All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

The eventuality attacks onto LAN communication unit for remote collection of data in energetics

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F08%3APU77642" target="_blank" >RIV/00216305:26220/08:PU77642 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    The eventuality attacks onto LAN communication unit for remote collection of data in energetics

  • Original language description

    The remote data acquisition is modern trend for metering of energy, gas, water, heating steam etc. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the meters. The data transmission over the LAN and Internet can be subject of various attacks. The understanding of attack methods is the most important for secure transfer of data and for alone unit and its settings. The protection against the hackers is not complicated, but requires a lot of attention. Component composition for attacks simulation is described in this paper. The one part is focused on scanning for hosts and ports. The other part of this article is focused on the denial of service attacks and man in the middle attacks.

  • Czech name

    Útoky ze sítě LAN na komunikační jednotku pro dálkový sběr dat v eneregetice

  • Czech description

    The remote data acquisition is modern trend for metering of energy, gas, water, heating steam etc. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the meters. The data transmission over the LAN and Internet can be subject of various attacks. The understanding of attack methods is the most important for secure transfer of data and for alone unit and its settings. The protection against the hackers is not complicated, but requires a lot of attention. Component composition for attacks simulation is described in this paper. The one part is focused on scanning for hosts and ports. The other part of this article is focused on the denial of service attacks and man in the middle attacks.

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    JA - Electronics and optoelectronics

  • OECD FORD branch

Result continuities

  • Project

    Result was created during the realization of more than one project. More information in the Projects tab.

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>Z - Vyzkumny zamer (s odkazem do CEZ)

Others

  • Publication year

    2008

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the International Conference on Teleinformatics and Elecromagnetic Field

  • ISBN

    978-80-214-3718-0

  • ISSN

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

  • Publisher name

    Neuveden

  • Place of publication

    Paris

  • Event location

    Paříž

  • Event date

    Sep 8, 2008

  • Type of event by nationality

    EUR - Evropská akce

  • UT code for WoS article