The eventuality attacks onto LAN communication unit for remote collection of data in energetics
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F08%3APU77642" target="_blank" >RIV/00216305:26220/08:PU77642 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
The eventuality attacks onto LAN communication unit for remote collection of data in energetics
Original language description
The remote data acquisition is modern trend for metering of energy, gas, water, heating steam etc. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the meters. The data transmission over the LAN and Internet can be subject of various attacks. The understanding of attack methods is the most important for secure transfer of data and for alone unit and its settings. The protection against the hackers is not complicated, but requires a lot of attention. Component composition for attacks simulation is described in this paper. The one part is focused on scanning for hosts and ports. The other part of this article is focused on the denial of service attacks and man in the middle attacks.
Czech name
Útoky ze sítě LAN na komunikační jednotku pro dálkový sběr dat v eneregetice
Czech description
The remote data acquisition is modern trend for metering of energy, gas, water, heating steam etc. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the meters. The data transmission over the LAN and Internet can be subject of various attacks. The understanding of attack methods is the most important for secure transfer of data and for alone unit and its settings. The protection against the hackers is not complicated, but requires a lot of attention. Component composition for attacks simulation is described in this paper. The one part is focused on scanning for hosts and ports. The other part of this article is focused on the denial of service attacks and man in the middle attacks.
Classification
Type
D - Article in proceedings
CEP classification
JA - Electronics and optoelectronics
OECD FORD branch
—
Result continuities
Project
Result was created during the realization of more than one project. More information in the Projects tab.
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>Z - Vyzkumny zamer (s odkazem do CEZ)
Others
Publication year
2008
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of the International Conference on Teleinformatics and Elecromagnetic Field
ISBN
978-80-214-3718-0
ISSN
—
e-ISSN
—
Number of pages
6
Pages from-to
—
Publisher name
Neuveden
Place of publication
Paris
Event location
Paříž
Event date
Sep 8, 2008
Type of event by nationality
EUR - Evropská akce
UT code for WoS article
—