To see the other types of publications on this topic, follow the link: Síťová bezpečnost.

Dissertations / Theses on the topic 'Síťová bezpečnost'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 26 dissertations / theses for your research on the topic 'Síťová bezpečnost.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tomaga, Jakub. "Metodika zavedení síťové bezpečnosti v softwarové společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224224.

Full text
Abstract:
This thesis deals with network security and its deployment in the real environment of the software company. The thesis describes information management framework with a specific concentration on computer networks. Network security policy is designed as well as network infrastructure modifications in order to increase the level of security. All parts of the solution are also analyzed from financial point of view.
APA, Harvard, Vancouver, ISO, and other styles
2

Karger, David. "Moderní služby honeypot/honeynet pro klasické informační sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-412981.

Full text
Abstract:
This work describes honeypots, their definition, clasification and logging possibilities. In the practical part honeypots are tested for the services that are most often attacked, their installation is performed and tests are made for basic familiarization with the functionality of the honeypot. Furthermore, the honeypot is exposed to the Internet and the obtained data are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
3

Bartoš, Václav. "Detekce anomálií v síťovém provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237042.

Full text
Abstract:
This work studies systems and methods for anomaly detection in computer networks. At first, basic categories of network security systems and number of methods used for anomaly detection are briefly described. The core of the work is an optimization of the method based on detection of changes in distributions of packet features originally proposed by Lakhina et al. This method is described in detail and two optimizations of it are proposed -- first is focused to speed and memory efficiency, second improves its detection capabilities. Next, a software created to test these optimizations is briefly described and results of experiments on real data with artificially generated and also real anomalies are presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Barabas, Maroš. "Bezpečnostní analýza síťového provozu pomocí behaviorálních signatur." Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-412570.

Full text
Abstract:
This thesis focuses on description of the current state of research in the detection of network attacks and subsequently on the improvement of detection capabilities of specific attacks by establishing a formal definition of network metrics. These metrics approximate the progress of network connection and create a signature, based on behavioral characteristics of the analyzed connection. The aim of this work is not the prevention of ongoing attacks, or the response to these attacks. The emphasis is on the analysis of connections to maximize information obtained and definition of the basis of detection system that can minimize the size of data collected from the network, leaving the most important information for subsequent analysis. The main goal of this work is to create the concept of the detection system by using defined metrics for reduction of the network traffic to signatures with an emphasis on the behavioral aspects of the communication. Another goal is to increase the autonomy of the detection system by developing an expert knowledge of honeypot system, with the condition of independence to the technological aspects of analyzed data (e.g. encryption, protocols used, technology and environment). Defining the concept of honeypot system's expert knowledge in the role of the teacher of classification algorithms creates autonomy of the~system for the detection of unknown attacks. This concept also provides the possibility of independent learning (with no human intervention) based on the knowledge collected from attacks on these systems. The thesis describes the process of creating laboratory environment and experiments with the defined network connection signature using collected data and downloaded test database. The results are compared with the state of the art of the network detection systems and the benefits of the proposed approximation methods are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
5

Kadlec, Miroslav. "Návrh řízení informační bezpečnosti v průmyslovém prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378336.

Full text
Abstract:
The diploma thesis deals with the design of information security management in the industrial environment. In the first part of thesis is mentioned the theoretical background from the area of information security. The analysis of the default status is followed, and the risk analysis is also performed. Further, the thesis deals with the design of the industrial network infrastructure and its management.
APA, Harvard, Vancouver, ISO, and other styles
6

Kuchařík, Lukáš. "Návrh ISMS v průmyslovém prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241472.

Full text
Abstract:
The master’s thesis is aimed at the proposal of network infrastructure and introduction of the managerial system for the safety of information in the industrial environment. At the beginning the work is focused on theoretical knowledge concerning the safety of information wherein it describes basic concepts and common procedures of the managerial system of the safety of information. Further, the work deals with risk analysis in which the measures for reduction in hazard are suggested. The proposal for a new network infrastructure is finally carried out. The work draws the information from CSN standards ISO/IEC, series 27000.
APA, Harvard, Vancouver, ISO, and other styles
7

de, Silva Hidda Marakkala Gayan Ruchika. "Analýza síťové bezpečnosti." Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-261266.

