National Repository of Grey Literature 2 records found  Search took 0.01 seconds. 
On possible approaches to detecting robotic activity of botnets
Prajer, Richard ; Palovský, Radomír (advisor) ; Pavlíček, Luboš (referee)
This thesis explores possible approaches to detecting robotic activity of botnets on network. Initially, the detection based on full packet analysis in consideration of DNS, HTTP and IRC communication, is described. However, this detection is found inapplicable for technical and ethical reasons. Then it focuses on the analysis based on network flow metadata, compiling them to be processable in machine learning. It creates detection models using different machine learning methods, to compare them with each other. Bayes net method is found to be acceptable for detecting robotic activity of botnets. The Bayesian model is only able to identify the botnet that already executes the commands sent by its C&C server. "Sleeping" botnets are not reliably detectable by this model.
Setup and securing of the network used by hotel guests
Prajer, Richard ; Palovský, Radomír (advisor) ; Pinkas, Otakar (referee)
The aim of this Bachelor Thesis is to secure access to the Internet in a small European hotel chain. Given the circumstances, specified in the text, following question emerged: How to delegate the responsibility of the guest's conduct on the Internet away from the hotels. Considering other possibilities I chose the individual users authentication as the best solution available. Captive portal was selected as the best authentication method regarding the hotel environment. Further the text is devoted to the tailoring of the system to the specific needs of this particular use: Both from a technical view as well as with regard to user-friendliness. The structure of the work follows the logic of the implementation process of the new system: from the theoretical introduction, which summarizes the requirements on system and it's possible executions, to the practical part. There I link the variety of tools, programs and configurations to the new system for providing the Internet connection. In conclusion, the weaknesses of the system are discussed.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.