National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Network and Application Response Time Monitoring
Lajczyk, Pavel ; Očenášek, Pavel (referee) ; Tobola, Jiří (advisor)
This bachelor's thesis describes common techniques of network and network applications response time monitoring, especially it deals with active and passive monitoring. In the next chapters of this thesis there are suggested requirements for a monitoring application. Then there are provided design and implementation of such monitoring application with web interface for management of monitoring and with graphs of measured results.
Network Protection Using NetFlow Data
Hlavatý, Ivo ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This document focuses on Cisco Netflow technology and its possible usage in monitoring networks and detecting network anomalies. Based on the analysis of attacks at the network and transport layer is designed an application for selected security threats which detects its presence. The implementation section provides a system for predicting network traffic and related detecting deviations from the baseline on the basis of statistical data. Use of NetFlow technolgy is demonstrated on examples where the results of other current security and monitoring techniques have failed or did not provide sufficiently good results.
Network and Application Response Time Monitoring
Lajczyk, Pavel ; Očenášek, Pavel (referee) ; Tobola, Jiří (advisor)
This bachelor's thesis describes common techniques of network and network applications response time monitoring, especially it deals with active and passive monitoring. In the next chapters of this thesis there are suggested requirements for a monitoring application. Then there are provided design and implementation of such monitoring application with web interface for management of monitoring and with graphs of measured results.
Network Protection Using NetFlow Data
Hlavatý, Ivo ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This document focuses on Cisco Netflow technology and its possible usage in monitoring networks and detecting network anomalies. Based on the analysis of attacks at the network and transport layer is designed an application for selected security threats which detects its presence. The implementation section provides a system for predicting network traffic and related detecting deviations from the baseline on the basis of statistical data. Use of NetFlow technolgy is demonstrated on examples where the results of other current security and monitoring techniques have failed or did not provide sufficiently good results.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.