Network-Wide Localization of Optical-Layer Attacks - Optical Network Design and Modeling Access content directly
Conference Papers Year : 2020

Network-Wide Localization of Optical-Layer Attacks

Abstract

Optical networks are vulnerable to a range of attacks targeting service disruption at the physical layer, such as the insertion of harmful signals that can propagate through the network and affect co-propagating channels. Detection of such attacks and localization of their source, a prerequisite for secure network operation, is a challenging task due to the limitations in optical performance monitoring, as well as the scalability and cost issues. In this paper, we propose an approach for localizing the source of a jamming attack by modeling the worst-case scope of each connection as a potential carrier of a harmful signal. We define binary words called attack syndromes to model the health of each connection at the receiver which, when unique, unambiguously identify the harmful connection. To ensure attack syndrome uniqueness, we propose an optimization approach to design attack monitoring trails such that their number and length is minimal. This allows us to use the optical network as a sensor for physical-layer attacks. Numerical simulation results indicate that our approach obtains network-wide attack source localization at only 5.8% average resource overhead for the attack monitoring trails.
Fichier principal
Vignette du fichier
484327_1_En_27_Chapter.pdf (772.22 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-03200677 , version 1 (16-04-2021)

Licence

Attribution

Identifiers

Cite

Marija Furdek, Vincent Chan, Carlos Natalino, Lena Wosinska. Network-Wide Localization of Optical-Layer Attacks. 23th International IFIP Conference on Optical Network Design and Modeling (ONDM), May 2019, Athens, Greece. pp.310-322, ⟨10.1007/978-3-030-38085-4_27⟩. ⟨hal-03200677⟩
22 View
3 Download

Altmetric

Share

Gmail Facebook X LinkedIn More