National Repository of Grey Literature 9 records found  Search took 0.00 seconds. 
Analysis of Security Incidents from Network Traffic
Serečun, Viliam ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
Analýza bezpečnostních incidentů se stala velmi důležitým a zajímavým oborem počítačové vědy. Monitorovací nástroje a techniky pomáhají při detekci a prevenci proti tímto škodlivým aktivitám. Tento dokument opisuje počítačové útoky a jejich klasifikaci. Také jsou tady opsaný některé monitorovací nástroje jako Intrusion Detection System nebo NetFlow protokol a jeho monitorovací software. Tento dokument také opisuje konfiguraci experimentální topologie a prezentuje několik experimentů škodlivých aktivit, které byly detailně kontrolovány těmito monitorovacími nástroji.
Attack Techniques on ELF/PE Files and Detection
Brunai, Adam ; Jurnečka, Peter (referee) ; Barabas, Maroš (advisor)
This thesis deals with the attack techniques on executable files in Windows OS. Its main goal is to analyze the file infection techniques in terms of their implementation and detection. Before the analysis, the reader will become familiar with executable files. Part of the thesis is demonstration tool named "pein" that solves implementation of infection. In conclusion, the work deals with the malware analysis and detection techniques.
Attack Techniques on ELF/PE Files and Detection
Brunai, Adam ; Jurnečka, Peter (referee) ; Barabas, Maroš (advisor)
This thesis deals with the attack techniques on executable files in Windows OS. Its main goal is to analyze the file infection techniques in terms of their implementation and detection. Before the analysis, the reader will become familiar with executable files. Part of the thesis is demonstration tool named "pein" that solves implementation of infection. In conclusion, the work deals with the malware analysis and detection techniques.
Indirect Approach To The H-2(d,p)H-3 Reaction Study
Sparta, R. ; Pizzone, R. G. ; Spitaleri, C. ; Aliotta, M. ; Burjan, Václav ; Cherubini, S. ; Crucilla, V. ; Gulino, M. ; Hons, Zdeněk ; Kiss, G. G. ; Kroha, Václav ; La Cognata, M. ; Lamia, L. ; McCleskey, M. ; Mrázek, Jaromír ; Puglia, S. M. R. ; Rapisarda, G. G. ; Romano, S. ; Sergi, M. L. ; Trache, L. ; Tumino, A.
In order to understand primordial and stellar nucleosynthesis, we have studied H-2(d,p)H-3 reaction at 0.4 MeV down to astrophysical energies. Knowledge of its S-factor is interesting also to plan reactions for fusion reactors to produce energy. The H-2(d,p)H-3 reaction has been studied through the Trojan Horse Method applied to the three-body reaction H-2(He-3,pt)H, at beam energy of 17 MeV. Once selection of protons and tritons detected in coincidence and the selection of quasi-free events, the obtained S-factor is compared with direct measurements. Such data are in agreement with the direct ones and a pole invariance test has been obtained comparing the present results with another H-2(d,p)H-3 THM measurements, where a different spectator particle was employed.
Malware analysis methods and tools
Kuľha, Róbert ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis adresses the topic of malware, a malicious software on the internet. Theoretical part is divided into several chapters, describing malware, its risks and prevention. In the first chapter, reader learns the definition of malware, its distribution and the history until presence. Content of another chapter will include anticipation of development and impact on society. At the end of the teoretical part, risks and threats, prevention and protection will be described. Anti-malware programs will be also described. Part of the practical part is the analysis of the actual malware behaviour applied to the PC. It deals with the construction, functionality and lifecycle of malware. Goal of this bachelor thesis is to familiarize readers with the ambush that arise during carelessness and inadequate protection during the use of the internet. At the same time, reader will learn in the practical part about how malware works and how to proceed with its removal.
Malware and comparison of antivirus products
Hamouzová, Aneta ; Luc, Ladislav (advisor) ; Novotný, Jakub (referee)
This bachelor thesis deals with the issue of possible danger in the Internet environment, namely malicious software. It is a variety of computer viruses, worms and Trojans that are comprehensively called malware. This risk should be closely monitored because its development is constantly moving forward and everyone should be familiar with this topic. The theoretical part includes the characteristics of malware - clarification of the concept and definition. The following part is history, which is described from initial ideas, the first malicious code in the 70's, and other well-known programs. It is led to the present day which is mainly focused on today's goals and direction of development of further malware. Next part involves the distribution of malware to basic, other special types and other such related forms. The final part describes the preventive and protective measures, and how to reveal and what to do if computer is infected. On this last section follows up a practical part, in which is analyzed antivirus protection, which is available in Czech and world market. Based on this analysis is done comparison of selected free antivirus programs. These are compared according to established criteria, such as web pages, installation, the use, user settings, appearance and ability to detect malware. The goal is to determine the safest and most comfortable user program. The result is used for ordinary users as possible support when they are choosing antivirus to their own computer.
Analysis of Security Incidents from Network Traffic
Serečun, Viliam ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
Analýza bezpečnostních incidentů se stala velmi důležitým a zajímavým oborem počítačové vědy. Monitorovací nástroje a techniky pomáhají při detekci a prevenci proti tímto škodlivým aktivitám. Tento dokument opisuje počítačové útoky a jejich klasifikaci. Také jsou tady opsaný některé monitorovací nástroje jako Intrusion Detection System nebo NetFlow protokol a jeho monitorovací software. Tento dokument také opisuje konfiguraci experimentální topologie a prezentuje několik experimentů škodlivých aktivit, které byly detailně kontrolovány těmito monitorovacími nástroji.
Malware, internet threat - types and protection
Vaňková, Aneta ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor thesis deals the world malware and what this word means. The theoretical part describes the particular division of malware, its history and development from the 70s to the present. Other chapters include targets of hackers, why malware exists and what is the motivation of its authors. Conclusion of the theoretical part describes other threats which are on the Internet. The practical part includes two explorations. The first is dedicated to antivirus, it represents the most frequently used programs, their functionality and user interface. Test of infected file demonstrates the functionality and level of security. Final summary assists users in selecting the appropriate antivirus for their computer. The second is realized as a questionnaire which determines the awareness of the general public about the danger of malware and defence against it. The conclusion evaluate results of explorations of the practical part, it compares targets of this bachelor thesis and monitors their achievement or provides information about extension of explorations.
Malware - threats and countermeasures
Hejduk, Jakub ; Luc, Ladislav (advisor) ; Veber, Jaromír (referee)
This bachelor's thesis addresses the issue of a threat in the area of computers and internet networks, malware. It defines what malware is, its various types and the history in terms of occurrence and actions. It also provides the reader with insight into malware's functionality and how it threatens users. Furthermore, the thesis contains examples of some current well-known threats. A dossier on antivirus and antispyware software is also included. It is essentially a summary of their functions, properties, benchmark results and a list of countermeasures it equips the user with. The last section of the theoretical part of the thesis is a prediction of the future regarding the evolution of these threats and how will they affect the user. A considerable part of this work is a survey providing a summary of the current level of malware knowledge among people. I intend to determine if people are aware of these threats, their ability to defend themselves against them and also whether they already encountered this issue and if so, how did they handle it. This thesis should increase awareness about malware to make people understand what it is capable of in the environment of an unsecured computer. Ultimately, I am going to present the results of the survey and evaluate the depths of knowledge about malware among people.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.