Paper
29 August 2002 Necessary and sufficient condition for crosstalk attack localization in all-optical networks
Author Affiliations +
Proceedings Volume 4909, Network Design and Management; (2002) https://doi.org/10.1117/12.481091
Event: Asia-Pacific Optical and Wireless Communications 2002, 2002, Shanghai, China
Abstract
Although All-Optical Network (AON) are a viable technology for future telecommunication and data networks, it creates many security vulnerabilities that do not exist in traditional networks. Transparency and non regeneration features make attack detection and localization difficult, because the effects of an attack connection can propagate quickly to different parts of a transparent All-Optical Network. Among all attack types in AON, crosstalk attack's propagation capability is second to none. Quick detection and localization of such attack source can avoid losing large amounts of data in an All-Optical Network. However, to detect attack sources, it is not necessary to put monitors on all nodes. Since those connections affected by the attack connection would provide valuable information for diagnosis, we show that placing a relatively small number of monitors on a selected set of nodes in a network is sufficient to achieve the required level of performance. This paper introduces crosstalk attack model and monitor-segment concept. After showing a necessary and sufficient condition for one-OAF diagnosable AON, a new sparse monitor placement method is proposed.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Tao Wu and Arun K. Somani "Necessary and sufficient condition for crosstalk attack localization in all-optical networks", Proc. SPIE 4909, Network Design and Management, (29 August 2002); https://doi.org/10.1117/12.481091
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Networks

Switches

Diagnostics

Improvised explosive devices

Network security

Transparency

Computer security

RELATED CONTENT


Back to Top