%0 Conference Proceedings %T Network-Wide Localization of Optical-Layer Attacks %+ Chalmers University of Technology [Gothenburg, Sweden] %+ Massachusetts Institute of Technology (MIT) %A Furdek, Marija %A Chan, Vincent %A Natalino, Carlos %A Wosinska, Lena %Z Part 1: Regular Papers %< avec comité de lecture %( Lecture Notes in Computer Science %B 23th International IFIP Conference on Optical Network Design and Modeling (ONDM) %C Athens, Greece %Y Anna Tzanakaki %Y Manos Varvarigos %Y Raul Muñoz %Y Reza Nejabati %Y Noboru Yoshikane %Y Markos Anastasopoulos %Y Johann Marquez-Barja %I Springer International Publishing %3 Optical Network Design and Modeling %V LNCS-11616 %P 310-322 %8 2019-05-13 %D 2019 %R 10.1007/978-3-030-38085-4_27 %K Optical network security %K Physical-layer attack detection %K Attack monitoring trails %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X Optical networks are vulnerable to a range of attacks targeting service disruption at the physical layer, such as the insertion of harmful signals that can propagate through the network and affect co-propagating channels. Detection of such attacks and localization of their source, a prerequisite for secure network operation, is a challenging task due to the limitations in optical performance monitoring, as well as the scalability and cost issues. In this paper, we propose an approach for localizing the source of a jamming attack by modeling the worst-case scope of each connection as a potential carrier of a harmful signal. We define binary words called attack syndromes to model the health of each connection at the receiver which, when unique, unambiguously identify the harmful connection. To ensure attack syndrome uniqueness, we propose an optimization approach to design attack monitoring trails such that their number and length is minimal. This allows us to use the optical network as a sensor for physical-layer attacks. Numerical simulation results indicate that our approach obtains network-wide attack source localization at only 5.8% average resource overhead for the attack monitoring trails. %G English %Z TC 6 %Z WG 6.10 %2 https://inria.hal.science/hal-03200677/document %2 https://inria.hal.science/hal-03200677/file/484327_1_En_27_Chapter.pdf %L hal-03200677 %U https://inria.hal.science/hal-03200677 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC6 %~ IFIP-LNCS-11616 %~ IFIP-ONDM %~ IFIP-WG6-10