National Repository of Grey Literature 3 records found  Search took 0.01 seconds. 
Anonymization of users when collecting network traffic
Hamár, Lukáš ; Blažek, Petr (referee) ; Sikora, Marek (advisor)
This thesis deals with anonymization of data, which could lead to disclosure of the identity of end users in network traffic. Work describes algorithms by which individual data parts are anonymized and also tools which use these techniques for network traffic anonymization. The next part of the thesis describes construction of a laboratory network, in which is the network traffic captured, containing pcap and NetFlow data. With using of the captured data, the anonymization tools are tested and the results are compared. In the last part of the thesis is created graphical interface for one of the tested anonymization softwares.
Anonymization of users when collecting network traffic
Hamár, Lukáš ; Blažek, Petr (referee) ; Sikora, Marek (advisor)
This thesis deals with anonymization of data, which could lead to disclosure of the identity of end users in network traffic. Work describes algorithms by which individual data parts are anonymized and also tools which use these techniques for network traffic anonymization. The next part of the thesis describes construction of a laboratory network, in which is the network traffic captured, containing pcap and NetFlow data. With using of the captured data, the anonymization tools are tested and the results are compared. In the last part of the thesis is created graphical interface for one of the tested anonymization softwares.
Anonymization tools on the Internet
Techlovský, Stanislav ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
The Bachelor thesis deals with anonymizing user on the Internet and with the use of different anonymization tools. The first part describes the causes and threats in the event of disturbance anonymous users on the Internet. It also acquaints the reader with the environment that allows anonymous and main anonymization tools. The second part is focused on the Raspberry Pi minicomputer and its configuration and usage as TOR anonymizing tool. The conclusion is devoted to comparing the main anonymization tools with modifications Raspberry Pi Onion Routing and evaluation.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.