National Repository of Grey Literature 8 records found  Search took 0.01 seconds. 
Social Networks Reconstruction of Captured Communication
Dudek, Jindřich ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
We live in a modern world surrouded by many forms of information technology. Majority of communication among people is realized through the internet and usage of social networks is everyday matter which leads to reduction of personal communincation and to higher usage of dating sites. However these sites are often a place where potentinal deliquents occure. This thesis deals with reconstruction of captured communication from social networks Lidé.cz and Xchat. Man-in-the-middle attack was used to capture data needed for analysis of communication protocols. Bachelor thesis focuses on identification of communication methods of social networks mentioned above and on analysis of their communication protocols. From these communication protocols are chosen events interesting for forensic analysis. Result of this thesis is an extension which provides support of the communication protocols for application Netfox Detective.
Communication of USB3.0 Chip with FPGA
Špeťko, Matej ; Viktorin, Jan (referee) ; Košař, Vlastimil (advisor)
SEC6NET is an abbreviation for project Modern tools for detection and mitigation of cyber criminality on the New Generation Internet. Project is focused on research and development of means for monitoring and analysing the network flow. Probes for monitoring IPv6 networks are developed within this project. Probes are using hardware acceleration based on FPGA platform. My thesis connects two technologies: FPGA and USB. The goal is to transfer data from the FPGA microchip to PC using Cypress EZ-USB FX3 microcontroller. The first part is focused on transferring data from FPGA to FX3 microcontroller. Second part describes the modification of FX3 firmware for getting maximum throughput. The last part focuses on implementing PC application for Linux operating system. The application receives data from the probe and saves them into hard drive using PCAP format.
Identities in Tunelled Networks and during Network Address Translation
Šeptun, Michal ; Marek, Marcel (referee) ; Polčák, Libor (advisor)
This thesis introduces the design and implementation of the extension of the system for lawful interception. The system is developed as a part of the Sec6Net project at FIT BUT and provides a platform for research activities in determining identities in computer networks. Parts which has the task of monitoring changes in a user's identity will be extended, so that the system is able to determine the identity even in the tunneled and translated networks. It describes the problems encountered during implementation and their solutions. There are described mechanisms for tunneling networks, mainly virtual private networks and transition mechanisms for IPv6, IP addresses and NAT variants. In the end the tests of the individual modules are described.
Lawful Interception in Software Defined Networks
Franková, Barbora ; Ryšavý, Ondřej (referee) ; Polčák, Libor (advisor)
This thesis covers utilization of software defined networks for lawful interception purposes. Based on specific implementation of lawful interception system SLIS developed by Sec6Net group, suggests improvements aiming at more precise identification of intercepted users and better effectivity of system resources. First aim is achieved by implementation of a new module for dynamic identification component while the other one alters configuration mechanism for probes and OpenFlow switches.
Communication of USB3.0 Chip with FPGA
Špeťko, Matej ; Viktorin, Jan (referee) ; Košař, Vlastimil (advisor)
SEC6NET is an abbreviation for project Modern tools for detection and mitigation of cyber criminality on the New Generation Internet. Project is focused on research and development of means for monitoring and analysing the network flow. Probes for monitoring IPv6 networks are developed within this project. Probes are using hardware acceleration based on FPGA platform. My thesis connects two technologies: FPGA and USB. The goal is to transfer data from the FPGA microchip to PC using Cypress EZ-USB FX3 microcontroller. The first part is focused on transferring data from FPGA to FX3 microcontroller. Second part describes the modification of FX3 firmware for getting maximum throughput. The last part focuses on implementing PC application for Linux operating system. The application receives data from the probe and saves them into hard drive using PCAP format.
Social Networks Reconstruction of Captured Communication
Dudek, Jindřich ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
We live in a modern world surrouded by many forms of information technology. Majority of communication among people is realized through the internet and usage of social networks is everyday matter which leads to reduction of personal communincation and to higher usage of dating sites. However these sites are often a place where potentinal deliquents occure. This thesis deals with reconstruction of captured communication from social networks Lidé.cz and Xchat. Man-in-the-middle attack was used to capture data needed for analysis of communication protocols. Bachelor thesis focuses on identification of communication methods of social networks mentioned above and on analysis of their communication protocols. From these communication protocols are chosen events interesting for forensic analysis. Result of this thesis is an extension which provides support of the communication protocols for application Netfox Detective.
Identities in Tunelled Networks and during Network Address Translation
Šeptun, Michal ; Marek, Marcel (referee) ; Polčák, Libor (advisor)
This thesis introduces the design and implementation of the extension of the system for lawful interception. The system is developed as a part of the Sec6Net project at FIT BUT and provides a platform for research activities in determining identities in computer networks. Parts which has the task of monitoring changes in a user's identity will be extended, so that the system is able to determine the identity even in the tunneled and translated networks. It describes the problems encountered during implementation and their solutions. There are described mechanisms for tunneling networks, mainly virtual private networks and transition mechanisms for IPv6, IP addresses and NAT variants. In the end the tests of the individual modules are described.
Lawful Interception in Software Defined Networks
Franková, Barbora ; Ryšavý, Ondřej (referee) ; Polčák, Libor (advisor)
This thesis covers utilization of software defined networks for lawful interception purposes. Based on specific implementation of lawful interception system SLIS developed by Sec6Net group, suggests improvements aiming at more precise identification of intercepted users and better effectivity of system resources. First aim is achieved by implementation of a new module for dynamic identification component while the other one alters configuration mechanism for probes and OpenFlow switches.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.