National Repository of Grey Literature 48 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Advanced network security methods against attacks
Kusy, Filip ; Kubánková, Anna (referee) ; Krajsa, Ondřej (advisor)
This student work focuses on security against network attacks. It focus on network attacks and ways to prevent them. Subsequently, it deals with the Snort variant of the IPS/IDS system. It deal with the connection between Mikrotik and the Snort Linux server
Tools for Environment for the Simulation of Communication
Mikuš, Peter ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
Communication between devices should be based on predefined rules. These rules are called communication protocols. In this master thesis I am concerned with communication protocols, specially security protocols. Their design demand specialized tools, that will provide interactive simulations and security testing. I have described each of these tools in detail and mentioned about their properties, their pros and cons. In available tools I have implemented security protocols. The result is set of demonstration tasks that are usable in network courses at FIT VUT
Security prospects of wireless communication networks
Hráček, Jiří ; Lambertová, Petra (referee) ; Škorpil, Vladislav (advisor)
This master thesis deals with all types of wireless networks security – in personal, local, metropolitan and also mobile networks. This work is mostly focused on wireless local area networks (WLANs), which are the most widespread at nowadays. This work describes attacks to the wireless local area network, attackers steps and possible protection against it. Some of these attacks are tested in practical part of this work. In this master thesis there were also designed and created two laboratory exercises. One of them is a simulation in the wireless network using Opnet Modeler application. The other exercise is strictly practical type.
Security risks of wireless access networks
Špidla, Milan ; Hošek, Jiří (referee) ; Polívka, Michal (advisor)
Master´s thesis „Security risks of wireless access networks“ deals with wireless access networks, which are the most widespread in this time. The main target is realization of attacks wireless access networks protected by various using methods. This thesis shows main securities gaps, which originate from project this networks. These securities gaps are used for realization attacts in practical part. In the next part I took attention of network´s monitoring possibilities.
The security risks of authentication methods
Dzurenda, Petr ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
Master's thesis deals with the security risks of current authentication methods. There are described methods which are based on user's knowledge and ownership of authentication object and biometric authentication method. The practical part of this Master's thesis deals with a specific design of authentication system based on protocol ACP, when the user proves his identity by smart card on provider assets, which is represented by ACP portal on the user's computer.
Asterisk VoIP private branch exchange and its distributions
Melichar, Ondřej ; Komosný, Dan (referee) ; Papež, Nikola (advisor)
This master’s thesis delves into the possibilities of the open-source Private Branch Exchange Asterisk, elaborates on its features and compares it with several other distros. The term SIP stack is explained here with the mention of two of its representatives. Further in the thesis, the security risks of the VoIP technology are explained, and specific attacks are described and then realized. As a part of the testing process, the possibilities of a custom module and its following implementation are explored, as well as the portability between the individual distros and its proper functioning.
Analysis of possible threats in old OS Linux version
Chovancová, Emília ; Dejdar, Petr (referee) ; Tomašov, Adrián (advisor)
The bachelor thesis is focused on the security aspect of an older version of a Linux based machine. The document is split into a theoretical part which contains a description of what operating system, kernel, UNIX, GNU/LINUX and Linux OS are in general. Then the description proceeds to explanation of active and passive attacks such as replay, masquarade, denial of service, man in the middle or listening and analysing the network. Afterwards it continues with description of potentially vulnerable spots that are common on operating systems. With the help provided from scanning software, especially Nmap and Lynis, the document proceeds to the practical part which contains various types of successful and unsuccesfful attacks such as password recovery, denial of service, spectre, brute force of a password and cross-site scripting. The last part covers the protection against succesfull attacks and adds a little bit more of additional protection in general in a form of an ansible script.
A Tool for Testing VoIP Security
Mazálek, Pavel ; Skokanová, Jana (referee) ; Matoušek, Petr (advisor)
This work is focused on the security of SIP. It describes basic principles of signaling protocol and it outlines the necessary protocols for voice data transfer. It describes some basic attacks on device working with SIP and provides examples and applications. The last chapter is devoted to descrie the program can be used for penetration testing of devices.
Existing Attacks on SSL/TLS Protocol
Lysoněk, Milan ; Smrčka, Aleš (referee) ; Fiedor, Tomáš (advisor)
SSL/TLS is a modern cryptographic protocol, which secures the communication between client and server. However, there are attacks on this protocol which can compromise communication either by eavesdropping or disruption. Defending against such attacks and testing the bulletproofness of protocols is a challenging process. This work describes attacks on SSL/TLS and implements selected attacks within tlsfuzzer --- a sophisticated solution for testing SSL/TLS implementations. The resulting implementation of attacks is demonstrated on three SSL/TLS implementations.
Current trends in the security of Wi-Fi IEEE 802.11 networks
Blažek, Ondřej ; Škorpil, Vladislav (referee) ; Endrle, Pavel (advisor)
This work describes security options of 802.11 standard. Principle of WEP algorithm is described here, problem with his inicialization vector which leads to a statistical attack and revelation of his secret key. Moreover other principles of algorithms such as WPA, WPA2 are explained here along with a practical demonstration of bruteforce attack in a practical part of the thesis. Also the influence of encryption on network throughput is tested here using tool Iperf.

National Repository of Grey Literature : 48 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.