National Repository of Grey Literature 15 records found  1 - 10next  jump to record: Search took 0.15 seconds. 
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.
Cyber Attacks in JMeter
Klimeš, Jan ; Člupek, Vlastimil (referee) ; Číka, Petr (advisor)
Bachelor thesis deals with the security of computer networks based on TCP/IP protocol stack. The main aim is to create extension modules for application JMeter that add features to the software generate DoS attacks, SYN flood, UDP flood, DNS Server attack and DNS Amplification using applications Trafgen. The theoretical part generally describes cyber attacks, associated with network protocols and application JMeter itself. The practical part contains a description of the graphical interface of the expansion modules, each class which the modules consist of and test results.
Cyber Attacks
Zmeškal, Jiří ; Člupek, Vlastimil (referee) ; Číka, Petr (advisor)
Theoretical part of this thesis is dedicated to describing basic terms of network communication. Usage of network communication has become a necessity and is used on daily basis for a number of purposes, starting with communication between people, going across internet shopping and banking all the way to remote controlling industrial machinery. Another theoretically described topic is how attackers abuse attributes and shortcomings of communication protocols in order to commit illegal activities, specifically denial of service type of attacks. Finally, theoretical part includes a list of found open source applications capable of launching such attacks. Practical part describes development of application, capable of launching two selected forms of attack. These attacks are HTTP GET Flood, based on sending massive amounts of GET request, and Slow HTTP GET, based on imitating a user with slow internet connection. The development is described step by step and includes multithread processing, used publicly available components (Boost library for example) and challenges encountered during development (such as library limitations and cross platform compatibility).
Simulating information security management within a university environment
Hložanka, Filip ; Martina,, Chitu (referee) ; Sedlák, Petr (advisor)
This diploma thesis is concerned with simulating information security management within a university environment. It is divided into three parts. The theoretical part focuses on describing the assets which could be part of a faculty network, attacks that could target it, security processes which could protect it and users that are active within it. The analytical part then applies these segments on a real faculty network. Based on this analysis, a set of specific assets, attacks, security processes and other tasks is created in order to simulate a simplified version of the analyzed network using a sophisticated cybernetic polygon. The security of the network is then assessed after several iterations of the simulations. Its parameters are adjusted in the effort to increase its security and the module is tested on an academic employee in order to assess its effectiveness. The conclusion evaluates the possibilities of increasing the security of the simulated network as well as the usability of the cybernetic polygon in practice.
Vulnerability testing of cloud solutions by Slowloris attack
Šrámek, Michal ; Sikora, Marek (referee) ; Šeda, Pavel (advisor)
This bachelor's thesis addresses the issue of distributed Slowloris attack implemented in the Apache JMeter module. This module is then used to demonstrate the vulnerability in the Microsoft Azure cloud environment. The outcome of the thesis is an extension of the module, enabling testing from multiple IP addresses. The SlowHTTPTest tool, which the module utilizes for the attack, is also modified. In the introduction, the basic concepts related to cloud services and their classification are established. This is followed by chapters defining the current security threats to the cloud and how they compare between the three largest cloud providers. The technologies and configurations used in Azure environments are also described. Finally, the thesis focuses on modifying the attack module to support multiple addresses and tests it on both local and cloud infrastructures.
Moving Toward Strategic Cyber War Theory? Analysis of Russian State-backed Cyber Attacks
Green, Joshua ; Erkomaishvili, David (advisor) ; Landovský, Jakub (referee)
This thesis analysed cyber-attacks conducted by two pairs of nation states (Russia/Ukraine and Iran/Israel) against each other, through the lens of Jan Kallberg's Strategic Cyberwar Theory in order to determine if elements of the theory are being applied and if so, how they are being applied. This thesis also attempts to give insights as to whether this represents a shift towards the Strategic Cyber War Theory becoming a practical reality. The thesis finds that elements of Kallberg's theory are clearly visible, to varying degrees, in the offensive campaigns conducted by all the nation states studied. Each nation state employed a different strategy in terms of which pillars of society and organisations were targeted. All the evidence points towards cyber-attacks becoming a more important tool for nation states pursuing their political and strategic goals. However, the notion of the Strategic Cyber War Theory becoming a reality is far more uncertain, with other tools likely to remain more important, particularly during wartime (such as the traditional branches of military service). If a level of technological sophistication can be reached where cyber-attacks can be conducted which have the disruptive capabilities of the NotPetya cyber-attack seen in 2017 but are able to be maintained over a...
