National Repository of Grey Literature 24 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Correlation of Inbound and Outbound Traffic of Tor Network
Coufal, Zdeněk ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
Communication in public networks based on the IP protocol is not really anonymous because it is possible to determine the source and destination IP address of each packet. Users who want to be anonymous are forced to use anonymization networks, such as Tor. In case such a user is target of lawful interception, it presents a problem for those systems because they only see that the user communicated with anonymization network and have a suspicion that the data stream at the output of anonymization network belong to the same user. The aim of this master thesis was to design a correlation method to determine the dependence of the data stream at the input and the output of the Tor network. The proposed method analysis network traffic and compares characteristics of data streams extracted from metadata, such as time of occurence and the size of packets. This method specializes in correlating data flows of protocol HTTP, specifically web server responses. It was tested on real data from the Tor network and successfully recognized dependency of data flows.
Anonymous communication in Internet environment
Pajtinová, Mária ; Malina, Lukáš (referee) ; Hajný, Jan (advisor)
Master´s thesis focuses on certain possibilities of how user can anonymously commununicate through the Internet. There are described following anonymous programs: TOR, JAP, I2P and CyberGhost, which allow user to hide his own identity to other IP address. Subsequently, measurements from different technologies are made by anonymous program TOR for calculate transmission speed.
Shedding Light on The Dark Web
Horváth, Jakub ; Jašková, Jana (referee) ; Ellederová, Eva (advisor)
Tato bakalářská práce pojednává o Temném webu a jeho využití. Přestože je Temný web součástí Internetu takřka od samotného vzniku Internetu, veřejnost mu začala věnovat svou pozornost teprve před pár lety. Hlavním cílem této práce je zvýšit povědomí uživatelů internetu o dané problematice Temného webu a tím jim pomoci chránit sebe a své osobní informace. Práce se zabývá vrstvami, do kterých je web rozdělen a jeho původem. Dále také vysvětluje, jak k Dark Webu získat přístup za použití prohlížeče Tor, popisuje kryptoměnu Bitcoin a tržiště Silkroad. Na závěr práce uvádí obsah, který lze na Dark Webu nalézt, definuje pojem počítačová kriminalita a předpovídá budoucnost Dark Webu.
Tor Network Consensus Data Stored in OLAP Database
Chomo, Michal ; Bartík, Vladimír (referee) ; Polčák, Libor (advisor)
Tor is a distributed network providing privacy and anonymity on the Internet. Information about Tor is publicly available in a form of consensus documents. Existing tools that are able to display this information do not provide both historical and detailed view of it. A tool named Consensus Parser that provides a detailed, historical view of this information and extends it with geolocation and DNS information, was created as a part of TARZAN research project at Brno University of Technology. It stores the information in regular files on disk and makes it accessible via REST API. This thesis extends Consensus Parser with MariaDB ColumnStore database with a schema designed to conform to OLAP needs. The searching capabilities of Consensus Parser were enhanced by adding 109 new endpoints to 12 existing ones and adding the ability to limit the retrieved information to certain fields only. Disk space needed for storing the information was reduced by a factor of five.
Dataset for Classification of Network Devices Using Machine Learning
Eis, Pavel ; Tisovčík, Peter (referee) ; Žádník, Martin (advisor)
Automatic classification of devices in computer network can be used for detection of anomalies in a network and also it enables application of security policies per device type. The key to creating a device classifier is a quality data set, the public availability of which is low and the creation of a new data set is difficult. The aim of this work is to create a tool, that will enable automated annotation of the data set of network devices and to create a classifier of network devices that uses only basic data from network flows. The result of this work is a modular tool providing automated annotation of network devices using system ADiCT of Cesnet's association, search engines Shodan and Censys, information from PassiveDNS, TOR, WhoIs, geolocation database and information from blacklists. Based on the annotated data set are created several classifiers that classify network devices according to the services they use. The results of the work not only significantly simplify the process of creating new data sets of network devices, but also show a non-invasive approach to the classification of network devices.
Anonymous communication on the internet
Hořejš, Jan ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their speed.
Physiological basis of the tradeoff between growth and defense against abiotic stress: the role of carbon balance
Doložílek, Jakub ; Konrádová, Hana (advisor) ; Petrášek, Jan (referee)
Similarly to other organisms, plants must coordinate growth and development with their energetic status. Besides that, considering their sessile way of life, they need to adapt very precisely to the environmental conditions of their habitats. However, from the point of view of invested resources, the defence mechanisms may be very expensive, and so, their activation is usually accompanied by a restriction of growth. Hence, establishing functional dynamic balance between investment to growth and defensive reactions ("G-D tradeoff") is essential for the plants fitness, competitiveness and reproduction success. The thesis examines the mechanisms that are fundamentally contributing to this balancing. In this work, evolutionarily conserved axis coordinating growth and development with energetic status consisting of TOR kinase, positive growth regulator during favourable conditions, and her antagonist, the SnRK kinase, inducer of resources mobilization in purpose of realizing defensive measures securing energetic homeostasis, is discussed. Further, this thesis focuses on plant-specific pathway which links the TOR-SnRK1 axis with perception of environmental conditions. The main components of this pathway are the SnRK2 kinases, coordinators of specific defensive reactions, PP2C phosphatases and...
Analýza Darknetu se zaměřením na forenzní zkoumání
RÝC, Tomáš
This bachelor thesis aims to analyse the DARKNET with focus on forensic research. This paper describes a variety of illegal actions which occur in the DARKNET and possible form of their forensic research. A forms of identification of the illegal actions, possibilities of their documentation and analysis of the identification of the perpetrator are suggested. By the suggested methodology is designed a cybercrime solution, which can be used by the authorities active in the criminal proceedings.
TOR signalling in yeast
Šimek, Jan ; Palková, Zdena (advisor) ; Španielová, Hana (referee)
TOR ("Target of rapamycin") protein, a highly conserved Ser/Thr protein kinase, is a central component of signalling network that controls cell growth in diverse eukaryotic organism, ranging from yeast to man. TOR proteins were first identified in yeast Saccharomyces cerevisiae in 1991 as the targets of the antifungal and immunosupressive agent rapamycine. In contrast to most eukaryotes, yeast contains two TOR homologues , Tor1p and Tor2p. These proteins are components of multiprotein complexes TORC1 and TORC2. TORC1 is specifically inhibited by rapamycine and controls cell growth in response to quality of the available nutrients. TORC2, which is insensite to rapamycine, regulates actin polymerization, sphingolipid biosynthesis and endocytosis. This work is focused on description of both TOR complexes, especially on downstream and upstream regulation of TORC1. Powered by TCPDF (www.tcpdf.org)
Dataset for Classification of Network Devices Using Machine Learning
Eis, Pavel ; Tisovčík, Peter (referee) ; Žádník, Martin (advisor)
Automatic classification of devices in computer network can be used for detection of anomalies in a network and also it enables application of security policies per device type. The key to creating a device classifier is a quality data set, the public availability of which is low and the creation of a new data set is difficult. The aim of this work is to create a tool, that will enable automated annotation of the data set of network devices and to create a classifier of network devices that uses only basic data from network flows. The result of this work is a modular tool providing automated annotation of network devices using system ADiCT of Cesnet's association, search engines Shodan and Censys, information from PassiveDNS, TOR, WhoIs, geolocation database and information from blacklists. Based on the annotated data set are created several classifiers that classify network devices according to the services they use. The results of the work not only significantly simplify the process of creating new data sets of network devices, but also show a non-invasive approach to the classification of network devices.

National Repository of Grey Literature : 24 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.