National Repository of Grey Literature 13 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Modern cyber attacks
Hodes, Vojtěch ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This bachelor's thesis deals with contemporary cyber attacks with an emphasis on denial of service attacks. In the theoretical part the thesis focuses on an analysis and description of the cyber attacks. It monitors trends in cyber attacks and also describes generators of denial of service attacks based on software and hardware platform. The practical part uses the information from the theoretical one to design tests of network devices against cyber attacks, their practical realization and a comparison between used cyber attacks. At the very end the thesis offers possible countermeasures against them.
Cyber attacks on operating systems
Holasová, Eva ; Komosný, Dan (referee) ; Člupek, Vlastimil (advisor)
This bachelor thesis is focused on cybernetic attacks towards operating systems. In the thesis, there are discussed base security functions of operating systems Windows, Linux and macOS; followed by described cybernetic attacks and its differences. The chapter Malware describes the most harmful software. Next chapter is about common awareness of cybernetic attacks, in which terms antivirus, firewall and IDS/IPS (Intrusion Detection System/Intrusion Prevention System) systems are defined. Following chapter brings scenario of ethics of hacking on operating system of personal computer, server and web server by using penetration tests. The thesis is finished by doing ethics hacking and evaluations. The goal of this thesis is to summarize the problem of cybernetic attacks, methods and tools whose goal is to break the security of the system, the use some of these method to do ethics hacking in virtualized environment.
Tool to support DoS testing
Kamenář, Filip ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The master thesis deals with denial of service attacks and their implementation in own application, called ptdos, that allows testing of web applications using the implemented attacks. Ptdos is also capable of monitoring the progress of testing as well as its evaluation. In the theoretical part of the thesis, the basic concepts are defined, the classification of attacks into categories is described and the individual attacks are discussed in detail in order to explain how the denial of service should occur in the context of an attack. The practical part of the thesis describes the design of the ptdos application architecture and its subsequent development, including a description of the implementation of all the selected attacks. The last part of the thesis is the testing of the application, which includes the creation of a test network and the analysis of all implemented attacks using different scenarios.
Cyberattack Generator
Gregr, Filip ; Smékal, David (referee) ; Hajný, Jan (advisor)
This thesis is focused on developing a tool that is capable of generating cyber attacks. In the opening there are introduced some attacks using the ISO/OSI application layer protocols. Specifically, these are attacks known as Slowloris, RUDY, Slow Read, HTTP flood, and dictionary attack on the SSH. These attacks are implemented into an existing DoSgen Linux tool that already contains several famous network attacks. The main part of the thesis is devoted to the description of the tool and to the implementation of its own extension. The created tool is practically tested in an experimental enviroment against the Apache web server. Part of the thesis is the documentation for the improved DoSgen tool.
Intrusion prevention system based on Raspberry Pi
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The number of discovered vulnerabilities rapidly increases. For example in 2019 there were discovered 20 362 vulnerabilities. The probability of cyber-attacks realization is high. Therefore it is necessary to propose and implement automated and low-cost Intrusion Prevention or Intrusion Detection Systems (IPS/IDS). This implemetation can focus on home use or small corporate networks. The main goal of the system is to detect or mitigate cyber-attack impact as fast as possible. The master's thesis proposes IPS/IDS based on Raspberry Pi that can detect and prevent various cyber-attacks. Contents of this thesis are focus on description of cyber-attacks based on ISO/OSI model's Link and Network layers. Then there is description of IPS/IDS systems and theirs open source representatives. The practical part is focus on experimental workspace, hardware consumption of choosen detection systems, cyber-attacks scenarios and own implementation of detection program. Detection program is based on these chosen systems and puts them together to be easily manageable.
The (New) Security Dilemma: Impact of technological innovation on the security dilemma
Kadre, Sudhanshu ; Špelda, Petr (advisor) ; Šenk, Michal (referee)
The enduring concept of the security dilemma seen from the lens of the technological revolution in Information Security provides a different perception than the traditional version of the dilemma. Moving from apparent to perceived threats, the underlying fear and uncertainty between state actors in an anarchic system have witnessed an increase. This thesis has the objective to study the effect of the advancements in Information and Community Technology, particularly in Cybersecurity, on the perception of the security dilemma. By analysing the basis of Information Security theory while simultaneously probing the cyber threat landscape through the use of case studies of cyber attacks and cyber diplomacy, the thesis highlights the relevance of the security dilemma in cyberspace
Krádež virtuální identity
NEVLUDOVÁ, Lucie
The bachelor thesis is focused on virtual identity theft. In the theoretical part of this thesis are explained terms related to the identity of the person. In addition, some cyber attacks related to identity theft are selected and described. Information regarding the legal perspective on this topic is also mentioned. The practical part of the thesis contains a methodology for preventing theft of virtual identity, the methodology is based on a social experiment. The methodology is confronted with a person whose virtual identity was previously stolen.
Tool to support DoS testing
Kamenář, Filip ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The master thesis deals with denial of service attacks and their implementation in own application, called ptdos, that allows testing of web applications using the implemented attacks. Ptdos is also capable of monitoring the progress of testing as well as its evaluation. In the theoretical part of the thesis, the basic concepts are defined, the classification of attacks into categories is described and the individual attacks are discussed in detail in order to explain how the denial of service should occur in the context of an attack. The practical part of the thesis describes the design of the ptdos application architecture and its subsequent development, including a description of the implementation of all the selected attacks. The last part of the thesis is the testing of the application, which includes the creation of a test network and the analysis of all implemented attacks using different scenarios.
Intrusion prevention system based on Raspberry Pi
Hirš, David ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The number of discovered vulnerabilities rapidly increases. For example in 2019 there were discovered 20 362 vulnerabilities. The probability of cyber-attacks realization is high. Therefore it is necessary to propose and implement automated and low-cost Intrusion Prevention or Intrusion Detection Systems (IPS/IDS). This implemetation can focus on home use or small corporate networks. The main goal of the system is to detect or mitigate cyber-attack impact as fast as possible. The master's thesis proposes IPS/IDS based on Raspberry Pi that can detect and prevent various cyber-attacks. Contents of this thesis are focus on description of cyber-attacks based on ISO/OSI model's Link and Network layers. Then there is description of IPS/IDS systems and theirs open source representatives. The practical part is focus on experimental workspace, hardware consumption of choosen detection systems, cyber-attacks scenarios and own implementation of detection program. Detection program is based on these chosen systems and puts them together to be easily manageable.
Cyber attacks on operating systems
Holasová, Eva ; Komosný, Dan (referee) ; Člupek, Vlastimil (advisor)
This bachelor thesis is focused on cybernetic attacks towards operating systems. In the thesis, there are discussed base security functions of operating systems Windows, Linux and macOS; followed by described cybernetic attacks and its differences. The chapter Malware describes the most harmful software. Next chapter is about common awareness of cybernetic attacks, in which terms antivirus, firewall and IDS/IPS (Intrusion Detection System/Intrusion Prevention System) systems are defined. Following chapter brings scenario of ethics of hacking on operating system of personal computer, server and web server by using penetration tests. The thesis is finished by doing ethics hacking and evaluations. The goal of this thesis is to summarize the problem of cybernetic attacks, methods and tools whose goal is to break the security of the system, the use some of these method to do ethics hacking in virtualized environment.

National Repository of Grey Literature : 13 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.