Detection of an Unauthorized Wired Connection to a Local Area Network by Solving Telegraph Equations System
| Parent link: | Control and Communications (SIBCON).— 2016.— 5 p. |
|---|---|
| Erakunde egilea: | |
| Beste egile batzuk: | , , , |
| Gaia: | Title screen Most of the big and small companies, publiccompanies as well as private ones prefer to organize theircomputer networks with the help of Ethernet technology. Toorganize such wired lines between switching and routing devicesa twisted pair of copper conductors is used in most cases. Thispaper is aimed to show that the fact of unauthorized connectionto such lines by a third party can remain undetected for a longperiod of time. Special attention is given to the technique that canhelp to establish the fact of line eavesdropping on a physical level |
| Hizkuntza: | ingelesa |
| Argitaratua: |
2016
|
| Gaiak: | |
| Sarrera elektronikoa: | http://dx.doi.org/10.1109/SIBCON.2016.7491804 |
| Formatua: | Baliabide elektronikoa Liburu kapitulua |
| KOHA link: | https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=648799 |
| Gaia: | Title screen Most of the big and small companies, publiccompanies as well as private ones prefer to organize theircomputer networks with the help of Ethernet technology. Toorganize such wired lines between switching and routing devicesa twisted pair of copper conductors is used in most cases. Thispaper is aimed to show that the fact of unauthorized connectionto such lines by a third party can remain undetected for a longperiod of time. Special attention is given to the technique that canhelp to establish the fact of line eavesdropping on a physical level |
|---|---|
| DOI: | 10.1109/SIBCON.2016.7491804 |