Analýza phishingových útokov a návrh proaktívneho riešenia s využitím metód umelej inteligencie
Show simple item record
dc.contributor.advisor |
Oulehla, Milan
|
|
dc.contributor.author |
Kubíček, Martin
|
|
dc.date.accessioned |
2023-12-20T13:25:28Z |
|
dc.date.available |
2023-12-20T13:25:28Z |
|
dc.date.issued |
2022-12-02 |
|
dc.identifier |
Elektronický archiv Knihovny UTB |
|
dc.identifier.uri |
http://hdl.handle.net/10563/54289
|
|
dc.description.abstract |
Táto diplomová práca sa zaoberá popisom phishingových útokov, ich rozdelením, analýzou, ukážkou a možnosťami detekcie. Cieľom práce bolo zistiť, ako phishingový útok vznikol, ako vyzerá, ako prebieha a ako môže byť detegovaný s využitím umelej inteligencie. |
|
dc.format |
177 s |
|
dc.language.iso |
cs |
|
dc.publisher |
Univerzita Tomáše Bati ve Zlíně |
|
dc.rights |
Bez omezení |
|
dc.subject |
phishing
|
cs |
dc.subject |
strojové učenie
|
cs |
dc.subject |
URL
|
cs |
dc.subject |
email
|
cs |
dc.subject |
útok
|
cs |
dc.subject |
detekcia
|
cs |
dc.subject |
analýza
|
cs |
dc.subject |
phishing kit
|
cs |
dc.subject |
súbot dát
|
cs |
dc.subject |
features
|
cs |
dc.subject |
ensemble
|
cs |
dc.subject |
model
|
cs |
dc.subject |
klasifikácia
|
cs |
dc.subject |
phishing
|
en |
dc.subject |
machine learning
|
en |
dc.subject |
URL
|
en |
dc.subject |
email
|
en |
dc.subject |
attack
|
en |
dc.subject |
detection
|
en |
dc.subject |
analysis
|
en |
dc.subject |
phishing kit
|
en |
dc.subject |
dataset
|
en |
dc.subject |
features
|
en |
dc.subject |
ensemble
|
en |
dc.subject |
model
|
en |
dc.subject |
classification
|
en |
dc.title |
Analýza phishingových útokov a návrh proaktívneho riešenia s využitím metód umelej inteligencie |
|
dc.title.alternative |
Analysis of Phishing Attacks and Proposal of a Proactive Solution Based on Artificial Intelligence Methods |
|
dc.type |
diplomová práce |
cs |
dc.contributor.referee |
Vyskočil, Ladislav |
|
dc.date.accepted |
2023-06-15 |
|
dc.description.abstract-translated |
This Master's thesis deals with description of phishing attacks, their classification, analysis, illustration and possibilities of detection. The objective was to clarify, how the phishing was created, how it looks, works and how it can be detected using methods of artificial intelligence. |
|
dc.description.department |
Ústav informatiky a umělé inteligence |
|
dc.thesis.degree-discipline |
Kybernetická bezpečnost |
cs |
dc.thesis.degree-grantor |
Univerzita Tomáše Bati ve Zlíně. Fakulta aplikované informatiky |
cs |
dc.thesis.degree-grantor |
Tomas Bata University in Zlín. Faculty of Applied Informatics |
en |
dc.thesis.degree-name |
Ing. |
|
dc.thesis.degree-program |
Informační technologie |
cs |
dc.thesis.degree-program |
Information Technologies |
en |
dc.identifier.stag |
65246
|
|
dc.date.submitted |
2023-05-25 |
|
Files in this item
This item appears in the following Collection(s)
Show simple item record
Search DSpace
Browse
-
All of DSpace
-
This Collection
My Account