Full text
Abstract:
Práce představuje model a metody analýzy vlasností komunikace v počítačových sítích. Model dosažitelnosti koncových prvků v IP sítích je vytvořen na základě konfigurace a síťové topologie a umožňuje ukázat, že vabraný koncový uzel je dosažitelný v dané síťové konfiguraci a stavu.   Prezentovaná práce se skládá ze dvou částí. První část se věnuje modelování sítí, chování směrovaích protokolů a síťové konfiguraci. V rámci modelu sítě byla vytvořena modifikovaná topologická tabulka (MTT), která slouží pro agregaci síťových stavů určených pro následnou analýzu. Pro analýzu byl použit přístup založený na logickém programování, kdy model sítě je převeden do Datalog popisu a vlastnosti jsou ověřovány kladením dotazů nad logickou databází. Přínosy práce spočívají v definici grafu síťových filtrů, modifikované topologické tabulce, redukce stavového prostoru agrgací síťových stavů, modelů aktivního síťového prvku jako filter-transformace komponenty a metoda pro analýzu dosažitelnosti založena na logickém programování a databázích.
APA, Harvard, Vancouver, ISO, and other styles
8

Kosek, Jindřich. "Zavedení ISMS v malém podniku se zaměřením na ICT infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224444.

Full text
Abstract:
The diploma thesis is focused on the design implementation of information security management system in a small business and is applying theoretical knowledge to real-life situations in a manufacturing company. First of all is performed analysis of current status and the consequent threats which can affect the company's assets. Thereafter are proposed measures based on identified risks and requirements of the owner.
APA, Harvard, Vancouver, ISO, and other styles
9

Nykrýn, Lukáš. "Implementation of NIS Backend for SSSD." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236214.

Full text
Abstract:
Tato práce se v první části zabývá představením technologií a nástrojů pro centrální správu a přihlašování uživatelů v GNU/Linux. Ukazuje využití adresářových služeb v síťové infrastruktuře, konkrétně služby NIS a její porovnání s dnes pravděpodobně nejrozšířenější adresářovou službou LDAP. Dále práce popisuje proces autentizace na klientských stanicích, konkrétně použití PAM a NSS a možné rozšíření celého systému zavedením cache díky démonu SSSD. Druhá část popisuje návrh a implementaci NIS provideru pro SSSD.
APA, Harvard, Vancouver, ISO, and other styles
10

Dušek, Jakub. "Penetrační testování ANC." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444606.

Full text
Abstract:
This diploma thesis deals with the evaluation of a security solution that was recently deployed by a British company renting office space. This validation system is based on a database of MAC addresses, a database of clients and active filtering of connected devices. The first part explains the concepts of computer network, VLAN and basic concepts needed to understand the function of dynamic assignment of VLAN and IP addresses. The second part is devoted to measurements based on hypotheses, according to which measures are proposed in the last part to solve these security problems.
APA, Harvard, Vancouver, ISO, and other styles
11

Galetka, Josef. "Analýza síťových útoků pomocí honeypotů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237123.

Full text
Abstract:
This text deals with computer network security using honeypot technology, as a tool of intentional trap for attackers. It closely describes basic thoughts, together with advantages and disadvantages of this concept. The main aim is a low interaction honeypot Honeyd, its functionality and possible extensional features. As a practical part of the text there is a description of principles of implementation Honeyd service scripts, which are represented as a simulation of behavior of computer worm Conficker. Further it describes creation of automated script used for analysis and processing of gathered data, captured during actual deployment of Honeyd in Internet network.
APA, Harvard, Vancouver, ISO, and other styles
12

Daněk, Jakub. "Generátor záznamů o síťových útocích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236149.

Full text
Abstract:
The thesis describes a design and implementation of Nemea system module purposed on generation of records about simulated network attacks. This thesis also contains brief description of Nemea system and several network attacks. Finally, part of this work is description of simulated attacks and methods of simulations.
APA, Harvard, Vancouver, ISO, and other styles
13

Parýzek, Tomáš. "Využití informačních systémů ke sledování provozních parametrů malého dopravního letadla." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2017. http://www.nusl.cz/ntk/nusl-318697.

Full text
Abstract:
This diploma thesis covers with the utilization of information systems for monitoring of small transport aircraft operational parameters focusing on mathematical and economical methods. The thesis contains overview of methods usable in various types of aircraft operation. It also deals with creation of Cessna 208B aircraft`s schedule of work. Network graphs are used for analysis purposes. The diploma thesis also includes methodology of information obtainment and requirements determination of information systems for monitoring of small transport aircraft operational parameters.
APA, Harvard, Vancouver, ISO, and other styles
14

Hensl, Jaroslav. "Návrh implementace a síťové bezpečnosti protokolu IPv6 v organizaci." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399749.

Full text
Abstract:
This Master's thesis is focused on the IPv6 protocol implementation in a business environment. The thesis theoretically describes parts of the protocol which are then used in a real environment with respect to maximal compatibility and security. The thesis deals with hardware components, router configuration on FreeBSD OS, and switch configuration with RouterOS. The thesis also proposes how to monitor the network.
APA, Harvard, Vancouver, ISO, and other styles
15

Bartoš, Václav. "Reputace zdrojů škodlivého provozu." Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-412603.

