National Repository of Grey Literature 73 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Security analysis of network protocols
Bednařík, Jan ; Sobotka, Jiří (referee) ; Hajný, Jan (advisor)
The aim of my bachalor’s thesis is security of net protocols analysis. Because of the huge number of net protocols, I’ve decided to choose only a few of them to describe. My task is to describe the TCP/IP model structure in term of security, so I have chosen to devide my thesis into two separate parts. The first part contains describtions of particular TCP/IP layers and adumbration of possibilities of securing. The second part contains more accurate describtions of some chosen protocols, mostly the case of their security. At the close of my work it is my task to describe some utilities and methods which can be used to accomplish an successful attack on chosen net protocols. I have chosen protocols HTTP, FTP and SSL. As the utilities I have chosen programs Wireshark, Brutus and SSLSTRIP.
Driver design for PROFINET bus coupler
Kroupa, Jiří ; Šubrt, Kamil (referee) ; Houška, Pavel (advisor)
The essence of this diploma thesis is the design and implementation of driver for Profinet bus coupler from Phoenix Contact, which use computer's network card for communication. The proposal builds on the knowledge gained from available literature and analysis of Profinet protocol.
Anonymization of users when collecting network traffic
Hamár, Lukáš ; Blažek, Petr (referee) ; Sikora, Marek (advisor)
This thesis deals with anonymization of data, which could lead to disclosure of the identity of end users in network traffic. Work describes algorithms by which individual data parts are anonymized and also tools which use these techniques for network traffic anonymization. The next part of the thesis describes construction of a laboratory network, in which is the network traffic captured, containing pcap and NetFlow data. With using of the captured data, the anonymization tools are tested and the results are compared. In the last part of the thesis is created graphical interface for one of the tested anonymization softwares.
Detection of anomalies in network traffic using compression methods
Blažek, Libor ; Dvořák, Jan (referee) ; Blažek, Petr (advisor)
The objective of the thesis is to design a practical demonstration of the functionality of selected compression methods. The following chapters will discuss the attacks on terminals and mentioned some measures. The show will be processed using two methods development environment. The attacks will detect anomalies in the network and subsequently carried out at one of the sample data compression methods. Data will be collected as normal operation at the terminal station, and then in the attack.
Securing IP PBX against attacks and resistance testing
Kakvic, Martin ; Šedý, Jakub (referee) ; Šilhavý, Pavel (advisor)
This diploma thesis focuses on attacks on PBX Asterisk, FreeSWITCH and Yate in LTS versions. In this work was carried out two types of attacks, including an attack DoS and the attack Teardown. These attacks were carried out using two different protocols, SIP and IAX. During the denial of service attack was monitored CPU usage and detected if its possible to establish call and whether if call can be processed. The Security of PBX was build on two levels. As a first level of security there was used linux based firewall netfilter. The second level of security was ensured with protocols TLS and SRTP.
Methods for measurement of data network performance and quality parameters
Sukup, Luboš ; Zeman, Václav (referee) ; Novotný, Vít (advisor)
Master thesis involves the development of quality measurement issues and performance parameters in data networks. It describes the main technologies as they affect the quality and performance parameters and the effect of these parameters for voice, video and data services. Next are listed some methods for measuring parameters of the data network.In the practical part is selected one method of measuring network parameters and properties of this method are demonstrated by illustrative examples.
Attacks on active network elements
Ščepko, Richard ; Kacálek, Jan (referee) ; Polívka, Michal (advisor)
The bachelor thesis deals with the topic of the security of computer networks. The tasks of the bachelor thesis are the attacks on active network elements with the aim of the catching of data between two users. In the created structure with a stellate topology, the user stations have connect to the active element (switch). In the thesis, the individual ways of attacks and the significance of ARP proceedings to MAC addresses have describ. Several programmes have use in order to take control over the device. Due to a big amount of these active elements the source code of the programmes had to be alter. The work with the programmes ARPtool and ARPoison demanded the operational system Linux, in our case the distribution of Ubunt. The programme WinArpAttacker could be set off under the system Windows XP as well. The achieved results and the description of the practical part are discuss in detail in the summary of the thesis. The result is the catching communication with the help of the programme WireShark.
BigData Approach to Management of Large Netflow Datasets
Melkes, Miloslav ; Ráb, Jaroslav (referee) ; Ryšavý, Ondřej (advisor)
This master‘s thesis focuses on distributed processing of big data from network communication. It begins with exploring network communication based on TCP/IP model with focus on data units on each layer, which is necessary to process during analyzation. In terms of the actual processing of big data is described programming model MapReduce, architecture of Apache Hadoop technology and it‘s usage for processing network flows on computer cluster. Second part of this thesis deals with design and following implementation of the application for processing network flows from network communication. In this part are discussed main and problematic parts from the actual implementation. After that this thesis ends with a comparison with available applications for network analysis and evaluation set of tests which confirmed linear growth of acceleration.
Packet Analyser for UWB based on 15.4a standard
Leixner, Martin ; Šimek, Milan (referee) ; Mráz, Ľubomír (advisor)
The aim of this work is study the standard for wireless sensor networks IEEE 802.15.4a. Design and implementation of a packet analyzer for ultra wideband technology com- pliant with IEEE 802.15.4a standard. Integrate packet analyzer to inspection software Wireshark and implement dissector for view packets. Finally, analyze and evaluate the parameters of the proposed packet analyzer.
Adaptation of access networks for advanced networking technologies
Frollo, Martin ; Škorpil, Vladislav (referee) ; Novotný, Bohumil (advisor)
The bachelor thesis is focusing on the real-time services running in packet networks and problems that may arise while they are running. Specifically it is focused on the technology of VoIP service. There are many different signaling protocols to support this service. Among others, the SIP protocol is very widespread. In addition of the connection it is necessary to ensure the transmission of voice data. That is the task of the RTP protocol. This service and also others for which time is critical with increasing constraints on networks it needs to be frequently given the priority over traditional services like downloading files, and more. VoIP service has certain requirements for transmission parameters that must be followed for optimal function. They are for example, packet loss, one-way delay and delay variation. Most problematic is to ensure the optimal operation of the service on slower transmission routes. That is why it was necessary to establish mechanisms capable of real-time services to ensure sufficient network capacity to meet end user. These are, for example technologies of integrated services or differentiated services. At the present time, however, the technology of integrated services is not very widespread because of its inefficiency. On assembled telephone network made from available components in the laboratory, there are analyzed and confirmed some of the distinctive features and characteristics of the SIP protocol. Furthermore, measurements confirmed sufficient network capacity for VoIP service of the used network and parameters affecting security of the QoS have been evaluated.

National Repository of Grey Literature : 73 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.