Detection of an unauthorized wired connection to a local area network by solving telegraph equations system

Artyom O. Bakhtin, Vladislav Stanislavovich Sherstnev, Inna L. Pichugova, Vadim V. Dudorov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Most of the big and small companies, public companies as well as private ones prefer to organize their computer networks with the help of Ethernet technology. To organize such wired lines between switching and routing devices a twisted pair of copper conductors is used in most cases. This paper is aimed to show that the fact of unauthorized connection to such lines by a third party can remain undetected for a long period of time. Special attention is given to the technique that can help to establish the fact of line eavesdropping on a physical level.

Original languageEnglish
Title of host publication2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467383837
DOIs
Publication statusPublished - 14 Jun 2016
Event2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Moscow, Russian Federation
Duration: 12 May 201614 May 2016

Conference

Conference2016 International Siberian Conference on Control and Communications, SIBCON 2016
CountryRussian Federation
CityMoscow
Period12.5.1614.5.16

Fingerprint

Telegraph Equation
Telegraph
Local area networks
Line
Ethernet
Computer networks
Industry
Computer Networks
Conductor
Copper
Period of time
Routing

Keywords

  • COMSOL
  • electricity
  • ethernet
  • MATLAB
  • network
  • security
  • telegraph equations

ASJC Scopus subject areas

  • Signal Processing
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modelling and Simulation
  • Computer Networks and Communications

Cite this

Bakhtin, A. O., Sherstnev, V. S., Pichugova, I. L., & Dudorov, V. V. (2016). Detection of an unauthorized wired connection to a local area network by solving telegraph equations system. In 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings [7491804] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SIBCON.2016.7491804

Detection of an unauthorized wired connection to a local area network by solving telegraph equations system. / Bakhtin, Artyom O.; Sherstnev, Vladislav Stanislavovich; Pichugova, Inna L.; Dudorov, Vadim V.

2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2016. 7491804.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bakhtin, AO, Sherstnev, VS, Pichugova, IL & Dudorov, VV 2016, Detection of an unauthorized wired connection to a local area network by solving telegraph equations system. in 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings., 7491804, Institute of Electrical and Electronics Engineers Inc., 2016 International Siberian Conference on Control and Communications, SIBCON 2016, Moscow, Russian Federation, 12.5.16. https://doi.org/10.1109/SIBCON.2016.7491804
Bakhtin AO, Sherstnev VS, Pichugova IL, Dudorov VV. Detection of an unauthorized wired connection to a local area network by solving telegraph equations system. In 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2016. 7491804 https://doi.org/10.1109/SIBCON.2016.7491804
Bakhtin, Artyom O. ; Sherstnev, Vladislav Stanislavovich ; Pichugova, Inna L. ; Dudorov, Vadim V. / Detection of an unauthorized wired connection to a local area network by solving telegraph equations system. 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2016.
@inproceedings{911691cfd3b54855a1322c593e258904,
title = "Detection of an unauthorized wired connection to a local area network by solving telegraph equations system",
abstract = "Most of the big and small companies, public companies as well as private ones prefer to organize their computer networks with the help of Ethernet technology. To organize such wired lines between switching and routing devices a twisted pair of copper conductors is used in most cases. This paper is aimed to show that the fact of unauthorized connection to such lines by a third party can remain undetected for a long period of time. Special attention is given to the technique that can help to establish the fact of line eavesdropping on a physical level.",
keywords = "COMSOL, electricity, ethernet, MATLAB, network, security, telegraph equations",
author = "Bakhtin, {Artyom O.} and Sherstnev, {Vladislav Stanislavovich} and Pichugova, {Inna L.} and Dudorov, {Vadim V.}",
year = "2016",
month = "6",
day = "14",
doi = "10.1109/SIBCON.2016.7491804",
language = "English",
booktitle = "2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Detection of an unauthorized wired connection to a local area network by solving telegraph equations system

AU - Bakhtin, Artyom O.

AU - Sherstnev, Vladislav Stanislavovich

AU - Pichugova, Inna L.

AU - Dudorov, Vadim V.

PY - 2016/6/14

Y1 - 2016/6/14

N2 - Most of the big and small companies, public companies as well as private ones prefer to organize their computer networks with the help of Ethernet technology. To organize such wired lines between switching and routing devices a twisted pair of copper conductors is used in most cases. This paper is aimed to show that the fact of unauthorized connection to such lines by a third party can remain undetected for a long period of time. Special attention is given to the technique that can help to establish the fact of line eavesdropping on a physical level.

AB - Most of the big and small companies, public companies as well as private ones prefer to organize their computer networks with the help of Ethernet technology. To organize such wired lines between switching and routing devices a twisted pair of copper conductors is used in most cases. This paper is aimed to show that the fact of unauthorized connection to such lines by a third party can remain undetected for a long period of time. Special attention is given to the technique that can help to establish the fact of line eavesdropping on a physical level.

KW - COMSOL

KW - electricity

KW - ethernet

KW - MATLAB

KW - network

KW - security

KW - telegraph equations

UR - http://www.scopus.com/inward/record.url?scp=84978140889&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84978140889&partnerID=8YFLogxK

U2 - 10.1109/SIBCON.2016.7491804

DO - 10.1109/SIBCON.2016.7491804

M3 - Conference contribution

AN - SCOPUS:84978140889

BT - 2016 International Siberian Conference on Control and Communications, SIBCON 2016 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -