Bachelor theses
Monitoring of unwanted monitoring of users by mobile phones on the Android platform
Author
Patrik Suchopa
Year
2022
Type
Bachelor thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
Ing. Josef Kokeš, Ph.D.
Department
Summary
This bachelor thesis deals with the design and implementation of detection methods related to unwanted monitoring of users by mobile phones on the Android platform. Monitoring network traffic and usage of system resources gave me data subjected to analysis. I implemented the application designated for data mining beyond requirements. I could not detect eavesdropping of users nor activity allied with improving users' localization by Wi-Fi scanning. There was an unexpected behavior related to the Google Maps application. The communication with its domains occurred even though the application was terminated.
The implementation and vulenrability analyse of WPA3
Author
Vítek Špelina
Year
2023
Type
Bachelor thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
Ing. Alexandru Moucha, Ph.D.
Department
Summary
The main purpose of this study is to test the implementation of WPA3, the new security standard
for wireless networks on MikroTik devices. It furthermore compares the effectivity of WPA3 with
WPA2 standard which is more used nowadays.
The thesis outlines the evolution of wireless security standards from WEP to WPA3. It
contains a detailed description of the principles used by WPA3. The already known Denial of
Service (DoS) attacks - Doppelganger, Muted Peer, PMK Gobbler and Memory Omnivore are
discussed and examined thoroughly in this study, explaining their principles and impacts in great
details. Additionaly it compares these attacks with the ones used on the current implementations
of WPA3 for MikroTik devices. A new attack which uses the vulnerability in the fundamentals
of the WPA3 standard is also described in the study.
Both WPA2 and WPA3 standards are comparable, in terms of efficiency. However, it is shown
that the tested implementations are not secure enough to be used in real-life environment. Furthemore the thesis proves that the SAE handshake as it is now, is not suitable for the use in shared
networks.
As a part of the study, each of attack scripts was updated and refactored to current standards.
Along that a complex program allowing automatized testing of each attack on different versions
of WPA3 implementations was created.
Modern slow DDoS attacks and protection against them
Author
Lukáš Brůna
Year
2024
Type
Bachelor thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
Ing. Jiří Smítka
Department
Summary
This thesis is focused on the field of Slow Distributed Denial of Service attacks and their mit-
igation. First, I explain how the most common types of SDDoS attacks function and what is
their impact on current systems. Second section of the thesis is then focused on different possible
defense solutions, how they could be implemented and if they are effective. In the final sections
I choose a solution approach which I design, implement and test successfully.
Open-source system for cloning of RFID/NFC cards and tags
Author
Michal Beneš
Year
2024
Type
Bachelor thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
Ing. Jiří Buček, Ph.D.
Department
Summary
This work focuses on the security of RFID and NFC tags and cards in infrastructure. The aim of the work is to design and implement a portable and extensible open-source device that will be able to clone and emulate some selected types of RFID cards and tags using a selected commercially available microcomputer. The work also involves the development of software with a graphical environment that enables the necessary capabilities of the device. The theoretical part of the thesis explains the basic principles of RFID technology, its security and shortcomings. Furthermore, an analysis of existing solutions that are used for cloning and emulation of RFID technology and the selection of suitable hardware for the creation of the resulting device are discussed. The practical part of the thesis deals with the design and actual implementation of the device from both hardware and software aspects. Finally, the functionality of the device is verified by testing a set of different RFID cards and tags.
Master theses
The virtual machine consolidation system
Author
Michal Polák
Year
2023
Type
Master thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
prof. Ing. Pavel Tvrdík, CSc.
Department
Summary
This thesis is dedicated to the problem of the virtual machines consolidation with a focus on optimizing the load of the network infrastructure. I define this problem and present several possible solutions. Finally those methods are experimentally tested on the randomly generated data for the purpose of evaluation.