National Repository of Grey Literature 7 records found  Search took 0.01 seconds. 
Converged Networks and Traffic Tomography by Using Evolutionary Algorithms
Oujezský, Václav ; Sýkora, Jiří (referee) ; Polívka, Michal (referee) ; Škorpil, Vladislav (advisor)
Nowadays, the traffic tomography represents an integral component in converged networks and systems for detecting their behavioral characteristics. The dissertation deals with research of its implementation with the use of evolutionary algorithms. The research was mainly focused on innovation and solving behavioral detection data flows in networks and network anomalies using tomography and evolutionary algorithms. Within the dissertation has been proposed a new algorithm, emerging from the basics of the statistical method survival analysis, combined with a genetics’ algorithm. The proposed algorithm was tested in a model of a self-created network probe using the Python programming language and Cisco laboratory network devices. Performed tests have shown the basic functionality of the proposed solution.
Zero Copy Packet Processing
Plotěný, Ondřej ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
Cílem této magisterské práce je návrh a implementace síťové sondy pro sledování toků na 10GbE rozhraní. Text se zabývá přehledem GNU/Linux nástrojů využívaných ve vysokorychlostních sítích a principů jejich fungování. Dále pak je uveden návrh a implementace sondy využívající mechanismu zero-copy pro sledování provozu na 10GbE rozhraní. Aplikace využívá Expresní datové cesty (XDP) a jeho AF_XDP soketu pro zachycení provozu na rozhraní. Jako testovací platforma byla vybrána platforma NETX používaná na FIT VUT.
Security Tool for wifi Network
Hala, Martin ; Henzl, Martin (referee) ; Kačic, Matej (advisor)
The main purpose of this tool is testing wireless networks security level for both personal and commercial use. It is based on latest knowledge about security of wireless networks. Key features are: portability - implemented on live linux distro, simple manipulation - well aranged GUI, testing - rich options of tests selection, security level evaluation - recommendations consequent on NIST standard.
Network probe module for energy protocols analysis
Nguyen, Minh Hien ; Burda, Karel (referee) ; Blažek, Petr (advisor)
Energy protocols are already increasingly entering our daily lives. With the development of smart grids, meters and appliances, more and more customers are demanding faster and more accurate consumption readings, as well as efficient information about the status of the energy network and control over energy use. The theoretical part of this master's thesis focuses primarily on the description of energy standards and protocols (IEC 60870, IEC 61850, DLMS and DNP3). Before the design of the analyzer, the network probe was first tested for load and stress. Once the criteria were met a DLMS energy protocol analysis module was created. The output is a set of statistics and values and can be used as a basis for machine learning and artificial intelligence. Furthermore, the thesis described the possible attacks on the energy protocol and proposes suitable detection methods based on the Suricata module.
Zero Copy Packet Processing
Plotěný, Ondřej ; Podermański, Tomáš (referee) ; Grégr, Matěj (advisor)
Cílem této magisterské práce je návrh a implementace síťové sondy pro sledování toků na 10GbE rozhraní. Text se zabývá přehledem GNU/Linux nástrojů využívaných ve vysokorychlostních sítích a principů jejich fungování. Dále pak je uveden návrh a implementace sondy využívající mechanismu zero-copy pro sledování provozu na 10GbE rozhraní. Aplikace využívá Expresní datové cesty (XDP) a jeho AF_XDP soketu pro zachycení provozu na rozhraní. Jako testovací platforma byla vybrána platforma NETX používaná na FIT VUT.
Converged Networks and Traffic Tomography by Using Evolutionary Algorithms
Oujezský, Václav ; Sýkora, Jiří (referee) ; Polívka, Michal (referee) ; Škorpil, Vladislav (advisor)
Nowadays, the traffic tomography represents an integral component in converged networks and systems for detecting their behavioral characteristics. The dissertation deals with research of its implementation with the use of evolutionary algorithms. The research was mainly focused on innovation and solving behavioral detection data flows in networks and network anomalies using tomography and evolutionary algorithms. Within the dissertation has been proposed a new algorithm, emerging from the basics of the statistical method survival analysis, combined with a genetics’ algorithm. The proposed algorithm was tested in a model of a self-created network probe using the Python programming language and Cisco laboratory network devices. Performed tests have shown the basic functionality of the proposed solution.
Security Tool for wifi Network
Hala, Martin ; Henzl, Martin (referee) ; Kačic, Matej (advisor)
The main purpose of this tool is testing wireless networks security level for both personal and commercial use. It is based on latest knowledge about security of wireless networks. Key features are: portability - implemented on live linux distro, simple manipulation - well aranged GUI, testing - rich options of tests selection, security level evaluation - recommendations consequent on NIST standard.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.