Detection of an Unauthorized Wired Connection to a Local Area Network by Solving Telegraph Equations System

Détails bibliographiques
Parent link:Control and Communications (SIBCON): Proceedings of the XII International Siberian Conference, Moscow, May 12-14, 2016. 5 p..— , 2016
Collectivité auteur: Национальный исследовательский Томский политехнический университет (ТПУ) Институт кибернетики (ИК) Кафедра вычислительной техники (ВТ)
Autres auteurs: Bakhtin A. O., Sherstnev V. S. Vladislav Stanislavovich, Pichugova I. L. Inna Leonidovna, Dudorov V. V.
Résumé:Title screen
Most of the big and small companies, publiccompanies as well as private ones prefer to organize theircomputer networks with the help of Ethernet technology. Toorganize such wired lines between switching and routing devicesa twisted pair of copper conductors is used in most cases. Thispaper is aimed to show that the fact of unauthorized connectionto such lines by a third party can remain undetected for a longperiod of time. Special attention is given to the technique that canhelp to establish the fact of line eavesdropping on a physical level
Publié: 2016
Sujets:
Accès en ligne:http://dx.doi.org/10.1109/SIBCON.2016.7491804
Format: Électronique Chapitre de livre
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=648799

Documents similaires