Multiple attack localization and identification in all-optical networks

The security characteristics of currently emerging all-optical networks display many unique features compared to traditional communication networks. In particular, network transparency raises many security vulnerabilities that differ substantially from conventional failures and should therefore be treated differently. One of the serious problems related to transparency lies in the fact that optical crosstalk is additive and can be exploited to perform service disruption attacks upon the network. Since these attacks can spread rapidly through the network, causing additional problems and triggering multiple alarms, they must be detected and identified at any point in the network where they may occur. However, to monitor all wavelength channels at several detection points into any node is likely to be very expensive. In this paper we provide formal specifications for optical crosstalk that can arise in optical cross-connect nodes. Based on these specifications, we propose an algorithm for localizing the sources of multiple attacks and identifying their nature in all-optical networks.

[1]  Tao Wu,et al.  Necessary and sufficient condition for k crosstalk attacks localization in all-optical networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[2]  Wanyi Gu,et al.  Coherent and incoherent crosstalk in WDM optical networks , 1999 .

[3]  Jonathan P. Lang,et al.  Link Management Protocol (LMP) , 2005, RFC.

[4]  Debasish Datta,et al.  Impact of transmission impairments on the teletraffic performance of wavelength-routed optical networks , 1999 .

[5]  Ippei Shake Signal Quality Monitoring in Optical Networks , 2003 .

[6]  K. Oda,et al.  Impact of crosstalk in an arrayed-waveguide multiplexer on N/spl times/N optical interconnection , 1996 .

[7]  M. Kavehrad,et al.  Performance degradation due to crosstalk in multiwavelength optical networks using dynamic wavelength routing , 1995, IEEE Photonics Technology Letters.

[8]  Muriel Médard,et al.  Distributed Algorithms for Attack Localization in All-Optical Networks , 1998, NDSS.

[9]  Kumar N. Sivarajan,et al.  Optical Networks: A Practical Perspective , 1998 .

[10]  Jonathan P. Lang,et al.  Link Management Protocol (LMP) for Dense Wavelength Division Multiplexing (DWDM) Optical Line Systems , 2005, RFC.

[11]  Muriel Médard,et al.  Attack Detection Methods for All-Optical Networks , 1998, NDSS.

[12]  Muriel Medard,et al.  Security issues in all-optical networks , 1997 .

[13]  M.S. Leeson,et al.  Management issues in transparent optical networks , 2004, Proceedings of 2004 6th International Conference on Transparent Optical Networks (IEEE Cat. No.04EX804).

[14]  M.S. Leeson,et al.  Cost optimization method for multiple attack localization and identification in all-optical networks , 2005, Proceedings of 2005 7th International Conference Transparent Optical Networks, 2005..

[15]  C. R. Giles,et al.  Optical monitoring using data correlation for WDM systems , 1998, IEEE Photonics Technology Letters.

[16]  Roger J. Green,et al.  Securing all-optical networks , 2003, Proceedings of 2003 5th International Conference on Transparent Optical Networks, 2003..

[17]  Tao Wu,et al.  Attack monitoring and localization in all-optical networks , 2002, SPIE ITCom.

[18]  Muriel Médard,et al.  Node wrappers for QoS monitoring in transparent optical nodes , 2001, J. High Speed Networks.