National Repository of Grey Literature 13 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Implementation of plugins for JMeter
Švehlák, Milan ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
This thesis discusses the load testing tool JMeter and its opportunities for expansion by modules carrying out cyber attacks of the type Denial of Service (DoS). To begin with, there is a theoretical overview of cyber attacks of this type. The following chapter, talks about the JMeter tool, namely its functions and expansion options. After that, it is proceeded to the actual design and realization of the modules. The module implementing the attack HTTP Flood is created first. This module uses internal functions of the program JMeter. This new module is tested. Next chapter folows the procedure of creating modules, that use external generator of network traffic. Modules SYN Flood, ICMP Flood and NTP Flood are implemented using the generator Trafgen. Module implementing attack Slowloris uses a Python script as a generator of the attack. Finally, all the new modules are tested.
Cluster analysis of data traffic
Nagyová, Simona ; Martinásek, Zdeněk (referee) ; Blažek, Petr (advisor)
This thesis is meant to present the methods of cluster analysis, their use for detecting network traffic anomalies. It deals with various types of cyber attacks particularly DoS (DDoS) attacks. It contains a list of well-known DoS attacks. Also includes a program in Python, using the k-means method for detection of anomalous traffic.
Static methods for detection DDoS attacks
Miško, Lukáš ; Dvořák, Jan (referee) ; Blažek, Petr (advisor)
This thesis contains a theoretical basic for solution to issue of network anomalies with use of static methods and it also contains software as a solution for detection of network attacks. The main point of thesis is detection of DoS (Denial of Service) attacks. In thesis is located an analysis of DoS attacks rate categorization. Further in thesis is located analysis of protocols TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), their possible use to attacks SYN flood and UDP flood. Here are analysed three static methods and their detailed description. There is also a analysis of collected data and their comparison in the thesis. Thesis contains description and the results testing of software which is used to detect attacks in network, at the end.
The role of the father from the perspective of adolescents
REJDOVÁ, Lenka
This bachelor thesis deals with role of father from the perspective of adolescents. The theoretical part consists of two chapters. The first chapter deals with characteristics of adolescence. The second chapter is on the subject of fatherhood. Attention is here devoted to roles those father plays in the family, differences in the approach to daughters and sons and what the absence of the father in life of the adolescent brings. The research part, with the help of qualitative methods and case studies, compares the adolescent's perspective of the role of the father in the family and also deals with differences and common features of individual cases.
Theological and ethical accents at Sirach
Sedlecká, Štěpánka ; Beneš, Jiří (advisor) ; Roubalová, Marie (referee)
Bachelor's thesis "Theological and ethical accents at Sirach" had the task of finding out what are the most important theological and moral emphases in deutoronomy book of Sirach. By studying and thorough reading was has been detected theological accents like the glory and greatness of God, characteristics of God and his creative actions. Other theological accents was been detected the living in the fear and obedience of God and the appearance and action of Wisdom. Wisdom appears in the book as a person and also as a special species God's gift within man. These two divine gifts act in a person identically and mutually and grow up both in one. From another point of view ethical accents are for Sirach honest and truthful behavior in various aspects of human life. Another ethical aspect is cultivation of interpersonal relationships especially family and friendly. These theological and ethical accents in Sirach I opened with the help of different interpretations of the Bible, professional literature and theological dictionaries. Sirach as author the one of deuthoronomy wisdom literature in the Bible speaks to man from the point of view of historical and contemporary. Reader of this book who is ready to open to possible correction his behavior and perception can find actions to Sírach's words true and...
Theme of sonhood
Raška, Adam ; Peterka, Josef (advisor) ; Mocná, Dagmar (referee)
This Diploma Thesis analyzes crucial works of the Czech and global literary art of the 20th and the 21st century. Jan Balabán's Zeptej se táty (Ask the Daddy), Emil Hakl's Pravidla směšného chování (Etiquette of Ridiculousness), Son of the Regiment by Valentin Katajev, Kerouac's On the Road, Stříbrný vítr (Silver Wind) by Fráňa Šrámek, Letter to His Father by Franz Kafka and The Road by Cormac McCarthy are all analyzed in terms of theme of sonhood. Similarities and differences are both covered. Relation of sonhood, authority and god is crucial, as well as the change of the whole concept of father - son relationship which occurred in the 20th century. The author of the thesis tries to postulate questions concerning sonhood, which in his opinion should the mankind be asking. Yet it is not his ambition to offer resolute and firm answers. The essay is entwined with an autobiographic prose which completes the analytical part in a refreshing way. Both genres contribute to the final outcome, which is a synthesis offering the possibility of grasping theme of sonhood from a brand new perspective, as sonhood is also the main motif of the prosaic part. Main character, the author of the diploma thesis, is dealing with his relationship to his father, and more importantly his father's relationship to his father, i. e....
Static methods for detection DDoS attacks
Miško, Lukáš ; Dvořák, Jan (referee) ; Blažek, Petr (advisor)
This thesis contains a theoretical basic for solution to issue of network anomalies with use of static methods and it also contains software as a solution for detection of network attacks. The main point of thesis is detection of DoS (Denial of Service) attacks. In thesis is located an analysis of DoS attacks rate categorization. Further in thesis is located analysis of protocols TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), their possible use to attacks SYN flood and UDP flood. Here are analysed three static methods and their detailed description. There is also a analysis of collected data and their comparison in the thesis. Thesis contains description and the results testing of software which is used to detect attacks in network, at the end.
Implementation of plugins for JMeter
Švehlák, Milan ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
This thesis discusses the load testing tool JMeter and its opportunities for expansion by modules carrying out cyber attacks of the type Denial of Service (DoS). To begin with, there is a theoretical overview of cyber attacks of this type. The following chapter, talks about the JMeter tool, namely its functions and expansion options. After that, it is proceeded to the actual design and realization of the modules. The module implementing the attack HTTP Flood is created first. This module uses internal functions of the program JMeter. This new module is tested. Next chapter folows the procedure of creating modules, that use external generator of network traffic. Modules SYN Flood, ICMP Flood and NTP Flood are implemented using the generator Trafgen. Module implementing attack Slowloris uses a Python script as a generator of the attack. Finally, all the new modules are tested.
Cluster analysis of data traffic
Nagyová, Simona ; Martinásek, Zdeněk (referee) ; Blažek, Petr (advisor)
This thesis is meant to present the methods of cluster analysis, their use for detecting network traffic anomalies. It deals with various types of cyber attacks particularly DoS (DDoS) attacks. It contains a list of well-known DoS attacks. Also includes a program in Python, using the k-means method for detection of anomalous traffic.

National Repository of Grey Literature : 13 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.