SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:research.chalmers.se:ec695764-e29a-49ec-b661-eb1af3d36760"
 

Search: onr:"swepub:oai:research.chalmers.se:ec695764-e29a-49ec-b661-eb1af3d36760" > Network-wide locali...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist
  • Chan, VincentMassachusetts Institute of Technology (MIT) (author)

Network-wide localization of optical-layer attacks

  • Article/chapterEnglish2020

Publisher, publication year, extent ...

  • 2020-02-16
  • Cham :Springer International Publishing,2020
  • electronicrdacarrier

Numbers

  • LIBRIS-ID:oai:research.chalmers.se:ec695764-e29a-49ec-b661-eb1af3d36760
  • https://doi.org/10.1007/978-3-030-38085-4_27DOI
  • https://research.chalmers.se/publication/510338URI
  • https://research.chalmers.se/publication/516709URI

Supplementary language notes

  • Language:English
  • Summary in:English

Part of subdatabase

Classification

  • Subject category:kon swepub-publicationtype
  • Subject category:ref swepub-contenttype

Notes

  • Optical networks are vulnerable to a range of attacks targeting service disruption at the physical layer, such as the insertion of harmful signals that can propagate through the network and affect co-propagating channels. Detection of such attacks and localization of their source, a prerequisite for secure network operation, is a challenging task due to the limitations in optical performance monitoring, as well as the scalability and cost issues. In this paper, we propose an approach for localizing the source of a jamming attack by modeling the worst-case scope of each connection as a potential carrier of a harmful signal. We define binary words called attack syndromes to model the health of each connection at the receiver which, when unique, unambiguously identify the harmful connection. To ensure attack syndrome uniqueness, we propose an optimization approach to design attack monitoring trails such that their number and length is minimal. This allows us to use the optical network as a sensor for physical-layer attacks. Numerical simulation results indicate that our approach obtains network-wide attack source localization at only 5.8% average resource overhead for the attack monitoring trails.

Subject headings and genre

Added entries (persons, corporate bodies, meetings, titles ...)

  • Furdek Prekratic, Marija,1985Chalmers tekniska högskola,Chalmers University of Technology(Swepub:cth)furdek (author)
  • Natalino Da Silva, Carlos,1987Chalmers tekniska högskola,Chalmers University of Technology(Swepub:cth)carda (author)
  • Wosinska, Lena,1951Chalmers tekniska högskola,Chalmers University of Technology(Swepub:cth)wosinska (author)
  • Massachusetts Institute of Technology (MIT)Chalmers tekniska högskola (creator_code:org_t)

Related titles

  • In:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)Cham : Springer International Publishing11616 LNCS, s. 310-3221611-33490302-9743

Internet link

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view