Журнал
Proceedings - 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2023
Абстракт
The article is devoted to identifying algorithms for unauthorized actions of an illegitimate user on optoelectronic components of ground and space communication stations, in cases where an attacking entity pre-scans the protected perimeter in search of critical vulnerabilities. Under scanning, the authors accept the technical process of extracting the most useful knowledge, both about the system and the data circulating in it. The methodology outlined in the study is aimed at identifying an attacker acting on two main quantum states of particles - Glauber states and incoherent ones. The most vulnerable component in both cases is the avalanche photodetector, which corresponds to the attack - 'blindness'. Detection of an illegitimate user is possible due to a deep analysis of time slots, mainly in manual mode, automatic detection cannot be implemented today due to its low development. The research materials contain a descriptive part of four scenarios where an attacker has unlimited computing power in the form of software and hardware. At the same time, the order of the attacker's goals is defined as: scanning the system, detecting vulnerabilities, implementing security threats, penetrating the network and stealing data. © 2023 IEEE.
Ключевые слова
attack, communication, information leakage, quantum networks, security, testing