National Repository of Grey Literature 96 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Tool for Analysis of JavaScript to Detect DOM XSS Vulnerabilities in Web Applications
Barnová, Diana ; Polčák, Libor (referee) ; Homoliak, Ivan (advisor)
The main goal of this thesis is to design a tool for analisys of JavaScript to detect DOM--based XSS vulnerability in web applications. Then to implement it and test it ethically. Cross--side Scripting (XSS) is one of the most common injection attacks on web applications that insert malicious code in an otherwise trusted site. An interpreted response by the browser is required for the detection and subsequent exploitation of DOM--based XSS vulnerabilities, therefore the tool captures the response from the Burp Suite proxy server. The analysis of this response uses two separate regular expressions aimed at searching for sources and sinks in the source code of the response. A set of payloads is used to determine if a site is exploitable. Subsequently, the user is warned of the possible danger. The output is a text file summarizing the results for the URL.
Key Management Server for vSphere 7.0 Environment
Dejmal, David ; Homoliak, Ivan (referee) ; Malinka, Kamil (advisor)
The purpose of this work is to create a functional Key Management Server (KMS) with basic functionality for the vSphere 7.0 platform. It should communicate with vCenter and together provide the functionality to encrypt individual virtual machines. Commercial solutions in this area are very expensive and therefore the question arose whether the entire server can be implemented using freely available tools. Since vCenter uses the publicly available KMIP protocol to communicate with KMS, it turns out to be possible. The resulting implementation is based on the Ubuntu 20.04 operating system. The PyKMIP library for python 3.9 was used for the application logic and ETCD as storage. To connect the application and storage, a custom module was created. Bash scripts were created for whole installation and all of the necessary configuration. The overall result is fully functional and no flaws were found during testing. This work was done in cooperation with Master Internet, s.r.o.
Automated Testing of Smart Cards
Yadlouski, Pavel ; Očenášek, Pavel (referee) ; Homoliak, Ivan (advisor)
Tato bakalářská práce se zabývá automatizovaným testováním podpory Smart Karet v RHEL. Problém manuálního testování je vyřešen vytvořením nové testovací knihovny. Tato knihovna je zodpovědná za konfiguraci testovacího prostředí a poskytuje testerovi rozhraní pro automatizovanou manipulaci s tímto prostředím. Jako výsledek jsme vytvořili univerzální knihovnu pro testování podpory smart karet. Primárním cílem je implementace samotné knihovny, pak následující převod existujících manuálních testů do kódu za pomoci teto knihovny a zprovozněni těchto testů ve vnitřní pipelině Red Hat.
Analysis of Malicious Encrypted Network Traffic
Dubec, Branislav ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis deals with the analysis of malicious encrypted network traffic using artificial intelligence methods. A solution is to create a system for detecting security intrusions using detection analysis methods. Theoretical part describes methods of anomaly detection, and explains the concept of artificial neural network. In the practical part, it experiments with various anomaly detection techniques in order to obtain the best results.
Behavioral Analysis of DDoS Network Attacks
Kvasnica, Ondrej ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis deals with anomaly detection in computer networks using artificial intelligence method. Main focus is on the detection of DDoS attacks based on the information from the lower layers of the OSI model. The target is to design and implement a system that is capable of detecting different types of DDoS attacks and characterize common features among them. Selected attacks are SYN flood, UDP flood and ICMP flood. Description and feature selection of the attacks is included. Furthermore, a system is designed that evaluates whether the network traffic (organized into flows) is a DDoS attack or not. Attacks are detected using the XGBoost method, which uses supervised learning. The final model is validated using cross-validation and tested on attacks generated by the author.
Mobile Cryptocurrency Wallet Based on zk-SNARKs and Smart Contracts
Slávka, Samuel ; Perešíni, Martin (referee) ; Homoliak, Ivan (advisor)
Cieľom tejto diplomovej práce je navrhnúť a implementovať prostredie pre kryptomenové peňaženky, ktoré je optimalizované pre požiadavky na úložisko a prenosovú rýchlosť v mobilných zariadeniach. S využitím zero-knowledge dôkazov navrhujeme mechanizmy side-chain výpočtu, ktoré overujú reťazce hlavičiek blokov a uchovávajú dôkazy o ich overeniach v blockchaine. Ľahkí mobilní klienti, využívajúci toto prostredie, už nebudú nútení sťahovať a neustále aktualizovať svoj reťazec hlavičiek, ale môžu používať záchytné body uložené v Smart kontrakte. Táto práca taktiež zahŕňa implementácie mobilnej peňaženky, ktorá používa implementované prostredie pre synchronizáciu s viacerými blockchainami.
Security and Performance Testbed for Simulation of Proof-of-Stake Protocols
Holub, Juraj ; Malinka, Kamil (referee) ; Homoliak, Ivan (advisor)
This work aims to analyze the security and performance of three Proof-of-Stake consensus protocols for blockchain (Harmony, Solana and Ouroboros). For this purpose, a simulation tool is created, which experiments with these protocols. The solution also includes a comparison of currently available blockchain simulators. The simulation results show that all three protocols can work efficiently even in large networks. In terms of security, the simulation points to a vulnerability in the form of a DoS attack. Based on the results, modifications to the protocols were proposed that minimize the mentioned security vulnerability. The created simulator is freely available and intended for potential further research of similar consensus protocols.
Adaptive Trading Strategies for Cryptocurrencies
Filip, Marek ; Perešíni, Martin (referee) ; Homoliak, Ivan (advisor)
Obchodní strategie pro kryptoměny bývají založeny na padajícím nebo stoupajícím trhu. Kámen úrazu nastává, když jsou aplikovány na špatný trend v tak nestabilním trhu, jako je ten s kryptoměnami. Tato práce se zabývá možností adaptivních obchodních strategií, které se dokáží přizpůsobit na klesající a stoupající trendy v kryptoměnovém trhu. Analyzováním ceny Bitcoinu a vytvořením metriky risku, kde se díváme na extrémy vytvořené funkce, můžeme dojít k řešení návrhu adaptivních strategií. Zkoumají se jak dlouhodobé, tak krátkodobé možnosti investování. K vyhodnocování strategií a vykreslování časových řad je vytvořen rozšířitelný program pro testování historických dat. Výsledky jsou porovnány s tradičními přístupy, jako je HODL a rebalancování, přičemž bylo zjištěno, že při použití správných kritérií se mohou více než ztrojnásobit. Práce nabízí investorům nové způsoby zisků a zároveň dává čtenářům možnost nahlédnout do tvorby (adaptivních) strategií a jejich zpětného testování v kódu. Předpokládá se, že výsledky práce budou využívány automatizovanými obchodními systémy.
Characterization of Network Operation of Computers and Their Groups
Kučera, Rostislav ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
The aim of this work is to implement a module for detecting DDoS attacks. The module pro- cesses network traffic, processes it, stores its profile, from which statistical data used for the detection itself are subsequently calculated. The work also deals with the implementation of the module for intrusion detection system Suricata.
Computer Library with Clustering Methods
Riša, Martin ; Homoliak, Ivan (referee) ; Košík, Michal (advisor)
The aim of this work is to create a library with chosen clustering methods, to compare their effectiveness and their properties by testing them on different input data sets. The aim of the testing is to determine efficiency of a method, to determine advantages and disadvantages of a method to cluster general input data or to cluster only data of specific shapes. Stages of development of the library are also documented in the text of this work.

National Repository of Grey Literature : 96 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.