National Repository of Grey Literature 133 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Advanced tool for generating modern Slow DoS attacks
Hrůza, Tomáš ; Člupek, Vlastimil (referee) ; Sikora, Marek (advisor)
In today’s world, cyber threats are becoming increasingly sophisticated. Those threats include SDoS (Slow Denial of Service) and SDDoS (Slow Distributed Denial of Service) attacks, which employ advanced methods to disrupt normal service operations. These attacks are particularly difficult to detect and are effective because they simulate the behavior of legitimate users with slow internet connections. The topic of SDoS attacks is relatively new and not thoroughly documented. To respond to potentially newly devel- oped attacks, it is necessary to understand the principles of currently known attacks and have the practical capability to create them in order to develop effective countermeasures in the future. This thesis focuses on the development of an advanced tool for generating modern SDoS attacks. The main contribution of this work is the enhancement of the generator to create distributed attacks, the creation of an intuitive interface, and more options for monitoring the progress of individual attacks. The theoretical part introduces the topic of internet connection establishment and explains the properties of TCP and IP protocols in detail. It then clarifies the theory of secure communication over the internet using the HTTPS protocol and provides a comparison of currently used web servers. The final theoretical section addresses the topic of denial of service, discussing some types of currently known SDoS attacks, the tools that generate these attacks, and their shortcomings. Next chapter details the implementation of functionalities, which includes performance enhancements of the tool through the use of multiple processes. The developed tool features Slow Read, Slow Next, and Slow Drop attacks, as well as the ability to combine these attacks. This is followed by a description of how a local network of virtual machines was created for the purpose of testing the implemented tool. The final chapter presents the results and effectiveness of the tool in conducting SDDoS attacks against Apache and NGINX web servers in a local network.
Detailed analysis of the cybersecurity of photovoltaic systems
Turek, Adam ; Bohačík, Antonín (referee) ; Mikulášek, Michal (advisor)
Cílem diplomové práce je seznámení se s metodami útoků na fotovoltaické systémy a jejich komponenty. Dále analyzování jednotlivých typů fotovoltaických systémů, jednotlivých komponent a možných bezpečnostních nedostatků. Dále navržení a sestavení testovacího pracoviště umožnující sledování fotovoltaických prvku a síťového provozu s implementovaním několika kybernetických útoků. Práce popisuje teoretickou část fotovoltaických systémů a jejich komponent, kybernetickou bezpečnost a možné útoky. Krom toho také analýzu konkrétních zranitelností na fotovoltaické systémy, která byla provedena prostřednictvím veřejně známých databází jako je Vulners nebo Národní Databáze Zranitelností. Dále popis testovacího prostředí střídačů Solax a Solinteg, implementační nástroje a úspěšně provedenou síťovou, Modbus a kybernetickou analýzu na fotovoltaické střídače s odsimulováním útoků.
Design and implementation of a module for load testing of HTTPS requests in Apache JMeter
Čížek, Šimon ; Člupek, Vlastimil (referee) ; Šeda, Pavel (advisor)
The Bachelor Thesis focuses on DDoS attacks over the HTTPS protocol and their simulations from a single network interface. Based on the analysis of options for sending requests from spoofed IPv4 and IPv6, a plugin module was developed for Apache JMeter software. Subsequently, module impacts were tested using a created scenario on Nginx and Apache2 test servers. The conclusion presents the results of the generated load on both servers.
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.
Performance and security testing of network applications
Matej, Michal ; Martinásek, Zdeněk (referee) ; Zeman, Václav (advisor)
The aim of this Master's thesis is to design and to implement the security test in considering a resistance of the device under test to the effects of the distributed denial of service attack DDoS SYN Flood. After processing the test results is developed a protocol about security test of the device under test. In this thesis are tested two devices, namely CISCO ASA5510 firewall and a server with the specified name Server. The theoretical part of the thesis discusses the primary types of network attacks such as reconnaissance, gain access and denial of service attacks. Explained the concept of DoS and its principle, further types of DoS attacks and distributed denial of service attacks DDoS.
Neural Networks for Network Anomaly Detection
Matisko, Maroš ; Martinásek, Zdeněk (referee) ; Blažek, Petr (advisor)
This bachelor thesis is focused on creating a system to mitigate computer network attacks. One of the most common groups of attacks is Distributed Denial of Service (DDoS) attacks, against which this system should protect internal network. In the theoretical part of the thesis are described DDoS attacks, existing systems for their mitigations, neural networks principle and their use. Practical part consists of choosing communication parameters, constructing a neural network with use of these parameters, implementation of this neural network in real–time attack mitigation system and a result of testing of this system.
Detection of anomalies in network traffic using compression methods
Blažek, Libor ; Dvořák, Jan (referee) ; Blažek, Petr (advisor)
The objective of the thesis is to design a practical demonstration of the functionality of selected compression methods. The following chapters will discuss the attacks on terminals and mentioned some measures. The show will be processed using two methods development environment. The attacks will detect anomalies in the network and subsequently carried out at one of the sample data compression methods. Data will be collected as normal operation at the terminal station, and then in the attack.
Behavioral Analysis of DDoS Network Attacks
Kvasnica, Ondrej ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis deals with anomaly detection in computer networks using artificial intelligence method. Main focus is on the detection of DDoS attacks based on the information from the lower layers of the OSI model. The target is to design and implement a system that is capable of detecting different types of DDoS attacks and characterize common features among them. Selected attacks are SYN flood, UDP flood and ICMP flood. Description and feature selection of the attacks is included. Furthermore, a system is designed that evaluates whether the network traffic (organized into flows) is a DDoS attack or not. Attacks are detected using the XGBoost method, which uses supervised learning. The final model is validated using cross-validation and tested on attacks generated by the author.
Implementation of plugins for JMeter
Švehlák, Milan ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
This thesis discusses the load testing tool JMeter and its opportunities for expansion by modules carrying out cyber attacks of the type Denial of Service (DoS). To begin with, there is a theoretical overview of cyber attacks of this type. The following chapter, talks about the JMeter tool, namely its functions and expansion options. After that, it is proceeded to the actual design and realization of the modules. The module implementing the attack HTTP Flood is created first. This module uses internal functions of the program JMeter. This new module is tested. Next chapter folows the procedure of creating modules, that use external generator of network traffic. Modules SYN Flood, ICMP Flood and NTP Flood are implemented using the generator Trafgen. Module implementing attack Slowloris uses a Python script as a generator of the attack. Finally, all the new modules are tested.
Anomaly detection by neural networks
Strakoš, Jan ; Sikora, Marek (referee) ; Blažek, Petr (advisor)
This bachelor thesis is focused on anomaly detection represented as computer network attacks by neural network. One of the most common groups of attacks is Distributed Denial of Service (DDoS) attacks, which the system based on neural network should identificate. In the theoretical part of this thesis are described legitimate, non-standard and illegitimate traffic. Another part of this chapter described DDoS attacks, options of their detection, neural networks principle and their use. Practical part describe choosed communication parameters, specifying the threshold intervals of legitimate traffic, constructing a neural network which use of these parameters and threshold intervals, implementation of neural network into the system and presenting results.

National Repository of Grey Literature : 133 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.