the information system of selected company, searching for weaknesses of the current solution and developing a proposal for improvement of individual parts that will lead to more efficient work and improvement of the existing information system. It also includes a financial evaluation of the new solution.
Implementation of plugins for JMeter
Švehlák, Milan ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
This thesis discusses the load testing tool JMeter and its opportunities for expansion by modules carrying out cyber attacks of the type Denial of Service (DoS). To begin with, there is a theoretical overview of cyber attacks of this type. The following chapter, talks about the JMeter tool, namely its functions and expansion options. After that, it is proceeded to the actual design and realization of the modules. The module implementing the attack HTTP Flood is created first. This module uses internal functions of the program JMeter. This new module is tested. Next chapter folows the procedure of creating modules, that use external generator of network traffic. Modules SYN Flood, ICMP Flood and NTP Flood are implemented using the generator Trafgen. Module implementing attack Slowloris uses a Python script as a generator of the attack. Finally, all the new modules are tested.
Communication infrastructure virtualization platform
Stodůlka, Tomáš ; Martinásek, Zdeněk (referee) ; Uher, Václav (advisor)
The thesis deals with selection of infrastructure virtualization platform focusing on containerization with sandboxing support and with following examination of its difculty. The work begins with an explanation of the basic technologies such as: virtualization, cloud computing and containerization, along with their representatives, that mediate the technology. A special scope is defned for cloud computing platforms: Kubernetes, OpenStack and OpenShift. Futhermore, the most suitable platform is selected and deployed using own technique so that it fullflls all the conditions specifed by thesis supervisor. Within the difculty testing of the selected platform, there are created scripts (mainly in the Bash language) for scanning system load, creating scenarios, stress testing and automation.
Traffic generator of industrial protocols
Šnajdr, Václav ; Blažek, Petr (referee) ; Martinásek, Zdeněk (advisor)
This bachelor thesis deals with generating data traffic of industrial SCADA protocols and their implementation into JMeter tool. This tool can be expanded with plugins. Three protocols DNP3, IEC61850 and IEC60870-5 are described in the theoretical part. The practical part is devoted to the design and implementation of the DNP3 protocol module and partly to the design of the IEC61850 protocol. The DNP3 module has been functionally tested. There is also an attempt to obtain the TASE.2 library.
Cyber game for the OpenStack platform
Píš, Patrik ; Holasová, Eva (referee) ; Martinásek, Zdeněk (advisor)
This bachelor's thesis presents matters of penetration testing and ethical hacking with primary focus on binary exploitation. The main goal of this bachelor's thesis was to design and implement a cyber game which focuses on combining various exploitation techniques and presenting them in educative and engaging way. The theoretical part of this thesis concentrates on penetration testing methodology and provides a detailed analysis of a given vulnerability's mechanics and technologies that were crucial for the game's development. Practical part of this thesis consists of a detailed description of the game's design and implementation to OpenStack and cyber arena platforms. Additionally, the practical part of this thesis focuses on development of vulnerable applications, methodology and steps necessary for their successful exploitation. Due to the character of cyber game, a few protection mechanisms were necessary to deploy, and their description takes place in practical part of this bachelor's thesis as well.

National Repository of Grey Literature : 268 records found   previous11 - 20nextend  jump to record:
See also: similar author names
6 Martinasek, Zdenek
6 Martinásek, Zdeněk
Interested in being notified about new results for this query?
Subscribe to the RSS feed.