National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Generator of Cyber Attacks
Halaška, Peter ; Burda, Karel (referee) ; Hajný, Jan (advisor)
This work deals with the security of computer networks based on TCP/IP protocol stack. The main objective is to develop a generator of DoS flooding attacks which carries out attacks such SYN flood, RST flood, UDP flood, ICMP flood, ARP flood, DNS flood and DHCP starvation. The theoretical part describes the features of the mentioned attacks and protocols or mechanisms associated with them. Next part deals with the comparison of selected tools (Hping3, Mausezahn, Trafgen) in terms of number of packets per second (pps) and the link utilization (MB/s). The practical part describes design and implementation of the new attacking tool. There is explained the importance of it’s individual modules, it’s installation and usage options. New tool is also being tested. Then there is described the development, options and installation of control interface which is in the form of web application.
KANBAN System Support in ERP System
Milichovský, František ; Michalčíková, Jitka (referee) ; Videcká, Zdeňka (advisor)
The target of this thesis is to find and suggest information process support of planning and production process management. Searched solution respects current quality methods of peoduction management as Kanban and Just-in-Time.
KANBAN System Support in ERP System
Milichovský, František ; Michalčíková, Jitka (referee) ; Videcká, Zdeňka (advisor)
The target of this thesis is to find and suggest information process support of planning and production process management. Searched solution respects current quality methods of peoduction management as Kanban and Just-in-Time.
Generator of Cyber Attacks
Halaška, Peter ; Burda, Karel (referee) ; Hajný, Jan (advisor)
This work deals with the security of computer networks based on TCP/IP protocol stack. The main objective is to develop a generator of DoS flooding attacks which carries out attacks such SYN flood, RST flood, UDP flood, ICMP flood, ARP flood, DNS flood and DHCP starvation. The theoretical part describes the features of the mentioned attacks and protocols or mechanisms associated with them. Next part deals with the comparison of selected tools (Hping3, Mausezahn, Trafgen) in terms of number of packets per second (pps) and the link utilization (MB/s). The practical part describes design and implementation of the new attacking tool. There is explained the importance of it’s individual modules, it’s installation and usage options. New tool is also being tested. Then there is described the development, options and installation of control interface which is in the form of web application.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.