National Repository of Grey Literature 5 records found  Search took 0.01 seconds. 
Generating of flood attacks
Hudec, David ; Hajný, Jan (referee) ; Smékal, David (advisor)
The assessment comprises of two parts, describing theory and generating of flood attacks respectively. The first part covers flood attacks' analysis, deals with their available techniques and practices, known in the area, and a computer simulation program, revealing the behavior of a contested network as well as the attacker's procedure. In the following part, data generating solutions itself are described. These are represented by two hardware programs, adapted from existing solutions, and one C# application, created by the author. The comparison of these two approaches is included, as well as are the generation results and mitigation proposal.
Network tester
Štainer, Martin ; Člupek, Vlastimil (referee) ; Zeman, Václav (advisor)
The objective of this thesis is the issue of network parameters measuring. Measurement methodology and tester concept were designed. Based on the designed tester concept a plugin for Apache JMeter was implemented. Two experimental tests were run based on the methodology designed, with their objectives set to explore the difference in performance between QUIC and TCP protocols.
Network tester
Štainer, Martin ; Člupek, Vlastimil (referee) ; Zeman, Václav (advisor)
The objective of this thesis is the issue of network parameters measuring. Measurement methodology and tester concept were designed. Based on the designed tester concept a plugin for Apache JMeter was implemented. Two experimental tests were run based on the methodology designed, with their objectives set to explore the difference in performance between QUIC and TCP protocols.
Flood attacks generation
Hudec, David
Proposal of a high speed packet flooding device is presented in this paper. The product is based on the FPGA (Field-programmable Gate Array) platform, developed in VHDL (Very high speed integrated circuit Hardware Description Language) and set into the NetCOPE environment. It uses an existing solution of packet generator. Once done, it should be implemented on a COMBO-80G board to serve as a network stressing tool.
Generating of flood attacks
Hudec, David ; Hajný, Jan (referee) ; Smékal, David (advisor)
The assessment comprises of two parts, describing theory and generating of flood attacks respectively. The first part covers flood attacks' analysis, deals with their available techniques and practices, known in the area, and a computer simulation program, revealing the behavior of a contested network as well as the attacker's procedure. In the following part, data generating solutions itself are described. These are represented by two hardware programs, adapted from existing solutions, and one C# application, created by the author. The comparison of these two approaches is included, as well as are the generation results and mitigation proposal.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.