National Repository of Grey Literature 11 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.
Cyber Attacks in JMeter
Klimeš, Jan ; Člupek, Vlastimil (referee) ; Číka, Petr (advisor)
Bachelor thesis deals with the security of computer networks based on TCP/IP protocol stack. The main aim is to create extension modules for application JMeter that add features to the software generate DoS attacks, SYN flood, UDP flood, DNS Server attack and DNS Amplification using applications Trafgen. The theoretical part generally describes cyber attacks, associated with network protocols and application JMeter itself. The practical part contains a description of the graphical interface of the expansion modules, each class which the modules consist of and test results.
Detection of Cyber Attacks in Local Networks
Sasák, Libor ; Gerlich, Tomáš (referee) ; Malina, Lukáš (advisor)
This bachelor thesis focuses on the detection of attacks in the local network and the use of open source tools for this purpose. The first chapter deals with cyber attacks and also describes some of them. The second chapter focuses primarily on intrusion detection systems in general and also mentions and describes some open source systems. The third chapter briefly deals with the general division of attack detection methods. The fourth chapter introduces and describes the selected tool Suricata, which is also tested in the fifth chapter in the detection of various attacks, during which the behaviour and output of this tool are tracked. In the sixth chapter, the ARPwatch tool is presented and tested for ARP spoofing attack detection. The seventh and eighth chapters deal with the design and successful implementation of an attack detection system that provides output in the form of logs indicating malicious or suspicious traffic on the network. The ninth chapter deals with the design and implementation of the application with a graphical user interface, which clearly presents the mentioned logs and also allows other operations, including the essential control of the detection tools.
Cyber Threat Intelligence: A Proposal of a Threat Intelligence Cycle from an Enterprise Perspective
Meli Tsofou, Cedric ; Butler, Eamonn (advisor) ; Střítecký, Vít (referee) ; Fitzgerald, James (referee)
The number of cyber attacks over the last decade has been increasing sharply while being more and more targeted and sophisticated at the same time. These types of targeted and sophisticated attacks are called advanced persistent threats (APTs) and cause lots of damages to companies through data losses, injecting viruses, amongst others. While cyber threat intelligence has been recognized by experts as an efficient tool to combat APTs, its implementation has been rather slow mainly due to a lack in clarity, consensus, and little academic research as to what exactly is cyber threat intelligence from the perspective of enterprise cyber security. Therefore, there is need to provide a unifying definition of cyber threat intelligence and its creation process from enterprise perspective. Through the lens of comparative analysis, this paper aims to challenge the stability of currently existing cyber threat intelligence cycles and definitions by a thematic analysis of various cyber security white papers and academic literature. Qualitative analysis will equally permit to have an insider view of the field and forge subjective opinions and allow for ambiguity, contradiction, and the generation of new ideas.
The Potential of Cyber Threats in the Critical Energy Infrastructure
Starý, Jan ; Schmidt, Nikola (advisor) ; Karásek, Tomáš (referee)
Diploma thesis analyses the potential of Cyber Threats towards critical energy infrastructure in terms of network theories originating in graph theories, complex networks and technological possibilities how to compromise security of networks belonging to critical infrastructure. By the analysis of defined dependent and independent variables the author finds out how networks behave under which circumstances, what means exist in the field of network security and if adopted measures to increase security are in accordance with the effort of creation safe and decentralized system of critical energy infrastructure. Main emphasis is put on the concept of smart grids as possible solution of decentralization. In these terms technical means of security are studied especially with emphasis on SCADA (Supervisory Control And Data Acquisition) systems and the Internet as one of the essential component of communication in modern communication technologies.
Detection of Cyber Attacks in Local Networks
Sasák, Libor ; Gerlich, Tomáš (referee) ; Malina, Lukáš (advisor)
This bachelor thesis focuses on the detection of attacks in the local network and the use of open source tools for this purpose. The first chapter deals with cyber attacks and also describes some of them. The second chapter focuses primarily on intrusion detection systems in general and also mentions and describes some open source systems. The third chapter briefly deals with the general division of attack detection methods. The fourth chapter introduces and describes the selected tool Suricata, which is also tested in the fifth chapter in the detection of various attacks, during which the behaviour and output of this tool are tracked. In the sixth chapter, the ARPwatch tool is presented and tested for ARP spoofing attack detection. The seventh and eighth chapters deal with the design and successful implementation of an attack detection system that provides output in the form of logs indicating malicious or suspicious traffic on the network. The ninth chapter deals with the design and implementation of the application with a graphical user interface, which clearly presents the mentioned logs and also allows other operations, including the essential control of the detection tools.
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.
The Potential of Cyber Threats in the Critical Energy Infrastructure
Starý, Jan ; Schmidt, Nikola (advisor) ; Karásek, Tomáš (referee)
Diploma thesis analyses the potential of Cyber Threats towards critical energy infrastructure in terms of network theories originating in graph theories, complex networks and technological possibilities how to compromise security of networks belonging to critical infrastructure. By the analysis of defined dependent and independent variables the author finds out how networks behave under which circumstances, what means exist in the field of network security and if adopted measures to increase security are in accordance with the effort of creation safe and decentralized system of critical energy infrastructure. Main emphasis is put on the concept of smart grids as possible solution of decentralization. In these terms technical means of security are studied especially with emphasis on SCADA (Supervisory Control And Data Acquisition) systems and the Internet as one of the essential component of communication in modern communication technologies.
Cyber Attacks in JMeter
Klimeš, Jan ; Člupek, Vlastimil (referee) ; Číka, Petr (advisor)
Bachelor thesis deals with the security of computer networks based on TCP/IP protocol stack. The main aim is to create extension modules for application JMeter that add features to the software generate DoS attacks, SYN flood, UDP flood, DNS Server attack and DNS Amplification using applications Trafgen. The theoretical part generally describes cyber attacks, associated with network protocols and application JMeter itself. The practical part contains a description of the graphical interface of the expansion modules, each class which the modules consist of and test results.
Denial of service attacks
Marek, Viktor ; Klíma, Tomáš (advisor) ; Veber, Jaromír (referee)
The main objective of this bachelor thesis is an analysis of denial of service attacks and the subsequent simulation of selected denial of service attacks. To achieve the goal of this thesis, the initial point in theoretical part consists of the defined main terms related to denial of service attacks. These terms are: cyber attacks, denial of service attack and distributed denial of service attacks. Further in this part of this thesis is defined description of the person who executes denial of service attacks and motives, which lead the person to these acts. At the conclusion of the theoretical part of the thesis are mentioned several classifications of denial of service attacks. The practical part of the thesis is then focused on the analysis of the most frequent denial of service attacks and their possible defense. Furthemore, this section also includes a general defense against denial of service attacks and the known examples of denial of service attacks younger than two years. Based on the acquired knowledge about the denial of service attacks, is in the conclusion of the practical part of the thesis made simulation of two selected methods of denial of service attacks.

National Repository of Grey Literature : 11 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.