Ing. Jan Fesl, Ph.D.

Theses

Bachelor theses

The implementation and vulenrability analyse of WPA3

Author
Vítek Špelina
Year
2023
Type
Bachelor thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
Ing. Alexandru Moucha, Ph.D.
Summary
The main purpose of this study is to test the implementation of WPA3, the new security standard for wireless networks on MikroTik devices. It furthermore compares the effectivity of WPA3 with WPA2 standard which is more used nowadays. The thesis outlines the evolution of wireless security standards from WEP to WPA3. It contains a detailed description of the principles used by WPA3. The already known Denial of Service (DoS) attacks - Doppelganger, Muted Peer, PMK Gobbler and Memory Omnivore are discussed and examined thoroughly in this study, explaining their principles and impacts in great details. Additionaly it compares these attacks with the ones used on the current implementations of WPA3 for MikroTik devices. A new attack which uses the vulnerability in the fundamentals of the WPA3 standard is also described in the study. Both WPA2 and WPA3 standards are comparable, in terms of efficiency. However, it is shown that the tested implementations are not secure enough to be used in real-life environment. Furthemore the thesis proves that the SAE handshake as it is now, is not suitable for the use in shared networks. As a part of the study, each of attack scripts was updated and refactored to current standards. Along that a complex program allowing automatized testing of each attack on different versions of WPA3 implementations was created.

Monitoring of unwanted monitoring of users by mobile phones on the Android platform

Author
Patrik Suchopa
Year
2022
Type
Bachelor thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
Ing. Josef Kokeš, Ph.D.
Summary
This bachelor thesis deals with the design and implementation of detection methods related to unwanted monitoring of users by mobile phones on the Android platform. Monitoring network traffic and usage of system resources gave me data subjected to analysis. I implemented the application designated for data mining beyond requirements. I could not detect eavesdropping of users nor activity allied with improving users' localization by Wi-Fi scanning. There was an unexpected behavior related to the Google Maps application. The communication with its domains occurred even though the application was terminated.

Master theses

The virtual machine consolidation system

Author
Michal Polák
Year
2023
Type
Master thesis
Supervisor
Ing. Jan Fesl, Ph.D.
Reviewers
prof. Ing. Pavel Tvrdík, CSc.
Summary
This thesis is dedicated to the problem of the virtual machines consolidation with a focus on optimizing the load of the network infrastructure. I define this problem and present several possible solutions. Finally those methods are experimentally tested on the randomly generated data for the purpose of evaluation.