Schemes for fault identification in communication networks
IEEE/ACM Transactions on Networking (TON)
A differentiated optical services model for WDM networks
IEEE Communications Magazine
Security issues in all-optical networks
IEEE Network: The Magazine of Global Internetworking
Security and self-organization in transparent optical networks: an overview
AcessNets '06 Proceedings of the 1st international conference on Access networks
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Network Resilience in Future Optical Networks
Towards Digital Optical Networks
Toward efficient failure management for reliable transparent optical networks
IEEE Communications Magazine
A new approach to optical networks security: attack-aware routing and wavelength assignment
IEEE/ACM Transactions on Networking (TON)
Adjacent link failure localization with monitoring trails in all-optical mesh networks
IEEE/ACM Transactions on Networking (TON)
A self-organizing control plane for failure management in transparent optical networks
IWSOS'07 Proceedings of the Second international conference on Self-Organizing Systems
Hi-index | 0.00 |
The effects of an attack connection can propagate quickly to different parts of an all-optical transparent network. Such attacks affect the normal traffic and can either cause service degradation or outright service denial. Quick detection and localization of an attack source can avoid losing large amounts of data in an all-optical network. Attack monitors can collect the information from connections and nodes for diagnostic purpose. However, to detect attack sources, it is not necessary to put monitors at all nodes. Since those connections affected by the attack connection would provide valuable information for diagnosis, we show that by placing a relatively small number of monitors on a selected set of nodes in a network is sufficient to achieve the required level of performance. However, the actual monitor placement, routing, and attack diagnosis are challenging problems that need research attention.In this paper, we first develop our models of crosstalk attack and monitor node. With these models, we prove the necessary and sufficient condition for one-crosstalk-attack diagnosable networks. Next, we develop a scalable diagnosis method which can localize the attack connection efficiently with sparse monitor nodes in the network.