National Repository of Grey Literature 5 records found  Search took 0.00 seconds. 
Emulation of Attacks on SCADA/ICS Communication
Grofčík, Peter ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
The goal of this master's thesis is to emulate suitable network attacks on the control communication of ICS/SCADA systems with a subsequent design and implementation that can detect them. The first part of the work consists of categorization and acquaintance with individual types of attacks on industrial networks. Using classified datasets combined with a research of available datasets, in the next chapter I describe the selection of suitable attacks, which are at least indirectly related to control communication and are also feasible on virtual devices that are communicating using the IEC104 protocol, which I chose for my work. I then perform the selected attacks and record their progress in a set of PCAP files. Those files form the input for the next part that concerns anomaly detection using statistical methods.
Link layer LAN network security
Sedláček, Jiří ; Grenar, David (referee) ; Slavíček, Karel (advisor)
The bachelor‘s thesis is about security concerning local area networks of the data link layer. The goal of the thesis is to characterize basic functioning of the ISO/OSI reference model as well as describing how the data link layer works to understand the topic, specify the possibilities of attacking the data link layer (for example rogue DHCP server, ARP spoofing, CAM table overflow, attacking the spanning tree protocol and others) and possible security measures to protect against the attacks. The purpose of the thesis is also a suggestion for assembling an experimental network relating to the topic of the thesis. Theoretical part determines the most important protocols of the data link layer, methods of abusing them and protection of those protocols. The practical part contains a brief description of the attacks, used utilities for accomplishing the attacks, a network topology, execution of the attacks, detection and protection against the attacks as well as briefly summarizing the results. The thesis also sums up some of the possible recommended configuration to repel the attacks and suggesting how to behave in a cyber environment. For the purpose of simulating the attacks, Kali Linux and Windows 10 are the operating systems that were used the most in this thesis.
Emulation of Attacks on SCADA/ICS Communication
Grofčík, Peter ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
The goal of this master's thesis is to emulate suitable network attacks on the control communication of ICS/SCADA systems with a subsequent design and implementation that can detect them. The first part of the work consists of categorization and acquaintance with individual types of attacks on industrial networks. Using classified datasets combined with a research of available datasets, in the next chapter I describe the selection of suitable attacks, which are at least indirectly related to control communication and are also feasible on virtual devices that are communicating using the IEC104 protocol, which I chose for my work. I then perform the selected attacks and record their progress in a set of PCAP files. Those files form the input for the next part that concerns anomaly detection using statistical methods.
Link layer LAN network security
Sedláček, Jiří ; Grenar, David (referee) ; Slavíček, Karel (advisor)
The bachelor‘s thesis is about security concerning local area networks of the data link layer. The goal of the thesis is to characterize basic functioning of the ISO/OSI reference model as well as describing how the data link layer works to understand the topic, specify the possibilities of attacking the data link layer (for example rogue DHCP server, ARP spoofing, CAM table overflow, attacking the spanning tree protocol and others) and possible security measures to protect against the attacks. The purpose of the thesis is also a suggestion for assembling an experimental network relating to the topic of the thesis. Theoretical part determines the most important protocols of the data link layer, methods of abusing them and protection of those protocols. The practical part contains a brief description of the attacks, used utilities for accomplishing the attacks, a network topology, execution of the attacks, detection and protection against the attacks as well as briefly summarizing the results. The thesis also sums up some of the possible recommended configuration to repel the attacks and suggesting how to behave in a cyber environment. For the purpose of simulating the attacks, Kali Linux and Windows 10 are the operating systems that were used the most in this thesis.
Interception of network traffic
Fišer, Tomáš ; Vasilenko, Alexandr (advisor) ; Tyrychtr, Jan (referee)
The bachelor thesis deals with possibilities of security breaches of network communication and principles of its interception. The thesis is divided into two parts, the theoretical part, which contains the principles of computer networking and describes the methods of hacking into the network, and on the practical part, which demonstrates capturing of data using the methods described above. There is also shown the danger of using unencrypted protocols. Program called Ettercap was used for this demonstrations and for the interception of data was used program called Wireshark.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.