Detection of an Unauthorized Wired Connection to a Local Area Network by Solving Telegraph Equations System

Bibliographic Details
Parent link:Control and Communications (SIBCON): Proceedings of the XII International Siberian Conference, Moscow, May 12-14, 2016. 5 p..— , 2016
Corporate Author: Национальный исследовательский Томский политехнический университет (ТПУ) Институт кибернетики (ИК) Кафедра вычислительной техники (ВТ)
Other Authors: Bakhtin A. O., Sherstnev V. S. Vladislav Stanislavovich, Pichugova I. L. Inna Leonidovna, Dudorov V. V.
Summary:Title screen
Most of the big and small companies, publiccompanies as well as private ones prefer to organize theircomputer networks with the help of Ethernet technology. Toorganize such wired lines between switching and routing devicesa twisted pair of copper conductors is used in most cases. Thispaper is aimed to show that the fact of unauthorized connectionto such lines by a third party can remain undetected for a longperiod of time. Special attention is given to the technique that canhelp to establish the fact of line eavesdropping on a physical level
Published: 2016
Subjects:
Online Access:http://dx.doi.org/10.1109/SIBCON.2016.7491804
Format: Electronic Book Chapter
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=648799