000 03688nla2a2200601 4500
001 654569
005 20231030041306.0
035 _a(RuTPU)RU\TPU\network\20205
035 _aRU\TPU\network\20196
090 _a654569
100 _a20170504d2016 k y0engy50 ba
101 0 _aeng
102 _aRU
105 _aa z 101zy
135 _adrcn ---uucaa
181 0 _ai
182 0 _ab
200 1 _aThe analysis and modeling of efficiency of the developed telecommunication networks on the basis of IP PBX asterisk now
_fT. G. Serikov, A. Mekhtiyev (Mekhtiev), V. V. Yugay [et al.]
203 _aText
_celectronic
225 1 _aInformation and communication technologies
300 _aTitle screen
320 _a[References: p. 514 (8 tit.)]
330 _aCommunication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk NOW uses as the server. As softfon and client base laptops, computers, and gadgets on which passes test are considered. Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop on which the software package of CommView for WiFi is established. By the result of carried out test the analysis of network's vulnerability was made. Recommendations about a measure of protection from unauthorized access are made. The optimum option of network protection is offered.
333 _aРежим доступа: по договору с организацией-держателем ресурса
461 0 _0(RuTPU)RU\TPU\network\20157
_t11th International Forum on Strategic Technology (IFOST 2016)
_o1-3 June 2016, Novosibirsk, Russiain
_oin 2 pt.
_o[proceedings]
_fNovosibirsk State Technical University
_d2016
463 0 _0(RuTPU)RU\TPU\network\20158
_tPt. 1
_v[P. 510-514]
_d2016
610 1 _aэлектронный ресурс
610 1 _aтруды учёных ТПУ
610 1 _aWiFi
610 1 _awireless network
610 1 _aattacks
610 1 _aaddress
610 1 _anetwork devices
610 1 _aserver
610 1 _aAsterisk NOW
610 1 _aбеспроводные сети
610 1 _aатаки
610 1 _aадреса
610 1 _aсерверы
610 1 _aтелекоммуникационные сети
701 1 _aSerikov
_bT. G.
701 1 _aMekhtiyev (Mekhtiev)
_bA.
_cSpecialist in the field of electronics
_cSenior researcher of Tomsk Polytechnic University, Candidate of technical sciences
_f1972-
_gAli
_2stltpush
_3(RuTPU)RU\TPU\pers\39786
701 1 _aYugay
_bV. V.
701 1 _aMuratova
_bA. K.
701 1 _aYakubova
_bM. Z.
701 1 _aRazinkin
_bV. P.
701 1 _aOkhorzina
_bA. V.
701 1 _aYurchenko
_bA. V.
_cphysicist
_cProfessor of Tomsk Polytechnic University, candidate of technical sciences
_f1974-
_gAleksey Vasilievich
_2stltpush
_3(RuTPU)RU\TPU\pers\35053
701 1 _aAlkina
_bA. D.
712 0 2 _aНациональный исследовательский Томский политехнический университет (ТПУ)
_bИнститут неразрушающего контроля (ИНК)
_bКафедра промышленной и медицинской электроники (ПМЭ)
_h64
_2stltpush
_3(RuTPU)RU\TPU\col\18719
801 2 _aRU
_b63413507
_c20200716
_gRCR
856 4 _uhttp://dx.doi.org/10.1109/IFOST.2016.7884168
942 _cCF