Full text
Abstract:
An important part of maintaining network security is collecting and processing information about cyber threats, both from network operator's own detection tools and from third parties. A commonly used type of such information are lists of network entities (IP addresses, domains, URLs, etc.) which were identified as malicious. However, in many cases, the simple binary distinction between malicious and non-malicious entities is not sufficient. It is beneficial to keep other supplementary information for each entity, which describes its malicious activities, and also a summarizing score, which evaluates its reputation numerically. Such a score allows for quick comprehension of the level of threat the entity poses and allows to compare and sort entities. The goal of this work is to design a method for such summarization. The resulting score, called Future Maliciousness Probability (FMP score), is a value between 0 and 1, assigned to each suspicious network entity, expressing the probability that the entity will do some kind of malicious activity in a near future. Therefore, the scoring is based of prediction of future attacks. Advanced machine learning methods are used to perform the prediction. Their input is formed by previously received alerts about security events and other relevant data related to the entity. The method of computing the score is first described in a general way, usable for any kind of entity and input data. Then a more concrete version is presented for scoring IPv4 address by utilizing alerts from an alert sharing system and supplementary data from a reputation database. This variant is then evaluated on a real world dataset. In order to get enough amount and quality of data for this dataset, a part of the work is also dedicated to the area of security analysis of network data. A framework for analysis of flow data, NEMEA, and several new detection methods are designed and implemented. An open reputation database, NERD, is also implemented and described in this work. Data from these systems are then used to evaluate precision of the predictor as well as to evaluate selected use cases of the scoring method.
APA, Harvard, Vancouver, ISO, and other styles
16

Flaxa, Michal. "Návrh monitoringu síťové infrastruktury pro poradenskou společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417662.

Full text
Abstract:
This master's thesis is focuses on problematic of monitoring data in consulting company TG Community Holding a.s. The design will consist of a create monitoring network for a traffic tracking primarily data volume size tracking. It would be a monitoring of atypical events on the network. This master's thesis will be used to implement the proposed solution in the holding.
APA, Harvard, Vancouver, ISO, and other styles
17

Kadletz, Lukáš. "Anotace NetFlow dat z pohledu bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255446.

Full text
Abstract:
This thesis describes design and implementation of application for offline NetFlow data annotation from perspective of network security. In this thesis is explained the NetFlow architecture in detail along with methods for security incidents detection in the captured data. The application design is based on analysis of manual annotation and supported by several UML diagrams. The Nemea system is used for detecting security events and Warden system as a source of information about reported security incidents on the network. The application uses technologies such as PHP 5, Nette framework, jQuery library and Bootstrap framework. The CESNET association provided NetFlow data for testing the application. The result of this thesis could be used for analysis and annotation of NetFlow data. Resulting data set could be used to verify proper functionality of detection tools.
APA, Harvard, Vancouver, ISO, and other styles
18

Myška, Michal. "Identifikace počítače pomocí vzorů v síťovém provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236131.

Full text
Abstract:
This diploma thesis deals with computer identification using network behavioral patterns. Security functions providing privacy are described together with user privacy threats. Then, several approaches to the computer identification based on network behaviour are described. The proposed tool is based on data mining method Multinomial Naive Bayes. Then, the implementation of proposed tool is described and the experiments recognizing success in the identification are performed.
APA, Harvard, Vancouver, ISO, and other styles
19

Krula, Jiří. "Monitorování síťových útoků pomocí systémů honeypot." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-259320.

Full text
Abstract:
This thesis focuses on the topic of honeypots technology and their use for network attacks monitoring. It theoretically analyzes the honeypots and their variants honeynet and honeytoken. The practical part describes how to deploy two open source solutions of honeypot, Kippo and Dionaea. Kippo honeypot can be classified, despite its limitations, as a high interactive honeypot. This solution emulates the SSH service and it is primarily intended for the detection and capture of brute force attacks on the service. Dionaea is a honeypot designed primarily for capturing malware. It aims to capture malware in the trap using the vulnerabilities of offered and exposed network services with the aim to obtain a copy of the malware for subsequent analysis. Data obtained from the real deployment of the proposed solutions are presented and measures in relation to the SIEM instruments are proposed as well as improved security of the protected network.
APA, Harvard, Vancouver, ISO, and other styles
20

Hlavatý, Ivo. "Ochrana datové sítě s využitím NetFlow dat." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237051.

Full text
Abstract:
This document focuses on Cisco Netflow technology and its possible usage in monitoring networks and detecting network anomalies. Based on the analysis of attacks at the network and transport layer is designed an application for selected security threats which detects its presence. The implementation section provides a system for predicting network traffic and related detecting deviations from the baseline on the basis of statistical data. Use of NetFlow technolgy is demonstrated on examples where the results of other current security and monitoring techniques have failed or did not provide sufficiently good results.
APA, Harvard, Vancouver, ISO, and other styles
21

Buček, Hynek. "Generátor síťových útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236362.

