Translator Disclaimer
Paper
3 July 2002 Attack monitoring and localization in all-optical networks
Author Affiliations +
Proceedings Volume 4874, OptiComm 2002: Optical Networking and Communications; (2002) https://doi.org/10.1117/12.475301
Event: ITCom 2002: The Convergence of Information Technologies and Communications, 2002, Boston, MA, United States
Abstract
The effects of an attack connection can propagate quickly to different parts of a transparent All-Optical Network. Such attacks affect the normal traffic and can either cause service degradation or outright service denial. Quick detection and localization of an attack source can avoid losing large amounts of data in an All-Optical Network. Attack monitors can collect the information from connections and nodes for diagnostic purpose. However, to detect attack sources, it is not necessary to put monitors on all nodes. Since those connections affected by the attack connection would provide valuable information for diagnosis, we show that placing a relatively small number of monitors on a selected set of nodes in a network is sufficient to achieve the required level of performance. However, the monitor placement, routing, and attack diagnosis are challenging problems which need research attention. We, in this paper, first develop our models of crosstalk attack and monitor node. With these models, we prove the necessary and sufficient condition for one-crosstalk-attack diagnosable network. After that, we develop a scalable diagnosis method which can localize the attack connection efficiently with sparse monitor nodes.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Tao Wu and Arun K. Somani "Attack monitoring and localization in all-optical networks", Proc. SPIE 4874, OptiComm 2002: Optical Networking and Communications, (3 July 2002); https://doi.org/10.1117/12.475301
PROCEEDINGS
14 PAGES


SHARE
Advertisement
Advertisement
RELATED CONTENT


Back to Top