National Repository of Grey Literature 6 records found  Search took 0.01 seconds. 
Implement Security Service for Preventing Internet Attacks
Fajkus, Karel ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The main purpose of this work is to design and implement a system, that would allow to ban users based on their actions. Currently, cyber attacks have become very common, which leads to a necessity to develop great application and system protections. This project offers a solution, that could decrease a number of cyber attacks, and also prevent banning common users because of the same public IP address as attacker. 
Open source PBX security against attacks
Orsák, David ; Daněček, Vít (referee) ; Šilhavý, Pavel (advisor)
This master's thesis deals with open source PBX security against security attacks. In the theoretical part is detailed description of problematic about attacks that could be used on VoIP systems with high focus on the Denial of Service attack. Furthermore are in theoretical part described methods of security of initialization protocol SIP. Individual chapter is devoted to intrusion detection and prevention of IDS and IPS systems, focusing on Snort and OSSEC. In the practical part of the work was created generator of attacks against various PBX systems, which was subsequently used for detailed testing. Special tests of PBX system are then used against DoS attacks, for which was created protection in form of active elements consisting of IDS Snort & OSSEC. These are capable to provide protection in real-time. The protection was tested on particular PBX systems and in matter of comparison were measured possibilities before and after of security implementation. The output of this work is attacks generator VoIPtester and creation of configuration rules for Snort and OSSEC.
System Log Analysis
Gracik, Martin ; Kočí, Radek (referee) ; Smrčka, Aleš (advisor)
This thesis discusses system log analysis and it's usage for intrusion detection. First part is about different techniques used for log file analysis. Second part is about OSSEC, a tool which uses log analysis to detect intrusion into the system. The last part talks about design and implementation of a graphical user interface for easy configuration of OSSEC.
Implement Security Service for Preventing Internet Attacks
Fajkus, Karel ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The main purpose of this work is to design and implement a system, that would allow to ban users based on their actions. Currently, cyber attacks have become very common, which leads to a necessity to develop great application and system protections. This project offers a solution, that could decrease a number of cyber attacks, and also prevent banning common users because of the same public IP address as attacker. 
System Log Analysis
Gracik, Martin ; Kočí, Radek (referee) ; Smrčka, Aleš (advisor)
This thesis discusses system log analysis and it's usage for intrusion detection. First part is about different techniques used for log file analysis. Second part is about OSSEC, a tool which uses log analysis to detect intrusion into the system. The last part talks about design and implementation of a graphical user interface for easy configuration of OSSEC.
Open source PBX security against attacks
Orsák, David ; Daněček, Vít (referee) ; Šilhavý, Pavel (advisor)
This master's thesis deals with open source PBX security against security attacks. In the theoretical part is detailed description of problematic about attacks that could be used on VoIP systems with high focus on the Denial of Service attack. Furthermore are in theoretical part described methods of security of initialization protocol SIP. Individual chapter is devoted to intrusion detection and prevention of IDS and IPS systems, focusing on Snort and OSSEC. In the practical part of the work was created generator of attacks against various PBX systems, which was subsequently used for detailed testing. Special tests of PBX system are then used against DoS attacks, for which was created protection in form of active elements consisting of IDS Snort & OSSEC. These are capable to provide protection in real-time. The protection was tested on particular PBX systems and in matter of comparison were measured possibilities before and after of security implementation. The output of this work is attacks generator VoIPtester and creation of configuration rules for Snort and OSSEC.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.