31 |
Software pro jízdu do vrchu / Software for Hill Climb RacingLichosyt, Tomáš January 2016 (has links)
Thesis analyses the problem about motorsport discipline hill climb races. Using the findings is designed database structure and created user application together with websites for current result publishing. The work also describes the hardware that is compatible with this application.
|
32 |
Honeypot study of threats targeting critical infrastructure / Honeypot studie av cyberhot riktade mot kritisk infrastrukturAlberto Scola, Carlo January 2023 (has links)
Honeypots are systems with the intent of gathering information about potential threats and, at the same time, shifting part of the attention away from the real targets. In industrial control system environments, honeypots play a significant role and can lead to further threat study while distracting potential attackers away from critical physical systems. Low-interaction honeypots are emulated systems that try to recreate a real environment by simulating applications and protocols. These types of honeypots still need improvements to be efficient, and during this thesis work the focus has been on the Conpot open-source ICS honeypot. Due to their nature, low-interaction honeypots are less appealing to potential attackers than high-interaction honeypots since they do not provide the same level of realism and can be easier discovered. Earlier works showed ways to increase the ability to attract more visitors and an improved setup of Conpot has been evaluated. Its results have been analyzed and compared with the default installation. Several advancements have been implemented as well as custom features and working functionalities, such as a customized industrial system design, improved logging, and a web API proxy. The goal of this work is to answer the investigated hypothesis which consists in finding out if an improved version of the low-interaction honeypot can yield more significant results. By evaluating the network traffic received, the outcome has been insightful and showcased a distinguished improvement over the original version of the honeypot. The ICS protocols displayed a more considerable number of interactions along with an increased amount of attacks. In conclusion, further development for the Conpot honeypot is desirable which would largely improve its performance and practicality in real-world deployments. / Honeypots är ett system med avsikten att samla information om potentiella hot och samtidigt avleda uppmärksamheten från de verkliga målen. I industriella kontrollsystemsmiljöer spelar honungskrukor en viktig roll och kan leda till ytterligare hotstudier samtidigt som potentiella angripare distraheras från viktiga fysiska system. Honeypots med låg interaktion är emulerade system som försöker återskapa verkliga miljöer genom att simulera applikationer och protokoll. Dessa typer av honeypots behöver fortfarande förbättringar för att vara effektiva, och under detta examensarbete har fokus legat på Conpot open source ICS honeypots. På grund av designbegränsningar är honeypots med låg interaktion mindre tilltalande för potentiella angripare än honeypots med hög interaktion. Tidigare arbeten har visat sätt att öka möjligheten att locka fler besökare och en förbättrad installation av Conpot har utvärderats och dess resultat har analyserats och jämförts med standardinstallationen. Flera framsteg har implementerats samt anpassade funktioner och fungerande funktioner, såsom en anpassad industriell systemdesign, förbättrad loggning och en webb-API-proxy. Målet med detta arbete är att svara på den undersökta hypotesen som går ut på att ta reda på om en förbättrad version av honungskrukan med låg interaktion kan ge mer signifikanta resultat. Genom att utvärdera den mottagna nätverkstrafiken har resultatet varit insiktsfullt och visat upp en stor förbättring jämfört med den ursprungliga versionen av honeypot. ICS-protokollen visade ett större antal interaktioner tillsammans med en ökad mängd attacker. Sammanfattningsvis är det önskvärt med en vidareutveckling av Conpot honeypot som avsevärt skulle förbättra dess prestanda och praktiska användning i den verkliga världen.
|
33 |
A Secure Web Based Data Collection and Distribution System for Global Positioning System ResearchBleyle, Derek 24 November 2004 (has links)
No description available.
|
34 |
Network Service Misuse Detection: A Data Mining ApproachHsiao, Han-wei 01 September 2004 (has links)
As network services progressively become essential communication and information delivery mechanisms of business operations and individuals¡¦ activities, a challenging network management issue emerges: network service misuse. Network service misuse is formally defined as ¡§abuses or unethical, surreptitious, unauthorized, or illegal uses of network services by those who attempt to mask their uses or presence that evade the management and monitoring of network or system administrators.¡¨ Misuses of network services would inappropriately use resources of network service providers (i.e., server machines), compromise the confidentiality of information maintained in network service providers, and/or prevent other users from using the network normally and securely. Motivated by importance of network service misuse detection, we attempt to exploit the use of router-based network traffic data for facilitating the detection of network service misuses. Specifically, in this thesis study, we propose a cross-training method for learning and predicting network service types from router-based network traffic data. In addition, we also propose two network service misuse detection systems for detecting underground FTP servers and interactive backdoors, respectively.
