National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Network Anomaly Detection
Pšorn, Daniel ; Puš, Viktor (referee) ; Kořenek, Jan (advisor)
This master thesis deals with detecting anomalies methods in network traffic. First of all this thesis analyzes the basic concepts of anomaly detection and already using technology. Next, there are also described in more detail three methods for anomalies search and some types of anomalies. In the second part of this thesis there is described implementation of all three methods and there are presented the results of experimentation using real data.
Network Protocol Analyzer
Pšorn, Daniel ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
Object of this thesis is to find the way how to program network protocol analyzer on the highest level of ISO/OSI model. We need to use some of the methods for detection of application protocols. The software described in this thesis uses traditional application level traffic identification method and signature-mapping-based method. Basic platform is FreeBSD operating system. Programming language is C using libpcap library.
Network Protocol Analyzer
Pšorn, Daniel ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
Object of this thesis is to find the way how to program network protocol analyzer on the highest level of ISO/OSI model. We need to use some of the methods for detection of application protocols. The software described in this thesis uses traditional application level traffic identification method and signature-mapping-based method. Basic platform is FreeBSD operating system. Programming language is C using libpcap library.
Network Anomaly Detection
Pšorn, Daniel ; Puš, Viktor (referee) ; Kořenek, Jan (advisor)
This master thesis deals with detecting anomalies methods in network traffic. First of all this thesis analyzes the basic concepts of anomaly detection and already using technology. Next, there are also described in more detail three methods for anomalies search and some types of anomalies. In the second part of this thesis there is described implementation of all three methods and there are presented the results of experimentation using real data.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.