National Repository of Grey Literature 15 records found  1 - 10next  jump to record: Search took 0.00 seconds. 
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.
Cyber Attacks in JMeter
Klimeš, Jan ; Člupek, Vlastimil (referee) ; Číka, Petr (advisor)
Bachelor thesis deals with the security of computer networks based on TCP/IP protocol stack. The main aim is to create extension modules for application JMeter that add features to the software generate DoS attacks, SYN flood, UDP flood, DNS Server attack and DNS Amplification using applications Trafgen. The theoretical part generally describes cyber attacks, associated with network protocols and application JMeter itself. The practical part contains a description of the graphical interface of the expansion modules, each class which the modules consist of and test results.
Implementation of plugins for JMeter
Švehlák, Milan ; Člupek, Vlastimil (referee) ; Martinásek, Zdeněk (advisor)
This thesis discusses the load testing tool JMeter and its opportunities for expansion by modules carrying out cyber attacks of the type Denial of Service (DoS). To begin with, there is a theoretical overview of cyber attacks of this type. The following chapter, talks about the JMeter tool, namely its functions and expansion options. After that, it is proceeded to the actual design and realization of the modules. The module implementing the attack HTTP Flood is created first. This module uses internal functions of the program JMeter. This new module is tested. Next chapter folows the procedure of creating modules, that use external generator of network traffic. Modules SYN Flood, ICMP Flood and NTP Flood are implemented using the generator Trafgen. Module implementing attack Slowloris uses a Python script as a generator of the attack. Finally, all the new modules are tested.
Generator of Cyber Attacks
Halaška, Peter ; Burda, Karel (referee) ; Hajný, Jan (advisor)
This work deals with the security of computer networks based on TCP/IP protocol stack. The main objective is to develop a generator of DoS flooding attacks which carries out attacks such SYN flood, RST flood, UDP flood, ICMP flood, ARP flood, DNS flood and DHCP starvation. The theoretical part describes the features of the mentioned attacks and protocols or mechanisms associated with them. Next part deals with the comparison of selected tools (Hping3, Mausezahn, Trafgen) in terms of number of packets per second (pps) and the link utilization (MB/s). The practical part describes design and implementation of the new attacking tool. There is explained the importance of it’s individual modules, it’s installation and usage options. New tool is also being tested. Then there is described the development, options and installation of control interface which is in the form of web application.
Generator of illegitimate network traffic
Blažek, Ondřej ; Smékal, David (referee) ; Blažek, Petr (advisor)
The diploma thesis deals with the problems of DoS/DDoS attacks and development of a tool, in C lanugage, for generating them. In the first chapter the principles of DoS attacks targeting the internet and transport layers of ISO/OSI model are described and also according to their characteristics divided. Selected attacks on the application layer are also described here in detail togehter with protocols which they are based on. In the following chapter there has been created a comparison of freely available tools, which could be used as a attack generators. The practical part is dedicated to a development of a tool for DoS attacks, especially design, general description and usage. Further there is a summary of the newly created library, including results of web server testing, and extensions of a web interface, which is part of the developed tool.
Stress tester
Shpak, Kyrylo ; Člupek, Vlastimil (referee) ; Zeman, Václav (advisor)
The bachelor thesis deals with the issue of stress testing. The aim of this work is to extend the JMeter tool with amplification modules of DoS attacks. The beginning of the work introduces the issue of DoS attacks, along with a description of selected attacks. One of the points of the work is to verify the functionality and find errors of the stress tester, which is a comprehensive system for testing the information and communication infrastructure based on the JMeter tool. The last chapter deals with the implementation of DoS attacks.
Cyberattack Generator
Gregr, Filip ; Smékal, David (referee) ; Hajný, Jan (advisor)
This thesis is focused on developing a tool that is capable of generating cyber attacks. In the opening there are introduced some attacks using the ISO/OSI application layer protocols. Specifically, these are attacks known as Slowloris, RUDY, Slow Read, HTTP flood, and dictionary attack on the SSH. These attacks are implemented into an existing DoSgen Linux tool that already contains several famous network attacks. The main part of the thesis is devoted to the description of the tool and to the implementation of its own extension. The created tool is practically tested in an experimental enviroment against the Apache web server. Part of the thesis is the documentation for the improved DoSgen tool.
Integration and automation of deployment of updated load testing modules
Jedlička, Jakub ; Člupek, Vlastimil (referee) ; Šeda, Pavel (advisor)
This thesis focuses on performance testing using JMeter and developing modules for denial of service (DoS) attacks. The thesis first deals with the theory, where performance testing is described, the tools used for this type of testing and finally the types of DoS attacks. The practical part starts with the migration of the operating system of the load tester on which the testing was performed. It also describes the upgrade of the JMeter tool from version 4.0 to version 5.5, updating the custom add-on modules and fixing bugs in modules so that the modules can be used without errors with the JMeter tool in version 5.5. The updated JMeter tool and custom add-on modules are uploaded to the load tester. For future updates, automation scripts are created to update the system packages of the load tester, updating both the custom add-on modules and the JMeter tool. The module extensions that have been made to increase the scope of the tests are then discussed. These extensions add mainly link layer parameters and support for IPv6. The final section describes the newly created parts of the DDoS module. The new parts of the module extend the capabilities of testing web applications using multiple IP addresses or testing using slow attacks.
Stress tester
Shpak, Kyrylo ; Člupek, Vlastimil (referee) ; Zeman, Václav (advisor)
The bachelor thesis deals with the issue of stress testing. The aim of this work is to extend the JMeter tool with amplification modules of DoS attacks. The beginning of the work introduces the issue of DoS attacks, along with a description of selected attacks. One of the points of the work is to verify the functionality and find errors of the stress tester, which is a comprehensive system for testing the information and communication infrastructure based on the JMeter tool. The last chapter deals with the implementation of DoS attacks.
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.

National Repository of Grey Literature : 15 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.