Our evaluations suggest that the proposed cross-training method (specifically, NN->C4.5) outperforms traditional classification analysis techniques (namely C4.5, backpropagation neural network, and Naïve Bayes classifier). In addition, our empirical evaluation conducted in a real-world setting suggests that the proposed underground FTP server detection system could effectively identify underground FTP servers, achieving a recall rate of 95% and a precision rate of 34% (by the NN->C4.5 cross-training technique). Moreover, our empirical evaluation also suggests that the proposed interactive backdoor detection system have the capability in capturing ¡§true¡¨ (or more precisely, highly suspicious) interactive backdoors existing in a real-world network environment.
|
35 |
Whiteboxrouter för små kontorsnätverk - En prestandajämförelseLundberg, Carl January 2018 (has links)
Inom nätverksbranchen finns en strävan att gå från proprietära lösningar till en öppen standard för hård- och mjukvara. En term för detta är Whiteboxing och det innebär att användaren ges möjlighet att plocka ihop komponenter efter behov, och själv välja vilken mjukvara som används. I sin enklaste form byggs en Whiteboxrouter av en konventionell PC med två nätverkskort och en mjukvarubaserad routingapplikation. Företaget ÅF är intresserade av att veta hur Whitebox-lösningar för routrar står sig prestandamässigt i relation till konventionella routerlösningar med Application Specific Integrated Circuit. Detta arbete har undersökt prestandan genom att mäta throughput och goodput hos en Cisco 2911-router, en Whiteboxrouter med mjukvaran pfSense, samt en Whiteboxrouter som körde pfSense virtualiserat på ESXi. Dessutom undersöktes respektive konfigurations prestanda när trafiken skickades över IPsec VPN. För mätningarna användes filöverföringar med FTP och mätprogrammet Iperf3. Målet med arbetet var att skapa ett beslutsunderlag som klargjorde eventuella prestandaskillnader och utarbetade rekommendationer för framtida val av routerlösning. Resultatet visade att vid generell paketförmedling var prestandan mellan routrarna relativt jämn, dock rekommenderas den virtualiserade Whiteboxroutern då den fick det bästa resultatet. När trafiken sedan krypterades med IPsec VPN var det stora prestandaskillnader mellan enheterna. Bäst prestanda fick Whiteboxroutern. Författaren ser en vinning med Whitebox-tekniken i stort då den medger att serverutrustning som ska utrangeras på grund av prestandakrav, istället kan fungera som nätverksutrustning (routrar och brandväggar) och fortsätta användas under en större del av den tekniska livslängden. Detta kan på sikt leda till minskad miljöpåverkan och besparingar för företaget.
|
36 |
Monitorování síťového provozu s identifikátory obsahujícími národní abecedy / International Alphabets in Network Traffic MonitoringTalašová, Irena January 2018 (has links)
This work deals with the implementation of support for network identifiers containing national characters in the SProbe software project, which is designed to monitor network flows. It was necessary to test and evaluate the status of selected network applications working over SMTP, POP3, IMAP, FTP or SIP protocols. On the basis of the information obtained, an extension of the current software project SProbe was proposed - a module to support network traffic monitoring with national alphabet characters. The proposed solution was then implemented and the functionality of the entire resulting system was tested. In addition, this work proposes and implements a modification of the test environment for faster and more efficient testing of the system focusing on tests containing diacritics.
|
37 |
Speciální bezpečnostní systém / Special security systemNáhlík, Ondřej January 2015 (has links)
This master’s thesis is focused on design and realisation of special security system for space and property protection. System is devided into two parts, transmitting and receiving. Transmitting part is formed by Raspberry Pi Model B+, motion sensor, webcam and USB LTE modem Huawei E398. Receiving part consists of computer with suitable application for communication with FTP server. Data transfer in mobile systems is described in the first part of this thesis, transmitting part is designed in the second part. There is one transmitting option chosen in the third part and there are also described applications of the transmitting part. The last part of this thesis is focused on the receiving part and its application.
|
38 |
Systém sledování stavu konstrukcí z inteligentního betonu / The monitoring system for smart concrete construction conditionBrouček, Jan January 2015 (has links)
This thesis describes designing of a wireless system which allows to transmit measured data of sensors made of smart concrete. Measured data are transmitted from measuring points to the collecting unit, which stores them, and pass them to the server which is connected in the Internet network. The design of the system is focused to achieve low power consumption of all used components to provide the longest possible operation time, when using primary lithium cell. The design should be also able to provide possibility of easy modification of the measuring points.
|
39 |
Optimalizace síťových úloh / Network Tasks OptimalizationDražil, Jan January 2016 (has links)
Nowdays, when we are running out of public IPv4 addresses, we rely on techniques that at least postpone their complete exhaustion. One of these techniques is a network address translation (NAT). Internet providers require the highest possible bandwidth from devices that perform this task. This thesis compares NAT DPDK, built on top of DPDK framework, with freely available alternatives. This work also extends NAT DPDK with Application-Level Gateway support.
|
40 |
Analýza vlivu velikosti okna a zpoždění na efektivitu TCP spojení / Analysis of the effect of delay and window size on TCP connection efficiencyKavický, Martin January 2010 (has links)
Content of master’s thesis is description field of Sliding window and it’s expansion algorithms, witch are Slow start, Congestion avoidance, Fast Retransmit and Fast Recovery algorithm. Thereinafter is described creation of model in Opnet Modeler’s simulation area. In this simulation area was analyzed reactions of average transfer speed onto variance of data size, lost ratio, latency in short and long time slot and variance of receiver’s buffer size. In last section of this document is method design witch makes it possible of transfer speed control through the use of receiver’s buffer size dynamic setting.
|
Page generated in 0.0698 seconds