000 | 03688nla2a2200601 4500 | ||
---|---|---|---|
001 | 654569 | ||
005 | 20231030041306.0 | ||
035 | _a(RuTPU)RU\TPU\network\20205 | ||
035 | _aRU\TPU\network\20196 | ||
090 | _a654569 | ||
100 | _a20170504d2016 k y0engy50 ba | ||
101 | 0 | _aeng | |
102 | _aRU | ||
105 | _aa z 101zy | ||
135 | _adrcn ---uucaa | ||
181 | 0 | _ai | |
182 | 0 | _ab | |
200 | 1 |
_aThe analysis and modeling of efficiency of the developed telecommunication networks on the basis of IP PBX asterisk now _fT. G. Serikov, A. Mekhtiyev (Mekhtiev), V. V. Yugay [et al.] |
|
203 |
_aText _celectronic |
||
225 | 1 | _aInformation and communication technologies | |
300 | _aTitle screen | ||
320 | _a[References: p. 514 (8 tit.)] | ||
330 | _aCommunication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk NOW uses as the server. As softfon and client base laptops, computers, and gadgets on which passes test are considered. Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop on which the software package of CommView for WiFi is established. By the result of carried out test the analysis of network's vulnerability was made. Recommendations about a measure of protection from unauthorized access are made. The optimum option of network protection is offered. | ||
333 | _aРежим доступа: по договору с организацией-держателем ресурса | ||
461 | 0 |
_0(RuTPU)RU\TPU\network\20157 _t11th International Forum on Strategic Technology (IFOST 2016) _o1-3 June 2016, Novosibirsk, Russiain _oin 2 pt. _o[proceedings] _fNovosibirsk State Technical University _d2016 |
|
463 | 0 |
_0(RuTPU)RU\TPU\network\20158 _tPt. 1 _v[P. 510-514] _d2016 |
|
610 | 1 | _aэлектронный ресурс | |
610 | 1 | _aтруды учёных ТПУ | |
610 | 1 | _aWiFi | |
610 | 1 | _awireless network | |
610 | 1 | _aattacks | |
610 | 1 | _aaddress | |
610 | 1 | _anetwork devices | |
610 | 1 | _aserver | |
610 | 1 | _aAsterisk NOW | |
610 | 1 | _aбеспроводные сети | |
610 | 1 | _aатаки | |
610 | 1 | _aадреса | |
610 | 1 | _aсерверы | |
610 | 1 | _aтелекоммуникационные сети | |
701 | 1 |
_aSerikov _bT. G. |
|
701 | 1 |
_aMekhtiyev (Mekhtiev) _bA. _cSpecialist in the field of electronics _cSenior researcher of Tomsk Polytechnic University, Candidate of technical sciences _f1972- _gAli _2stltpush _3(RuTPU)RU\TPU\pers\39786 |
|
701 | 1 |
_aYugay _bV. V. |
|
701 | 1 |
_aMuratova _bA. K. |
|
701 | 1 |
_aYakubova _bM. Z. |
|
701 | 1 |
_aRazinkin _bV. P. |
|
701 | 1 |
_aOkhorzina _bA. V. |
|
701 | 1 |
_aYurchenko _bA. V. _cphysicist _cProfessor of Tomsk Polytechnic University, candidate of technical sciences _f1974- _gAleksey Vasilievich _2stltpush _3(RuTPU)RU\TPU\pers\35053 |
|
701 | 1 |
_aAlkina _bA. D. |
|
712 | 0 | 2 |
_aНациональный исследовательский Томский политехнический университет (ТПУ) _bИнститут неразрушающего контроля (ИНК) _bКафедра промышленной и медицинской электроники (ПМЭ) _h64 _2stltpush _3(RuTPU)RU\TPU\col\18719 |
801 | 2 |
_aRU _b63413507 _c20200716 _gRCR |
|
856 | 4 | _uhttp://dx.doi.org/10.1109/IFOST.2016.7884168 | |
942 | _cCF |