National Repository of Grey Literature 130 records found  previous11 - 20nextend  jump to record: Search took 0.03 seconds. 
Analysis of DDoS Backscatter Traffic in Network Flow Data
Marušiak, Martin ; Tisovčík, Peter (referee) ; Žádník, Martin (advisor)
This work focuses on detection of denial of service (DoS) attacks which utilize random spoofing of source IP address in attack packets. These types of attacks lead to generation of side effect in a form of backscatter that can be used to identify victims of such attacks. Backscatter analysis has so far been limited to unused address space ranges referred to as network telescopes. This work therefore proposes a new method of DoS attack detection via backscatter outside of network telescope environment where legitimate user traffic is also present. Furthermore proposed approach uses only abstracted traffic in a form of network flows. Presented method was implemented as part of NEMEA system and tested on real flow data capture provided by CESNET.
System for the Protection against DoS Attacks Using IDS
Mjasojedov, Igor ; Fukač, Tomáš (referee) ; Kučera, Jan (advisor)
This bachelor's thesis deals with the use of the Intrusion Detection System in the protection of computer networks against Denial of Service attacks. Suricata is the IDS system chosen for this purpose. The main goal of the thesis is to integrate the Suricata system with the DDoS Protector device. DDoS Protector - DCPro is a security network device, which uses, from a software perspective, DPDK technology for high-speed network traffic processing. Due to this fact, this technology was also integrated into the Suricata system. After this integration, the communication between DDoS Protector and Suricata system was allowed more easily. As a result, two DPDK compatible regimes were created in the Suricata system. The individual regime allows Suricata to process network data directly from the network interface card. The second, integrated regime allows DCPro to send network data to the Suricata system for highly precise analysis, which significantly extends DDoS Protector's attack detection abilities.
Three scenarios of simulation of global Internet behavior
Šiklóši, Miroslav ; Dvořák, Jan (referee) ; Jeřábek, Jan (advisor)
Goal of this thesis is to study about Internet from the perspective of autonomous systems, BGP protocol, transit, peering, DNS system and security. Next goal is to design suitable scenarious and topology, related with BGP protocol etc. and then desing suitable solutions.
Distributed denial of service filtering based on Mikrotik network devices
Rajj, Jakub ; Martinásek, Zdeněk (referee) ; Gerlich, Tomáš (advisor)
The bachelor thesis is focused on the issue of denial of service attacks. These types of attacks are still up to date, but are currently being used in their distributed form. The theoretical part of the thesis describes the basic mechanisms of attacks and the division of attacks. Also there are described the most famous type of attacks. The theoretical part also includes a description of how to respond to these attacks. Four basick methods are described (prevention, detection, identification and response), as well as intrusion detection and prevention systems (IDPS). The practical part deals with connection of intrusion detection system and router, for detection and filtration on said router.
Detection of DoS and DDoS attacks in IPv6
Frátrik, Tibor ; Fujdiak, Radek (referee) ; Holasová, Eva (advisor)
This bachelor thesis in the theoretical part contains a description of the network and transport layer. The protocols of individual layers are also discussed. It is primarily about their function and safety. Individual attacks are also related to these layers. In this thesis are mentioned DoS (denial-of-service) and DDoS (distributed denial-of-service) attacks. Furthermore, the bachelor thesis mentioned detection and mitigation tools, and the possible solutions. The practical part contains descriptions of detections that were created in the Snort and Suricata programs. Finally, the individual detections and mitigations were also tested. In the detection of DoS attacks, the Suriata and Snort programs focused primarily on the number of packets per unit time. Detection in the Scapy program was focused mainly on individual ports of the transport layer. The goal was for DoS attacks to be detected and for ordinary network traffic not to be detected.
Automated creation of statistics of network traffic
Benedikt, Jan ; Frolka, Jakub (referee) ; Číka, Petr (advisor)
This Bachelor Thesis aims to process and present outcomes of stress testing. The frst chapter depicts basic terms closely connected to stress testing. Second part is concerned with the analysis of possible resolutions and their comparison between each other. The obtained theoretical knowledge is then applied to model sketch for a report, generated in form of the website. The model itself is created in JMeter program and it is written in the Java coding language. The generated website is programed in HTML, CSS and JavaScript languages.
Securing IP PBX against attacks
Hynek, Luboš ; Krajsa, Ondřej (referee) ; Šilhavý, Pavel (advisor)
This master project focuses on the possibilities of protecting the most common free software PBX Asterisk, FreeSWITCH and YATE. In practice, it was verified the behavior of PBX in the attacks and suggested protection against them on one of the most popular distributions of Linux server on CentOS. Tool was created to simulate several types of attacks targeting denial of service. Both protective options PBX themselves and operating system capabilities are used in this work. Comparison was also the possibility of protection of individual PBX with each other. It also includes a brief description of the protocol, topology attacks and recommendation for the operation of softswitches.
Intrusion detection and prevention systems at border devices
Bína, Zdenko ; Frolka, Jakub (referee) ; Blažek, Petr (advisor)
This bachelor thesis is focusing on testing the endurance of networks against DDoS attacks. The theoretical part consists of an introduction to the problematics of these attacks and current trends regarding DDoS attacks, focusing on IDS and IPS systems, and Spirent Avalanche 3100b machine, designed to generate network traffic. The practical part is about the configuration of the software web server Apache, which runs on Linux Debian OS, and it is testing this system for endurance against five DDoS attacks. The server is put through attacks before and after application of systems NIDS and NIPS, using Snort and Suricata software. The goal of the thesis is comparing NIDS and NIPS servers based on the results of testing.
Automatic Generation of Load Testing Reports
Oškera, Jakub ; Martinásek, Zdeněk (referee) ; Grabovský, Štěpán (advisor)
The diploma thesis deals with the development of a tool for automated generation of load testing reports, which is implemented in the form of a plug-in into the load tester JMeter as one of its components. The theoretical part contains an analysis of load testing and DDoS parameters, which are the output of a web report. The thesis includes an analysis of available template processors. Based on the analysis of processor’s properties, the most appropriate one was chosen. This processor was then used in a tool that, using the web technologies, generates a report in a form of interactive web page. The thesis also mentions the installation and operation of the created JMeter software plug-in. The diploma thesis describes the whole process of the development of the plug-in.
Automation of DDoS Attack Mitigation
Nagy, Peter ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
The aim of this thesis is automation of DDoS attack mitigation. This thesis provides an overview of GNU/Linux network platforms and different approaches for their configuration. The aim is to select a platform that could be extended to automate DDoS mitigation. DDoS attack types are explained as well. Selected methods for DDoS mitigation are described in more detail such as Remote Triggered Black Hole and BGP Flowspec. Existing tools like DDoS Defender and FastNetMon are used to detect a DDoS attack. NETX was chosen as target implementation platform. To communicate with devices, API or BGP protocol with Flowspec extension are used.

National Repository of Grey Literature : 130 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.