Full text
Abstract:
This thesis is focused on the study of the best-known network attacks, especially on those that can be theoretically detected without knowledge of the contents of transmitted messages. The goal is to use the basis of acquired knowledge to create a tool that will simulate the behavior of the communication in different network attacks. Simulation outputs will be used for testing the quality of security tools designed to defend against network attacks. The simulator will be used only for offline testing, it will not be possible to carry out real attacks. Purpose of this work is to improve the security against network attacks nowadays.
APA, Harvard, Vancouver, ISO, and other styles
22

Piecek, Adam. "Modul pro sledování politiky sítě v datech o tocích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403192.

Full text
Abstract:
The aim of this master's thesis is to design a language through which it would be possible to monitor a stream of network flows in order to detect network policy violations in the local network. An analysis of the languages used in the data stream management systems and an analysis of tasks submitted by the potential administrator were both carried out. The analysis specified resulted in the language design which represents pipelining consisting of filtering and aggregation. These operations can be clearly defined and managed within security rules. The result of this thesis also results in the Policer modul being integrated in the NEMEA system, which is able to apply the main commands of the proposed language. Finally, the module meets the requirements of the specified tasks and may be used for further development in the area of monitoring network policies.
APA, Harvard, Vancouver, ISO, and other styles
23

Štangler, Jan. "Architektura a správa zabezpečených sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413065.

Full text
Abstract:
This work is focused on the security of small to medium-sized networks with central administration, especially on the creation of a methodology for secure network design.The design of a secure network for a start-up IT company, using open-source software, is described. Deployment of the designed secure network, with central management, is performed and the connectivity of network elements are tested. The model simulates network traffic situations and network attacks using penetration testing techniques. In terms of the severity of the impact on network security, intercepted attacks are evaluated and immediately reported to responsible persons. Finally, the results of the intercepted attacks are processed and further actions are recommended.
APA, Harvard, Vancouver, ISO, and other styles
24

Dudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.

Full text
Abstract:
This diploma thesis deals with the design and implementation of a tool for network attack detection from a captured network communication. It utilises the tshark packet analyser, the meaning of which is to convert the input file with the captured communications to the PDML format. The objective of this conversion being, increasing the flexibility of input data processing. When designing the tool, emphasis has been placed on the ability to expand it to detect new network attacks and on integrating these additions with ease. For this reason, the thesis also includes the design of a complex declarative descriptions for network attacks in the YAML serialization format. This allows us to specify the key properties of the network attacks and the conditions for their detection. The resulting tool acts as an interpreter of proposed declarative descriptions allowing it to be expanded with new types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
25

Janza, Čeněk. "Bezpečnostní audit síťové infrastruktury podniku." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-431487.

Full text
Abstract:
Bc. Čeněk Janza, Security audit of network infrastructure for company. Brno: Men-del University, 2016. This thesis deals with security audit and its methods for finding gaps in safety and subsequently draft measures to eliminate or minimalize this gaps. This work also describes the standards and legislation to information security. There is car-ried out a safety audit of the business and the analysis results together with the subsequent design of security measures. Further it describes the important issues and points during audit process.
APA, Harvard, Vancouver, ISO, and other styles
26

Kučmáš, Kryštof. "Akademický výzkum jaderné bezpečnosti: síťová analýza." Master's thesis, 2021. http://www.nusl.cz/ntk/nusl-437998.

Full text
Abstract:
CHARLES UNIVERSITY FACULTY OF SOCIAL SCIENCES Institute of Political Studies Department of security studies Nuclear Security Studies Scholarship: A Social Network Analysis Master's thesis Author: Kryštof Kučmáš Study programme: Security Studies Supervisor: PhDr. Michal Smetana, Ph.D. Year of the defence: 2020 Declaration 1. I hereby declare that I have compiled this thesis using the listed literature and resources only. 2. I hereby declare that my thesis has not been used to gain any other academic title. 3. I fully agree to my work being used for study and scientific purposes. In Prague on 5. 1. Kryštof Kučmáš References KUČMÁŠ, Kryštof. Nuclear Security Studies Scholarship: A Social Network Analysis. Praha, 2020. Master's thesis (Mgr.) Charles University, Faculty of Social Sciences, Institute of Political Science. Department of Security Studies. Supervisor PhDr. Michal Smetana, Ph.D. Length of the thesis: 46382 char Abstract The nuclear security scholarship is as influential as varied. The thesis Nuclear Security Studies Scholarship: A Social Network Analysis tries to provide a different angle of literature analysis. Author compiled a high amount of citational data in the field of nuclear security studies and then analyzed it with the tools provided by Social Network Analysis and Citational Analysis....
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography