National Repository of Grey Literature 70 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Detection of slow-rate DDoS attacks
Sikora, Marek ; Frolka, Jakub (referee) ; Blažek, Petr (advisor)
This diploma thesis is focused on the detection and protection against Slow DoS and DDoS attacks using computer network traffic analysis. The reader is introduced to the basic issues of this specific category of sophisticated attacks, and the characteristics of several specific attacks are clarified. There is also a set of methods for detecting and protecting against these attacks. The proposed methods are used to implement custom intrusion prevention system that is deployed on the border filtering server of computer network in order to protect Web servers against attacks from the Internet. Then created system is tested in the laboratory network. Presented results of the testing show that the system is able to detect attacks Slow GET, Slow POST, Slow Read and Apache Range Header and then protect Web servers from affecting provided services.
Antivirus protection of a computer from a boot repository
Mlejnek, Jiří ; Malina, Lukáš (referee) ; Burda, Karel (advisor)
ABSTRACT Theme of the thesis is the design method of anti-virus protection with the use of an alternative boot store. Processed is a related issue of viruses and the possibility of defenses against them. This thesis is focused on the design and selection of components solutions enabling the execution of antivirus test from the undistorted by the operating system. With selected components continues to realize an alternative booting the operating system from a Windows platform computer network with automatic virus checking of all local disks. The results of inspection are transmitted using signed files on a network server and typically give an overview of the results of the individual tests.
Tool for SQL Injection Vulnerability Detection
Kutypa, Matouš ; Samek, Jan (referee) ; Barabas, Maroš (advisor)
The Bachelor thesis is focused on the issue of SQL injection vulnerabilities. The thesis presents commonly used procedures in the attacks against information systems and are also discussed possibilities of defense including the correct ways of input validation. The theoretical part contains the essential foundation of what should the penetration tester know, to be able to examine the inputs of application for SQL injection vulnerability. The thesis also describes analysis, design and implementation of specialized tool for Web application vulnerability detection. The implemented tool was tested and compared with other existing tools. Within the thesis has been also implemented a Web application, which demonstrates many different variants of SQL injection vulnerable inputs.
Mobile Game Using Augmented Reality
Konečný, Adam ; Kapinus, Michal (referee) ; Najman, Pavel (advisor)
Main goal of this thesis was to create a game in augmented reality running on iOS operating system. The game is based on the tower defense game genre. The thesis describes augmented reality and its history. The work also describes tools which are necessary to create this project. Following part describes the design and development process of the game. Lastly the thesis deals with the tools available for testing, testing itself and its results.
Mitigation of Volumetric DDoS Attacks in SDN Environment
Hodes, Vojtěch ; Křepelka, Václav (referee) ; Škorpil, Vladislav (advisor)
The aim of this Master's thesis is to explore different attitudes and to design various monitoring and detection concepts of volumetric DDoS attacks in core networks. The thesis deals with data flow control protocols with an emphasis on a modern technology of Software Defined Networks. The last part of the thesis describes verification of the theory by setting up a laboratory environment for volumetric DDoS UDP Flood simulation, detection and automated mitigation.
Kvalita vládnutí a výdaje na obranu
Dostál, Pavel
The thesis examines two phenomena, namely defence spending and the quality of governance. The selected countries in which these two phenomena are examined in this thesis are selected countries of different world organizations or geograph-ical regions. To fully understand the issue, a section of the thesis is devoted to the description of the selected regions and their evolution. Subsequently, the phenom-ena of governance quality are described, and their determinants are examined. Both phenomena and their development are studied separately and then their in-terdependence and connection is examined. The conclusion is devoted to an as-sessment of the connection between the two issues.
NORTHERN EUROPE AND THE LOOMING RUSSIA: IS EUROPE (NOT) ENOUGH? Different approaches to a European integrated defence: the cases of Norway and Finland.
Bertoldini, Raul ; Kofroň, Jan (advisor) ; Riegl, Martin (referee)
RAUL BERTOLDINI MASTER'S THESIS ABSTRACT 08/2023 NORTHERN EUROPE AND THE LOOMING RUSSIA: IS EUROPE (NOT) ENOUGH? Different approaches to a European integrated defence: the cases of Norway and Finland This master's thesis investigates Finland and Norway's geopolitical landscape and security strategies amid Europe's evolving security environment. The research scrutinises how these Nordic nations have managed their relations with the European Union (EU), North Atlantic Treaty Organization (NATO), and Russia, set against the backdrop of the Russian invasion of Ukraine and escalating tensions in the Arctic region. An in-depth analysis of historical contexts, paths to EU membership, and debates on NATO affiliation underscore the intricate balance these countries maintain in preserving their unique national identities and sovereignty while engaging with regional structures and alliances for security. The study illustrates how the Ukraine conflict prompted strategic realignments, with both Finland and Norway opting for closer ties with the EU and NATO to protect their sovereignty, yet they perceive the security guarantees offered by these two organisations differently. Ultimately, the thesis offers valuable insights into the adaptive and proactive strategies these countries employ in response to current...
Characteristics of selected performance indicators in defensive play of the men's U19 FK Dukla Praha category and the women's FK Dukla Praha 1st team
Janko, Kristian ; Frýbort, Pavel (advisor) ; Kokštejn, Jakub (referee)
Name: Characteristics of selected performance indicators in defensive play of the men's U19 FK Dukla Praha category and the women's FK Dukla Praha 1st team Objectives: The aim of this thesis is to compare selected performance indicators before conceding a goal between men's U19 category and women's 1st team at FK Dukla Praha. Methods: A quantitative research was conducted using notational analysis based on predetermined categories through indirect observation. All 130 goals conceded by the FK Dukla Praha U19 men's category (66) and by the women's FK Dukla Praha 1st team (64) in the 2022/2023 season were examined. The game situations leading to the conceded goal were recorded into five categories. Results: Both teams most frequently conceded goals from set-piece situations (women's 1st 34%, men's U19 32% of all conceded goals). The U19 category conceded more goals from shots outside the penalty area. The majority of goals were recorded after a shot from within a distance of 11 meters (U19 category 61%, Women's "A" 72% of goals). Conclusion: The results showed similarities between the U19 category and the women's 1st team in terms of the most frequent goal-conceding methods, but also differences, as the women's "A" team more often conceded goals from crosses and corner kicks. The women's "A" team had...
Active Response to Selected Network Attacks
Wysoglad, Jaromír ; Martínek, Tomáš (referee) ; Žádník, Martin (advisor)
The goal of this thesis is to design and implement an active response to a chosen network attack. In the thesis are mentioned a few different possible responses to network attacks. These reactions are then compared using a few different criteria and the most appropriate response is then chosen for implementation. This response is then described in detail and its implementation is proposed. In the later fazes of the thesis the reaction is implemented and tested. The chosen reaction can react to two types of attacks. The first type is a port scan. The implemented project can answer a port scan instead of the original victim. The second type is a situation, when an attacker is trying to log into an SSH server of the victim. The project can reroute these login attempts to a honeypot, which can record the used login credentials. After this, it's possible to let the attacker to successfuly login. In this sitation the honeypot will reroute the attacker to a docker container, so the attacker will think, that this is a real ssh server. The honeypot will then record attacker's every move on the container. As a part of the thesis, there is also a simple application, which allows the defender to replay the recorded attack. The defender will se exactly the same output as the attacker saw during the attack.

National Repository of Grey Literature : 70 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.