National Repository of Grey Literature 6 records found  Search took 0.01 seconds. 
Traffic detection and analysis using SSL/TLS
Hutar, Jan ; Dvořák, Jan (referee) ; Smékal, David (advisor)
This diploma thesis deals with a detection and analysis of secure connections of electro- nic communication through SSL/TLS protocols. The thesis begins with introduction to SSL/TLS protocols. Thereafter, an analysis of messages used to establish secure con- nections using STARTTLS and postal protocols SMTP, POP3, and IMAP was made. Metadata detection and extraction of secured simplex and duplex connections take place using deep packet inspection tools. The tool of choice is the nDPI library from the Ntop project. The library was extended to detect the connections and extract the metadata based on studies and analysis of transmitted messages. Finally, testing is performed on a training data set and a basic analysis of acquired metadata is made.
Identification of Application Protocols
Wrona, Jan ; Bartoš, Václav (referee) ; Kořenek, Jan (advisor)
This thesis is focused on identification of application protocols with emphasizing the speed of their recognition and following possibility of hardware implementation. Nowadays tools are not suitable for fast identification of application protocols in current network monitoring devices, because the decision is not provided for the first packets of network flow. Therefore this thesis propose new model for fast and reliable identification of application protocols. The model was implemented and tested on HTTP, SIP, SMTP and DNS protocols and results were compared to regular expressions and nDPI and libprotoident libraries. For all these protocols, the proposed model has comparable accuracy to other methods, but also provides fast result based on the first packets of the flow.
Detection, Extraction and Measurement of the Length and Width of the Metacarpal Bones in Images
Paul, Daniel ; Dvořák, Michal (referee) ; Drahanský, Martin (advisor)
Ľudské telo bolo po celé storočia bodom mnohých štúdií. Chceme zistiť všetko, čo je možné sa o nás dozvedieť, o tom, ako fungujeme a prečo tak fungujeme. Vedci nám poskytujú výskumy, ktoré objasňujú tieto otázky. Mali by sme byť súčasťou tohto výskumu a obohatiť naše vedomosti prispievaním do vedy. Preto bude táto práca zameraná na detekciu, extrakciu a meranie metakarpálnych kostí na obrázkoch. Táto práca poskytne čitateľovi vedomosti o určitých metódach spracovania obrazu a záprstných kostiach. Predstaví proces extrakcie ich kontúr a ukáže spôsob, ako merať ich šírku a výšku.
Traffic detection and analysis using SSL/TLS
Hutar, Jan ; Dvořák, Jan (referee) ; Smékal, David (advisor)
This diploma thesis deals with a detection and analysis of secure connections of electro- nic communication through SSL/TLS protocols. The thesis begins with introduction to SSL/TLS protocols. Thereafter, an analysis of messages used to establish secure con- nections using STARTTLS and postal protocols SMTP, POP3, and IMAP was made. Metadata detection and extraction of secured simplex and duplex connections take place using deep packet inspection tools. The tool of choice is the nDPI library from the Ntop project. The library was extended to detect the connections and extract the metadata based on studies and analysis of transmitted messages. Finally, testing is performed on a training data set and a basic analysis of acquired metadata is made.
Security inspection of network traffic
Kult, Viktor ; Havránek, Martin (advisor) ; Ladislav, Ladislav (referee)
Thesis topic concerns the issue of information security in corporate environments. Literature search includes information obtained by studying articles and literature in the field of information security. Resources were selected with a focus on the security risks, security technologies and legislative regulation. Attention is focused on technology that supports monitoring of communication flows in the data network. Overview of traffic operating a data network provides important information for the prevention or investigation of security incidents. Monitoring also serves as a source of information for the planning of the network infrastructure. It can detect faults or insufficient transmission capacity. The practical part is dedicated to implementation of the monitoring system in the real corporate networks. Part of the experience is the analysis of the network structure and choice of appropriate tools for actual implementation. When selecting tools, you can use the scoring method of multicriterial analysis options. The integration of the monitoring system is also the configuration of active network elements. Subsequent analysis of network traffic provides information about the most active users, most used applications or on the sources and targets of data transmitted. It provides a source of valuable information that can be used in case of failure on the network or security incident. The conclusion is a summary of the results and workflow.
Identification of Application Protocols
Wrona, Jan ; Bartoš, Václav (referee) ; Kořenek, Jan (advisor)
This thesis is focused on identification of application protocols with emphasizing the speed of their recognition and following possibility of hardware implementation. Nowadays tools are not suitable for fast identification of application protocols in current network monitoring devices, because the decision is not provided for the first packets of network flow. Therefore this thesis propose new model for fast and reliable identification of application protocols. The model was implemented and tested on HTTP, SIP, SMTP and DNS protocols and results were compared to regular expressions and nDPI and libprotoident libraries. For all these protocols, the proposed model has comparable accuracy to other methods, but also provides fast result based on the first packets of the flow.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.