| |
|
Deploying thin clients and terminal servers in various environments that differ in requirements for load and performance
Králík, Martin ; Lattenberg, Ivo (referee) ; Kouřil, Jiří (advisor)
The thesis deals with possibilities of the use of terminal servers and available virtualization technologies on Microsoft, Vmware and Citrix platforms.In the first part, technical principles for virtualization are analyzed in detail and contributions to individual technologies are compared.The second part is practically aimed and deals with the suggestion of testing methodology.The testing methodology consists of identification of key factors describing user´s behaviour, which are subsequently used for selection and dimensioning of hardware architecture.The testing methodology is transformed into a scripting language and prepared for automated tests.The realized tests can be divided into groups dealing with sever load performance, monitoring data transfer, and mapping of the system time response to user´s stimulation.Thin and software clients are computed on the clients side.Performance characterizations of RDP and PcoIP protocols are monitored and compared here. On the basis of the results of performed tests two case studies for computing thin clients in the environment of The Department of Telecommunications,Brno university of Technology and in a basic school are elaborated. The first case study intended for The Department of Telecommunications is concerned with computing of VMware View technology for 150 clients. The second one supposes to compute Microsoft Remote Desktop Services in the system enviroment of a basic school for 15 clients.
|
|
Deployment and Enhancement of Tool for Capturing RDP Attacks
Snášel, Daniel ; Hranický, Radek (referee) ; Zobal, Lukáš (advisor)
Honeypots are widely used in computer security research. Their task consists of assisting security researchers in gaining valuable information about network attackers. This thesis deals with the design and improvement of the existing PyRDP honeypot. First, honeypots in general are described along with the basic concept of those. Then, the issues of the remote desktop and its vulnerability are described. Finally, the improvements of already existing highly interactive PyRDP honeypot are proposed and implemented. This tool has been properly tested and the analyzed data were obtained from its deployment.
|
|
Detection of Brute-Force Password Attack in Network Traffic
Hurta, Marek ; Grégr, Matěj (referee) ; Žádník, Martin (advisor)
This bachelor's thesis is aimed at monitoring of computer networks using IP flows. It describes NEMEA framework which is used for creating modules. These modules are able to detect network anomalies and attacks. Next part describes a few methods how SSH, RDP and Telnet protocols could be attacked. Following chapters analyze some types of attacks such as Dictionary or Brute-Force attack and tries to find their common characteristics. Based on this analysis, signature of attack is created. Proposed detection algorithm uses these signatures for computing detection thresholds which are used in histogram analysis. Finally, results of proposed detection algorithm are compared with the results from other known methods.
|
|
Deployment and Enhancement of Tool for Capturing RDP Attacks
Snášel, Daniel ; Hranický, Radek (referee) ; Zobal, Lukáš (advisor)
Honeypots are widely used in computer security research. Their task consists of assisting security researchers in gaining valuable information about network attackers. This thesis deals with the design and improvement of the existing PyRDP honeypot. First, honeypots in general are described along with the basic concept of those. Then, the issues of the remote desktop and its vulnerability are described. Finally, the improvements of already existing highly interactive PyRDP honeypot are proposed and implemented. This tool has been properly tested and the analyzed data were obtained from its deployment.
|
|
Peer to peer systém pro vzdálené ovládání počítače
LEJTNAR, Michal
This thesis deals with creating of decentralized peer to peer system designed for remote control of computers. P2P network and single nodes in this network is inspired by hybrid peer-to-peer network architecture used by Skype application. The application uses terminal services available in operation system Windows for remote control of computers. Namely, MS Remote Desktop and MS Remote Assistance is used. The entire application is created in programing language C#.
|
|
Detection of Brute-Force Password Attack in Network Traffic
Hurta, Marek ; Grégr, Matěj (referee) ; Žádník, Martin (advisor)
This bachelor's thesis is aimed at monitoring of computer networks using IP flows. It describes NEMEA framework which is used for creating modules. These modules are able to detect network anomalies and attacks. Next part describes a few methods how SSH, RDP and Telnet protocols could be attacked. Following chapters analyze some types of attacks such as Dictionary or Brute-Force attack and tries to find their common characteristics. Based on this analysis, signature of attack is created. Proposed detection algorithm uses these signatures for computing detection thresholds which are used in histogram analysis. Finally, results of proposed detection algorithm are compared with the results from other known methods.
|
| |
|
Deploying thin clients and terminal servers in various environments that differ in requirements for load and performance
Králík, Martin ; Lattenberg, Ivo (referee) ; Kouřil, Jiří (advisor)
The thesis deals with possibilities of the use of terminal servers and available virtualization technologies on Microsoft, Vmware and Citrix platforms.In the first part, technical principles for virtualization are analyzed in detail and contributions to individual technologies are compared.The second part is practically aimed and deals with the suggestion of testing methodology.The testing methodology consists of identification of key factors describing user´s behaviour, which are subsequently used for selection and dimensioning of hardware architecture.The testing methodology is transformed into a scripting language and prepared for automated tests.The realized tests can be divided into groups dealing with sever load performance, monitoring data transfer, and mapping of the system time response to user´s stimulation.Thin and software clients are computed on the clients side.Performance characterizations of RDP and PcoIP protocols are monitored and compared here. On the basis of the results of performed tests two case studies for computing thin clients in the environment of The Department of Telecommunications,Brno university of Technology and in a basic school are elaborated. The first case study intended for The Department of Telecommunications is concerned with computing of VMware View technology for 150 clients. The second one supposes to compute Microsoft Remote Desktop Services in the system enviroment of a basic school for 15 clients.
|
| |