Detection of an unauthorized wired connection to a local area network by solving telegraph equations system

Artyom O. Bakhtin, Vladislav Stanislavovich Sherstnev, Inna L. Pichugova, Vadim V. Dudorov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Most of the big and small companies, public companies as well as private ones prefer to organize their computer networks with the help of Ethernet technology. To organize such wired lines between switching and routing devices a twisted pair of copper conductors is used in most cases. This paper is aimed to show that the fact of unauthorized connection to such lines by a third party can remain undetected for a long period of time. Special attention is given to the technique that can help to establish the fact of line eavesdropping on a physical level.

Original languageEnglish
Title of host publication2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467383837
DOIs
Publication statusPublished - 14 Jun 2016
Event2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Moscow, Russian Federation
Duration: 12 May 201614 May 2016

Conference

Conference2016 International Siberian Conference on Control and Communications, SIBCON 2016
CountryRussian Federation
CityMoscow
Period12.5.1614.5.16

Keywords

  • COMSOL
  • electricity
  • ethernet
  • MATLAB
  • network
  • security
  • telegraph equations

ASJC Scopus subject areas

  • Signal Processing
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modelling and Simulation
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Detection of an unauthorized wired connection to a local area network by solving telegraph equations system'. Together they form a unique fingerprint.

Cite this