National Repository of Grey Literature 46 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Methods for Network Traffic Classification
Jacko, Michal ; Ovšonka, Daniel (referee) ; Barabas, Maroš (advisor)
This paper deals with a problem of detection of network traffic anomaly and classification of network flows. Based on existing methods, paper describes proposal and implementaion of a tool, which can automatically classify network flows. The tool uses CUDA platform for network data processing and computation of network flow metrics using graphics processing unit. Processed flows are subsequently classified by proposed methods for network anomaly detection.
Economics System Security Solution
Krčmárik, Branislav ; Plch, Edward (referee) ; Ondrák, Viktor (advisor)
The essay describes analysing the present situation of securing a network of the System4u company and how it was applied to detect attacks to the system. The chosen IDS has been an open source program named Snort.
Implementation of Honeypot tool for monitoring and analysis of network attacks
Němeček, Ladislav ; Červenka, Vladimír (referee) ; Bartl, Milan (advisor)
The goal of this thesis is to describe and categorize the malicious software. Thesis deals with the network attacks and the protection against them as well as how to detect and analyze the attack by the eligible tools. The next part of the thesis deals with the honeypot topic and the possibilities of detection using this software, specifically then the Argos tool. The installation, usage, and the methods of detection of the tool are also being described. The next chapter describes how to secure the honeypot against abuse. Last but not least, the thesis also contains the results of the network monitoring, attacks on the honeypot, and describes the log files used by Argos to interpret the results of the attack detection.
Analysis of data transfer security issues at particular OSI model layers
Kňazovický, Pavel ; Růčka, Lukáš (referee) ; Sobotka, Jiří (advisor)
The aim of this Bachelor's thesis is the analysis of secured data transfer protocols. The very first part is dedicated to the short description of the reference model ISO/OSI. The second one is focused to the secured protocols at particular layers of ISO/OSI model, of which SSL/TLS protocol is closely analysed in the third part. The last part is about often used attacks in the area of computer networks and their services and the basic protection against them is also mentioned.
Analysis of Security Incidents from Network Traffic
Serečun, Viliam ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
Analýza bezpečnostních incidentů se stala velmi důležitým a zajímavým oborem počítačové vědy. Monitorovací nástroje a techniky pomáhají při detekci a prevenci proti tímto škodlivým aktivitám. Tento dokument opisuje počítačové útoky a jejich klasifikaci. Také jsou tady opsaný některé monitorovací nástroje jako Intrusion Detection System nebo NetFlow protokol a jeho monitorovací software. Tento dokument také opisuje konfiguraci experimentální topologie a prezentuje několik experimentů škodlivých aktivit, které byly detailně kontrolovány těmito monitorovacími nástroji.
Internet of Things (IoT) Security Risks and Threat
Urbanovský, Jozef ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
The bachelor's thesis deals with the issue of security and attacks on the Internet of Things devices. The document addresses nature of Internet of Things, its characteristics and information security. The thesis analyzes dierent protocols and standards used by Internet of Things and types of network attacks. Part of work consists of packet capture analysis from IoT honeypot and showcases discoverd attacks. In fnal part, one specifc IoT device is analyzed in terms of security, around which is created an experimental IoT system. Subsequently this system is penetration tested with dierent attacks, thus creating new datasets.
Analysis and Demonstration of Selected Network Attacks in OS Windows
Hanyáš, Martin ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This thesis describes network attacks that focus on the local networks and operating system Windows. The aim is to create materials for teaching the elective course Security and Computer Networks which is taught at the Faculty of Information Technology Brno University of Technology.
Analysis of wireless network attacks
Kačic, Matej ; Dočkal,, Jaroslav (referee) ; Zbořil, František (referee) ; Hanáček, Petr (advisor)
This work describes security mechanisms of wireless network based on 802.11 standard and security enhancement 802.11i of these networks known as WPA2, where the analysis of vulnerabilities and attacks on these networks were performed. The work discusses two major security issues. The first is unsecure management frames responsible for vulnerability with direct impact on availability and the other is the vulnerability that allows executing the impersonalize type of attacks. The system for generation attacks was designed to realize any attack very fast and efficient. The core of the thesis is the design of a system for attack analysis using the principle of trust and reputation computation. The conclusion of the work is devoted to experimenting with the proposed system, especially with the selection of suitable metrics for calculating the trust value.
Analysis and Demonstration of Selected Network Attacks
Jirásek, Jakub ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The aim of this Bachelor thesis is to describe and realize selected network attacks which are taught at the FIT, Brno University of Technology. The thesis includes demonstration exercises that can be used for teaching computer network security. First part of this work discusses theory for each attack and possible security solutions. In the second part the practical realizations (for each network attack) are described.
Analysis and Demonstration of Selected Wireless Attacks in OS Windows
Husár, Michal ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis descibes available technologies used for securing wireless networks and their weaknesses and imperfections. In the thesis there are described network attacks performed on the Windows platform, which abuse these weaknesses. Thesis is also devoted to creation of demonstration video and written instructions for each attack, which can be used for teaching network security.

National Repository of Grey Literature : 46 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.