首页> 美国政府科技报告 >Validation Method of a Telecommunications Blackout Attack
【24h】

Validation Method of a Telecommunications Blackout Attack

机译:电信停电攻击的验证方法

获取原文

摘要

This paper presents an evaluation method of telecommunications infrastructure vulnerabilities, allowing the identification of components that can be attacked in order to achieve a communications blackout. Exploring those components it is possible to define a scenario and conduct case studies analysis and experiments that can be used to assess the vulnerabilities of a real world situation. The conceptual framework basic idea is to identify points that can be attacked using unsophisticated technology in order to achieve serious damages on the different network infrastructures, and to obtain the maximum disruptive effect over the services. The proposed method uses a top- down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号