Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...
Problems of Detecting Unauthorized Satellite Transmissions from the VSAT Terminals Przemysław Bibik 1 , Stanisław Gradolewski 1 , Wojciech Zawiślak 2 , Jacek Zbudniewek 2 , Radoslav Darakchiev 3 , Jerzy Krężel 3 , Mateusz Michalski 4 , Krzysztof Strzelczyk 4 1 The Institute of Aeronautics and Applied Mechanics, Warsaw University of Technology, Warsaw, Poland, {pbibik, sgrado}@meil.pw.edu.pl 2 WOOD System Integrator, Warsaw, Poland, {wojciech.zawislak, jacek.zbudniewek}@wood.com.pl 3 Astri Polska Sp. z o.o., Warsaw, Poland, {Jerzy.Krezel, Radoslav.Darakchiev}@astripolska.pl 4 Military Communication Institute, Zegrze Płd., Poland, {m. michalski, k.strzelczyk}@wil.waw.pl Abstract: This paper presents a project proposal aimed at developing a set of components in the form of methods and tools supporting the process of detecting unauthorized satellite transmissions, realized with the VSAT (Very Small Aperture Terminal). With its help it will be possible to draw radio (spectral) maps of the existing satellite system, both for the design of new satellite system as well as for identifying unauthorized changes to the radio spectrum showing the appearance of unauthorized emissions. The results of the project may be interesting for governmental offices or security services, that deal with detection of illegal emissions, as well as manufacturers and global integrators. Keywords: component; satellites; VSAT; detection I. Introduction Commonly observed development of information technology also applies to satellite services sector, both in the two-way communication systems and broadcast systems – mainly television and radio broadcasting. While the information transmission systems develop very rapidly, whereas in the systems to safeguard the proper use of satellite transmission resources no development is being practically observed. Current status of satellite information technology security resembles a situation of the early stages of the dynamic development of the Internet, when all network systems operated on the principle of mutual trust. There were no actions aimed at stealing confidential data, or taking control of servers and portals. Over time the situation has radically changed, and today much attention is given
- Page 379 and 380: Chapter 4: Information Assurance &
- Page 381 and 382: Chapter 4: Information Assurance &
- Page 383 and 384: Chapter 4: Information Assurance &
- Page 385 and 386: Chapter 4: Information Assurance &
- Page 387 and 388: Chapter 4: Information Assurance &
- Page 389 and 390: Chapter 4: Information Assurance &
- Page 391 and 392: Chapter 4: Information Assurance &
- Page 393 and 394: Chapter 4: Information Assurance &
- Page 395 and 396: Network Traffic Characteristics for
- Page 397 and 398: Chapter 4: Information Assurance &
- Page 399 and 400: Chapter 4: Information Assurance &
- Page 401 and 402: Chapter 4: Information Assurance &
- Page 403 and 404: Chapter 4: Information Assurance &
- Page 405 and 406: Chapter 4: Information Assurance &
- Page 407 and 408: Chapter 4: Information Assurance &
- Page 409 and 410: Chapter 4: Information Assurance &
- Page 411 and 412: Chapter 4: Information Assurance &
- Page 413 and 414: Chapter 4: Information Assurance &
- Page 415 and 416: Methodology for Gathering Data Conc
- Page 417 and 418: Chapter 4: Information Assurance &
- Page 419 and 420: Chapter 4: Information Assurance &
- Page 421 and 422: Chapter 4: Information Assurance &
- Page 423 and 424: Chapter 4: Information Assurance &
- Page 425 and 426: Chapter 4: Information Assurance &
- Page 427 and 428: Chapter 4: Information Assurance &
- Page 429: Chapter 4: Information Assurance &
- Page 433 and 434: Chapter 4: Information Assurance &
- Page 435 and 436: Chapter 4: Information Assurance &
- Page 437: Chapter 4: Information Assurance &
- Page 440 and 441: 440 Military Communications and Inf
- Page 442 and 443: 442 Military Communications and Inf
- Page 444 and 445: 444 Military Communications and Inf
- Page 446 and 447: 446 Military Communications and Inf
- Page 448 and 449: 448 Military Communications and Inf
- Page 450 and 451: 450 Military Communications and Inf
- Page 452 and 453: 452 Military Communications and Inf
- Page 454 and 455: 454 Military Communications and Inf
- Page 456 and 457: 456 Military Communications and Inf
- Page 458 and 459: 458 Military Communications and Inf
- Page 460 and 461: 460 Military Communications and Inf
- Page 462 and 463: 462 Military Communications and Inf
- Page 465 and 466: Effective Generation of Cryptograph
- Page 467 and 468: Chapter 4: Information Assurance &
- Page 469 and 470: Chapter 4: Information Assurance &
- Page 471 and 472: Chapter 4: Information Assurance &
- Page 473 and 474: Chapter 4: Information Assurance &
- Page 475 and 476: Improving the Efficiency of Cryptog
- Page 477 and 478: Chapter 4: Information Assurance &
- Page 479 and 480: Chapter 4: Information Assurance &
Problems of Detecting Unauthorized Satellite<br />
Transmissions from the VSAT Terminals<br />
Przemysław Bibik 1 , Stanisław Gradolewski 1 , Wojciech Zawiślak 2 ,<br />
Jacek Zbudniewek 2 , Radoslav Darakchiev 3 , Jerzy Krężel 3 ,<br />
Mateusz Michalski 4 , Krzysztof Strzelczyk 4<br />
1 The Institute of Aeronautics <strong>and</strong> Applied Mechanics,<br />
Warsaw University of <strong>Technology</strong>, Warsaw, Pol<strong>and</strong>,<br />
{pbibik, sgrado}@meil.pw.edu.pl<br />
2 WOOD System Integrator, Warsaw, Pol<strong>and</strong>,<br />
{wojciech.zawislak, jacek.zbudniewek}@wood.com.pl<br />
3 Astri Polska Sp. z o.o., Warsaw, Pol<strong>and</strong>,<br />
{Jerzy.Krezel, Radoslav.Darakchiev}@astripolska.pl<br />
4 <strong>Military</strong> Communication Institute, Zegrze Płd., Pol<strong>and</strong>,<br />
{m. michalski, k.strzelczyk}@wil.waw.pl<br />
Abstract: This paper presents a project proposal aimed at developing a set of components in the form<br />
of methods <strong>and</strong> tools supporting the process of detecting unauthorized satellite transmissions, realized<br />
with the VSAT (Very Small Aperture Terminal). With its help it will be possible to draw radio<br />
(spectral) maps of the existing satellite system, both for the design of new satellite system as well as for<br />
identifying unauthorized changes to the radio spectrum showing the appearance of unauthorized<br />
emissions. The results of the project may be interesting for governmental offices or security services,<br />
that deal with detection of illegal emissions, as well as manufacturers <strong>and</strong> global integrators.<br />
Keywords: component; satellites; VSAT; detection<br />
I. Introduction<br />
Commonly observed development of information technology also applies to<br />
satellite services sector, both in the two-way communication systems <strong>and</strong> broadcast<br />
systems – mainly television <strong>and</strong> radio broadcasting. While the information<br />
transmission systems develop very rapidly, whereas in the systems to safeguard<br />
the proper use of satellite transmission resources no development is being practically<br />
observed. Current status of satellite information technology security resembles<br />
a situation of the early stages of the dynamic development of the Internet, when<br />
all network systems operated on the principle of mutual trust. There were no actions<br />
aimed at stealing confidential data, or taking control of servers <strong>and</strong> portals.<br />
Over time the situation has radically changed, <strong>and</strong> today much attention is given