Attacks on the Network Synchronization Systems Counteraction Method Implemented in the Software and Hardware Device «MARSH! 3.0»

This paper proposes attacks on the network synchronization systems counteraction technique, method, algorithm and realizable aspects. The network synchronization systems are included in information technology systems or networks. This method is implemented in software and hardware device (means) «MA...

Full description

Bibliographic Details
Main Authors: Dmitry Anatolevich Melnikov, Vladislav Romanovich Petrov, Evgeny Vasilevich Dirienko, Anton Anatolevich Abramov, Ivan Alexandrovich Korsakov, Stanislav Sergeevich Kuzminov
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2013-12-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/304
Description
Summary:This paper proposes attacks on the network synchronization systems counteraction technique, method, algorithm and realizable aspects. The network synchronization systems are included in information technology systems or networks. This method is implemented in software and hardware device (means) «MARSH! 3.0» providing trusted session.
ISSN:2074-7128
2074-7136