Miller, 2006 - Google Patents
Optical illusionMiller, 2006
View PDF- Document ID
- 11273037613177445033
- Author
- Miller S
- Publication year
- Publication venue
- Information security
External Links
Snippet
There have been few public reports of fiber hacks: In 2000, three main trunk lines of Deutsche Telekom were breached at Frankfurt Airport in Germany. In 2003, an illegal eavesdropping device was discovered hooked into Verizon's optical network; it was …
- 206010021403 Illusion 0 title description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Petrenko et al. | Protection model of PCS of subway from attacks type «wanna cry»,«petya» and «bad rabbit» IoT | |
Plėta et al. | Cyber-attacks to critical energy infrastructure and management issues: Overview of selected cases | |
Venkatachary et al. | Cybersecurity and cyber terrorism-in energy sector–a review | |
KR101574198B1 (en) | Hacking monitoring system of optical cable | |
US8494313B2 (en) | Monitoring eDC polarization inverse filter coefficients to identify real-time physical intrusion into a core or metro optical network | |
Choo | Zombies and botnets. | |
EP3729773B1 (en) | One-way data transfer device with onboard system detection | |
KR101871406B1 (en) | Method for securiting control system using whitelist and system for the same | |
Sabev et al. | Cybersecurity analysis of wind farm SCADA systems | |
KR101553246B1 (en) | Hacking security system of optical cable using optical line monitoring | |
US20140091929A1 (en) | Systems and Methods for Secure Alarmed Armored Protective Distribution Systems and Management | |
Hathaway | Leadership and responsibility for cybersecurity | |
Miller | Optical illusion | |
Transportation | yber Security i OChaII ‘enges | |
Miller | Hacking at the Speed of Light | |
KR102532210B1 (en) | The fixed @(Crazy A)hidden camera detection system | |
Everett | Tapping into fibre optic cables | |
KR20230171041A (en) | The quantum random number security combination wiring panel and Hybrid quantum random number security communication wiring panel and Smart broadcasting system | |
Banjac et al. | Securing data on fiber optic transmission lines | |
UMOH et al. | The Vulnerability of Fiber-Optics Communication Systems: The Role of Optical Tapping | |
Slay et al. | A security architecture for SCADA networks | |
US10122684B1 (en) | Local area network electronic perimeter security | |
Jacoba et al. | Cybersecurity of Smart Grids: Attacks and Defenses of the Smart Meters in an Advanced Metering Infrastructure (AMI) | |
Sayegh | Predicting what 2022 holds for cybersecurity | |
Sanati et al. | A Comprehensive Review of Cyber Security Enhancements for PMU Communications in Microgrids |