Detection of an Unauthorized Wired Connection to a Local Area Network by Solving Telegraph Equations System

Xehetasun bibliografikoak
Parent link:Control and Communications (SIBCON).— 2016.— 5 p.
Erakunde egilea: Национальный исследовательский Томский политехнический университет (ТПУ) Институт кибернетики (ИК) Кафедра вычислительной техники (ВТ)
Beste egile batzuk: Bakhtin A. O., Sherstnev V. S. Vladislav Stanislavovich, Pichugova I. L. Inna Leonidovna, Dudorov V. V.
Gaia:Title screen
Most of the big and small companies, publiccompanies as well as private ones prefer to organize theircomputer networks with the help of Ethernet technology. Toorganize such wired lines between switching and routing devicesa twisted pair of copper conductors is used in most cases. Thispaper is aimed to show that the fact of unauthorized connectionto such lines by a third party can remain undetected for a longperiod of time. Special attention is given to the technique that canhelp to establish the fact of line eavesdropping on a physical level
Hizkuntza:ingelesa
Argitaratua: 2016
Gaiak:
Sarrera elektronikoa:http://dx.doi.org/10.1109/SIBCON.2016.7491804
Formatua: Baliabide elektronikoa Liburu kapitulua
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=648799
Deskribapena
Gaia:Title screen
Most of the big and small companies, publiccompanies as well as private ones prefer to organize theircomputer networks with the help of Ethernet technology. Toorganize such wired lines between switching and routing devicesa twisted pair of copper conductors is used in most cases. Thispaper is aimed to show that the fact of unauthorized connectionto such lines by a third party can remain undetected for a longperiod of time. Special attention is given to the technique that canhelp to establish the fact of line eavesdropping on a physical level
DOI:10.1109/SIBCON.2016.7491804