National Repository of Grey Literature 22 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Time Synchronization in Computer Networks
Matoušek, Denis ; Kořenek, Jan (referee) ; Martínek, Tomáš (advisor)
The master's thesis deals with design of a solution for time synchronization in computer networks that is a crucial problem of many network applications. Based on analysis of protocols for time synchronization, PTP protocol was chosen as an appropriate candidate. The thesis describes the implementation of the design for a special network interface card and demonstrates features of the solution in several tests. A part of the solution processing precise timestamps was implemented in FPGA chip on the network card while PTP messages are processed in a software application. Values of configurable parameters of the application were determined based on analysis of the network card properties and results of particular tests. It was achieved accuracy in order of tens of nanoseconds.
Contiki NTP Client
Luštický, Josef ; Čejka, Rudolf (referee) ; Kašpárek, Tomáš (advisor)
This BSc Thesis was performed during a study stay at the RheinMain University of Applied Sciences in Wiesbaden, Germany. The purpose of this thesis is to describe the operating system Contiki for embedded systems, NTP time synchronisation protocol and to design and implement an NTP client for the Contiki operating system.
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.
Implementation of plugins for JMeter
Švehlák, Milan ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
This thesis discusses the load testing tool JMeter and its opportunities for expansion by modules carrying out cyber attacks of the type Denial of Service (DoS). To begin with, there is a theoretical overview of cyber attacks of this type. The following chapter, talks about the JMeter tool, namely its functions and expansion options. After that, it is proceeded to the actual design and realization of the modules. The module implementing the attack HTTP Flood is created first. This module uses internal functions of the program JMeter. This new module is tested. Next chapter folows the procedure of creating modules, that use external generator of network traffic. Modules SYN Flood, ICMP Flood and NTP Flood are implemented using the generator Trafgen. Module implementing attack Slowloris uses a Python script as a generator of the attack. Finally, all the new modules are tested.
Computer Identity Based on Its Internal Clock Skew
Franková, Barbora ; Matoušek, Petr (referee) ; Polčák, Libor (advisor)
Thesis deals with remote computer identification based on its internal clock skew. It describes various methods to collect and evaluate time-related data extracted from TCP, ICMP and Javascript. Software package that implements some of those methods is attached as well. During the work, many experiments were carried out to find out possible effects of certain factors. Tests were aimed on software (operation systems, web browsers and time synchronization) as well as hardware (temperature, power source, distance and network connection type) of the remote systems. Interesting results were discovered in areas of IPv4/IPv6 address pairing and NTP time synchronization.
Experimental Evaluation of Clock Synchronization for Networked Control Systems
Pacner, Jan ; Polčák, Libor (referee) ; Ryšavý, Ondřej (advisor)
Within this topic, a testing environment is built, where different clock synchronization methods are evaluated in order to establish a maximal achievable clock precision in a distributed SCADA system based on the QNX operating system. Furthermore a measurement of parameters of communication for different technologies and circumstances is taken. For this purpose, porting of the PTP protocol to QNX OS is necessary.
Navigation System for Pilots
Kryl, Jan ; Vlk, Jan (referee) ; Mlích, Jozef (advisor)
This diploma thesis concerns design and creation of a navigational system as a tool for pilots of helicopters and ultralight planes. Choosing required functions is critical part for realization of this project. The paper also contains description of draft of application.
Digital Clock to be set using the NTP Protocol
Vykydal, Lukáš ; Provazník, Ivo (referee) ; Sekora, Jiří (advisor)
The goal of this work is the principle of NTP synchronization and required level of network communication. In the second part the work describes design of digital clock which is synchronized using this technique. That way we achieve automatic time adjustment and keeping the time within reasonable error.
lmprovement Proposal of Network Services Model for Techniserv IT s.r.o. company
Lavický, Jindřich ; Hanzlík, Jiří (referee) ; Ondrák, Viktor (advisor)
The bachelor thesis describes a proposal of network services model for Techniserv IT s.r.o. company. It analyses the present state of IT infrastructure in organization and suggests appropriate and economical solutions. It describes constituent areas of network services and their advantages. In detail, it focuses on the area of network services implementation, which is crucial for this type of work. At the end, it proposes solutions and evaluates their assets for a company.
Vulnerabilities assessment for industrial protocols
Zahradník, Jiří ; Fujdiak, Radek (referee) ; Blažek, Petr (advisor)
Thesis deals with testing of selected vulnerabilities from the IEC 61850 standard and following design of mitigation measures for selected vulnerabilities. Author simulated vulnerabilities of the GOOSE protocol, NTP attack and attack ona MMS client. Those attacks were GOOSE stNum, GOOSE semantic, GOOSE test bit,GOOSE replay, GOOSE flood, NTP spoofing and MMS password capture. Attacks on protocols GOOSE and MMS were successful, attack on NTP was only partially successful since the device confirmed receiving spoofed time, however it did not change it’s inner clock. Author then designed possible mitigation measures. Tool for automatic testing of selected vulnerabilities, parser for the GOOSE protocol and lightweight multiplatform parser for configuration files were created as well.The outcome of this thesis allows the implementation of lager scale tool for penetration testing of industrial networks as well as it allows implementation of discussed mitigation measures.

National Repository of Grey Literature : 22 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.