Open Access

Study of Methods and Techniques for Manipulating the Time Synchronization Component of NTP Servers in Computer Networks


Cite

Novick A. & Lombardi M. A Comparison of NTP Servers Connected to the Same Reference Clock and the Same Network. Proceedings of the ION 2017 Precise Time and Time Interval (PTTI) Meeting. 2017. 264-270. 10.33012/2017.14977.Search in Google Scholar

Alghamdi W. Precision time protocol attack strategies and their resistance to existing security extensions. 2021. Cybersecurity. 4. 10.1186/s42400-021-00080-y.Search in Google Scholar

Rangaswamy S. & Murthy S. An Overview of Network Time Protocol. 2021. High Technology Letters. 27. 10.37896/HTL27.6/3704.Search in Google Scholar

Widagdo G. Real-Time Early Detection NTP Amplification Attack. 2019. ACMIT Proceedings. 3. 76-84. 10.33555/acmit.v3i1.29.Search in Google Scholar

Ameri A. & Johnson D. Covert Channel over Network Time Protocol. 2017. 62-65. 10.1145/3058060.3058082.Search in Google Scholar

Nam S.Y., Jurayev S., Kim SS. et al. Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN. J Wireless Com Network 2012. 2012. 89. https://doi.org/10.1186/1687-1499-2012-89.Search in Google Scholar

Mills D.L. Computer Network Time Synchronization: The Network Time Protocol. Taylor & Francis. 2010. pp. 12–.ISBN 978-0-8493-5805-0.Search in Google Scholar