2020
DOI: 10.1007/978-3-030-38085-4_27
|View full text |Cite
|
Sign up to set email alerts
|

Network-Wide Localization of Optical-Layer Attacks

Abstract: Optical networks are vulnerable to a range of attacks targeting service disruption at the physical layer, such as the insertion of harmful signals that can propagate through the network and affect co-propagating channels. Detection of such attacks and localization of their source, a prerequisite for secure network operation, is a challenging task due to the limitations in optical performance monitoring, as well as the scalability and cost issues. In this paper, we propose an approach for localizing the source … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 14 publications
(17 reference statements)
0
3
0
Order By: Relevance
“…When AttSyns are unique for all attack scenarios, the harmful connection that caused the attack can be deduced from the subset of affected connections. Otherwise, additional security monitors or monitoring probes, whose resource-minimizing design was proposed in [33], are necessary to provide AttSyn disambiguation.…”
Section: B Optical Network Security Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…When AttSyns are unique for all attack scenarios, the harmful connection that caused the attack can be deduced from the subset of affected connections. Otherwise, additional security monitors or monitoring probes, whose resource-minimizing design was proposed in [33], are necessary to provide AttSyn disambiguation.…”
Section: B Optical Network Security Managementmentioning
confidence: 99%
“…Initially, only connections C 1 and C 2 are present in the network. If we consider an attack scenario where user connections registered in the system (i.e., C 1 or C 2 in the example) can become the source of an attack (e.g., by tampering with their power levels) and affect any other connections they share links with, the AttSyns are formed for each connection as the attack source, as shown in Fig.4b [32], [33]. In the AttSyn table, the rows match the attack source, while the columns correspond to the resulting degradation of each connection.…”
Section: Attack Source Localizationmentioning
confidence: 99%
“…In addition to the examples of approaches for detecting the presence of physical-layer breaches summarized in Sec. 1, an approach for localization of high-power jamming signals can be found in [26], while [15,27] describe a framework for attack monitoring probe design to aid localization of harmful connections and/or breached links.…”
Section: Optical Layer Security In Evolving Network Operation a Network Security Management Frameworkmentioning
confidence: 99%