The analysis and modeling of efficiency of the developed telecommunication networks on the basis of IP PBX asterisk now

Dades bibliogràfiques
Parent link:11th International Forum on Strategic Technology (IFOST 2016): 1-3 June 2016, Novosibirsk, Russiain/ Novosibirsk State Technical University.— , 2016
Pt. 1.— 2016.— [P. 510-514]
Autor corporatiu: Национальный исследовательский Томский политехнический университет (ТПУ) Институт неразрушающего контроля (ИНК) Кафедра промышленной и медицинской электроники (ПМЭ)
Altres autors: Serikov T. G., Mekhtiyev (Mekhtiev) A. Ali, Yugay V. V., Muratova A. K., Yakubova M. Z., Razinkin V. P., Okhorzina A. V., Yurchenko A. V. Aleksey Vasilievich, Alkina A. D.
Sumari:Title screen
Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk NOW uses as the server. As softfon and client base laptops, computers, and gadgets on which passes test are considered. Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop on which the software package of CommView for WiFi is established. By the result of carried out test the analysis of network's vulnerability was made. Recommendations about a measure of protection from unauthorized access are made. The optimum option of network protection is offered.
Режим доступа: по договору с организацией-держателем ресурса
Idioma:anglès
Publicat: 2016
Col·lecció:Information and communication technologies
Matèries:
Accés en línia:http://dx.doi.org/10.1109/IFOST.2016.7884168
Format: Electrònic Capítol de llibre
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=654569

MARC

LEADER 00000nla2a2200000 4500
001 654569
005 20240222102153.0
035 |a (RuTPU)RU\TPU\network\20205 
035 |a RU\TPU\network\20196 
090 |a 654569 
100 |a 20170504d2016 k y0engy50 ba 
101 0 |a eng 
102 |a RU 
105 |a a z 101zy 
135 |a drcn ---uucaa 
181 0 |a i  
182 0 |a b 
200 1 |a The analysis and modeling of efficiency of the developed telecommunication networks on the basis of IP PBX asterisk now  |f T. G. Serikov, A. Mekhtiyev (Mekhtiev), V. V. Yugay [et al.] 
203 |a Text  |c electronic 
225 1 |a Information and communication technologies 
300 |a Title screen 
320 |a [References: p. 514 (8 tit.)] 
330 |a Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk NOW uses as the server. As softfon and client base laptops, computers, and gadgets on which passes test are considered. Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop on which the software package of CommView for WiFi is established. By the result of carried out test the analysis of network's vulnerability was made. Recommendations about a measure of protection from unauthorized access are made. The optimum option of network protection is offered. 
333 |a Режим доступа: по договору с организацией-держателем ресурса 
461 0 |0 (RuTPU)RU\TPU\network\20157  |t 11th International Forum on Strategic Technology (IFOST 2016)  |o 1-3 June 2016, Novosibirsk, Russiain  |o in 2 pt.  |o [proceedings]  |f Novosibirsk State Technical University  |d 2016 
463 0 |0 (RuTPU)RU\TPU\network\20158  |t Pt. 1  |v [P. 510-514]  |d 2016 
610 1 |a электронный ресурс 
610 1 |a труды учёных ТПУ 
610 1 |a WiFi 
610 1 |a wireless network 
610 1 |a attacks 
610 1 |a address 
610 1 |a network devices 
610 1 |a server 
610 1 |a Asterisk NOW 
610 1 |a беспроводные сети 
610 1 |a атаки 
610 1 |a адреса 
610 1 |a серверы 
610 1 |a телекоммуникационные сети 
701 1 |a Serikov  |b T. G. 
701 1 |a Mekhtiyev (Mekhtiev)  |b A.  |c Specialist in the field of electronics  |c Senior researcher of Tomsk Polytechnic University, Candidate of technical sciences  |f 1972-  |g Ali  |3 (RuTPU)RU\TPU\pers\39786 
701 1 |a Yugay  |b V. V. 
701 1 |a Muratova  |b A. K. 
701 1 |a Yakubova  |b M. Z. 
701 1 |a Razinkin  |b V. P. 
701 1 |a Okhorzina  |b A. V. 
701 1 |a Yurchenko  |b A. V.  |c physicist  |c Professor of Tomsk Polytechnic University, Doctor of Technical Sciences  |f 1974-  |g Aleksey Vasilievich  |y Tomsk  |3 (RuTPU)RU\TPU\pers\35053  |9 18328 
701 1 |a Alkina  |b A. D. 
712 0 2 |a Национальный исследовательский Томский политехнический университет (ТПУ)  |b Институт неразрушающего контроля (ИНК)  |b Кафедра промышленной и медицинской электроники (ПМЭ)  |3 (RuTPU)RU\TPU\col\18719 
801 2 |a RU  |b 63413507  |c 20200716  |g RCR 
856 4 |u http://dx.doi.org/10.1109/IFOST.2016.7884168 
942 |c CF