Crime of Aggression under the Rome Statute of International Criminal Court
Voženílková, Tereza ; Lipovský, Milan (advisor) ; Flídrová, Eliška (referee)
1 Crime of Aggression under the Rome Statute of International Criminal Court, abstract Recent events in the world show that cyber-attacks can constitute one of the greatest threats to international peace and security. Cyber operations occurring in cyberspace present unique challenges to the international community beyond the scope of existing international law. While there is a consensus that international law should apply to cyberspace, perspectives on the qualification of cyber-attacks as the most serious crimes falling under the jurisdiction of the International Criminal Court remain divided. This paper discusses the definition of the crime of aggression under the jurisdiction of the International Criminal Court with a special focus on cyber-attacks. The aim of this paper is to answer the question whether cyber-attacks can be considered a crime of aggression under the Rome Statute. The first chapter discusses the historical development and the rather complicated process of adopting the definition of the crime of aggression over the years. The second chapter describes the various elements of the crime of aggression and the jurisdiction of the International Criminal Court and the Security Council over this crime. The definition of cyber- attacks and their difference from conventional attacks is discussed...
The Potential of Cyber Threats in the Critical Energy Infrastructure
Starý, Jan ; Schmidt, Nikola (advisor) ; Karásek, Tomáš (referee)
Diploma thesis analyses the potential of Cyber Threats towards critical energy infrastructure in terms of network theories originating in graph theories, complex networks and technological possibilities how to compromise security of networks belonging to critical infrastructure. By the analysis of defined dependent and independent variables the author finds out how networks behave under which circumstances, what means exist in the field of network security and if adopted measures to increase security are in accordance with the effort of creation safe and decentralized system of critical energy infrastructure. Main emphasis is put on the concept of smart grids as possible solution of decentralization. In these terms technical means of security are studied especially with emphasis on SCADA (Supervisory Control And Data Acquisition) systems and the Internet as one of the essential component of communication in modern communication technologies.
Simulating information security management within a university environment
Hložanka, Filip ; Martina,, Chitu (referee) ; Sedlák, Petr (advisor)
This diploma thesis is concerned with simulating information security management within a university environment. It is divided into three parts. The theoretical part focuses on describing the assets which could be part of a faculty network, attacks that could target it, security processes which could protect it and users that are active within it. The analytical part then applies these segments on a real faculty network. Based on this analysis, a set of specific assets, attacks, security processes and other tasks is created in order to simulate a simplified version of the analyzed network using a sophisticated cybernetic polygon. The security of the network is then assessed after several iterations of the simulations. Its parameters are adjusted in the effort to increase its security and the module is tested on an academic employee in order to assess its effectiveness. The conclusion evaluates the possibilities of increasing the security of the simulated network as well as the usability of the cybernetic polygon in practice.
Cyberattack generator
Gajdušek, Ondřej ; Jeřábek, Jan (referee) ; Hajný, Jan (advisor)
This work deals with the enhancement of software which generates cyberattacks. These enhancements are focused on application layer of ISO/OSI model. The firsh part of the work contains general description of cyberattacks. Concrete attacks which this work is dealing with are described more concretely. Next part deals with describing generator software and its enhancement. The last part is describing testing of newly implemented cyberattacks.

National Repository of Grey Literature : 15 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.