Bachelor theses
The implementation and vulenrability analyse of WPA3
Author
Vítek Špelina
Year
2023
Type
Bachelor thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
Ing. Alexandru Moucha, Ph.D.
Department
Summary
The main purpose of this study is to test the implementation of WPA3, the new security standard
for wireless networks on MikroTik devices. It furthermore compares the effectivity of WPA3 with
WPA2 standard which is more used nowadays.
The thesis outlines the evolution of wireless security standards from WEP to WPA3. It
contains a detailed description of the principles used by WPA3. The already known Denial of
Service (DoS) attacks - Doppelganger, Muted Peer, PMK Gobbler and Memory Omnivore are
discussed and examined thoroughly in this study, explaining their principles and impacts in great
details. Additionaly it compares these attacks with the ones used on the current implementations
of WPA3 for MikroTik devices. A new attack which uses the vulnerability in the fundamentals
of the WPA3 standard is also described in the study.
Both WPA2 and WPA3 standards are comparable, in terms of efficiency. However, it is shown
that the tested implementations are not secure enough to be used in real-life environment. Furthemore the thesis proves that the SAE handshake as it is now, is not suitable for the use in shared
networks.
As a part of the study, each of attack scripts was updated and refactored to current standards.
Along that a complex program allowing automatized testing of each attack on different versions
of WPA3 implementations was created.
Monitoring of unwanted monitoring of users by mobile phones on the Android platform
Author
Patrik Suchopa
Year
2022
Type
Bachelor thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
Ing. Josef Kokeš, Ph.D.
Department
Summary
This bachelor thesis deals with the design and implementation of detection methods related to unwanted monitoring of users by mobile phones on the Android platform. Monitoring network traffic and usage of system resources gave me data subjected to analysis. I implemented the application designated for data mining beyond requirements. I could not detect eavesdropping of users nor activity allied with improving users' localization by Wi-Fi scanning. There was an unexpected behavior related to the Google Maps application. The communication with its domains occurred even though the application was terminated.
Master theses
The virtual machine consolidation system
Author
Michal Polák
Year
2023
Type
Master thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
prof. Ing. Pavel Tvrdík, CSc.
Department
Summary
This thesis is dedicated to the problem of the virtual machines consolidation with a focus on optimizing the load of the network infrastructure. I define this problem and present several possible solutions. Finally those methods are experimentally tested on the randomly generated data for the purpose of evaluation.