National Repository of Grey Literature 130 records found  beginprevious121 - 130  jump to record: Search took 0.00 seconds. 
Detecting DoS and DDoS Attacks Using NetFlow Data
Huňka, Jan ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
This thesis deals with using NetFlow data for DoS and DDoS attacks detection. Based on the findings of the analysis of attack traffic a plugin for exporter of the FlowMon probe is implemented. It monitors several heuristics and based on them determines a level of suspicion of the source IP address. During testing, it was verified that the plugin is able to reliably detect large-scale DoS and DDoS attacks on live traffic.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Network protection testing and DoS attacks protection
Hanzal, Jan ; Šilhavý, Pavel (referee) ; Hajný, Jan (advisor)
The aim of this Master thesis is a testing of Cisco ASA\,5510 firewall with affect of Denial of Service attacks. Part of the thesis is a teoretical description some of the attacks and practical tests. Practical part covers basic testing of Cisco ASA with Spirent Avalanche 3100B. Number of TCP connections per second and firewalls throughput on 7th layer of ISO/OSI model were tested. Also the effect of Denial of Service attacks on the throughput. In a next part there is described one possible way how to generate Denial of Service attacks from a Linux server to the firewall. Python scripts were used for generation DoS packets. With those scripts it is possible to generate five types of attacks.
Anonymous communication on the internet
Hořejš, Jan ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
Entropic models of data traffic
Blažek, Petr ; Mžourek, Zdeněk (referee) ; Slavíček, Karel (advisor)
This thesis solves possibility of using entropy for anomaly detection in data communication and especially for security attacks. The main advantage of using entropy is ability to identify unknown attacks because entropy detects changes in network traffic but not the content as existing methods. In this work was tested the suitability of different models entropy (Shannon, Renyi, Tsallis). Also been tested the effect of Renyi and Tsallis parameter on resulting entropy. From the resulting values, I found that all tested entropy achieve good result in the identification of anomalies in network traffic.
Securing IP PBX against attacks
Hynek, Luboš ; Krajsa, Ondřej (referee) ; Šilhavý, Pavel (advisor)
This master project focuses on the possibilities of protecting the most common free software PBX Asterisk, FreeSWITCH and YATE. In practice, it was verified the behavior of PBX in the attacks and suggested protection against them on one of the most popular distributions of Linux server on CentOS. Tool was created to simulate several types of attacks targeting denial of service. Both protective options PBX themselves and operating system capabilities are used in this work. Comparison was also the possibility of protection of individual PBX with each other. It also includes a brief description of the protocol, topology attacks and recommendation for the operation of softswitches.
Performance and security testing of network applications
Matej, Michal ; Martinásek, Zdeněk (referee) ; Zeman, Václav (advisor)
The aim of this Master's thesis is to design and to implement the security test in considering a resistance of the device under test to the effects of the distributed denial of service attack DDoS SYN Flood. After processing the test results is developed a protocol about security test of the device under test. In this thesis are tested two devices, namely CISCO ASA5510 firewall and a server with the specified name Server. The theoretical part of the thesis discusses the primary types of network attacks such as reconnaissance, gain access and denial of service attacks. Explained the concept of DoS and its principle, further types of DoS attacks and distributed denial of service attacks DDoS.
LAN communication unit resistivity against Internet origination attacks
Valach, Michal ; Mlýnek, Petr (referee) ; Mišurec, Jiří (advisor)
This thesis is focused on crypto-module RCM 3700, which is used for encrypted data transmission. Following work analyses basic network protocols and some sort of attacks in Ethernet network. The main goal of these attacks is to collect information and services about the device and to analyze transmitted data. Based on these information attacks can be done more precisely than without them. The main target of these attacks is the denial of particulary service or data abuse. Furthermore, in the diploma thesis configuration of router CISCO 2801 is applied in order to improve the LAN security. The deveploment board, which includes reset function, supplied circuit and interface for RS 232, was designed for crypto-module RCM 3700.
Denial of service attacks
Marek, Viktor ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
The main objective of this bachelor thesis is an analysis of denial of service attacks and the subsequent simulation of selected denial of service attacks. To achieve the goal of this thesis, the initial point in theoretical part consists of the defined main terms related to denial of service attacks. These terms are: cyber attacks, denial of service attack and distributed denial of service attacks. Further in this part of this thesis is defined description of the person who executes denial of service attacks and motives, which lead the person to these acts. At the conclusion of the theoretical part of the thesis are mentioned several classifications of denial of service attacks. The practical part of the thesis is then focused on the analysis of the most frequent denial of service attacks and their possible defense. Furthemore, this section also includes a general defense against denial of service attacks and the known examples of denial of service attacks younger than two years. Based on the acquired knowledge about the denial of service attacks, is in the conclusion of the practical part of the thesis made simulation of two selected methods of denial of service attacks.

National Repository of Grey Literature : 130 records found   beginprevious121 - 130  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.