Network-wide localization of optical-layer attacks
Paper in proceeding, 2020
network operation, is a challenging task due to the limitations in optical performance monitoring, as well as the scalability and cost issues. In this paper, we propose an approach for localizing the source of a jamming attack by modeling the worst-case scope of each connection as a potential carrier of a harmful signal. We define binary words called attack syndromes to model the health of each connection at the receiver which, when unique, unambiguously identify the harmful connection. To ensure attack syndrome uniqueness, we propose an optimization approach to design attack monitoring trails such that their number and length is minimal. This allows us to use the optical network as a sensor for physical-layer attacks. Numerical simulation results indicate that our approach obtains network-wide attack source localization at only 5.8% average resource overhead for the attack
monitoring trails.
optical network security
physical-layer attack detection
attack monitoring trails
Author
Vincent Chan
Massachusetts Institute of Technology (MIT)
Marija Furdek Prekratic
Chalmers, Electrical Engineering, Communication, Antennas and Optical Networks
Carlos Natalino Da Silva
Chalmers, Electrical Engineering, Communication, Antennas and Optical Networks
Lena Wosinska
Chalmers, Electrical Engineering, Communication, Antennas and Optical Networks
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
03029743 (ISSN) 16113349 (eISSN)
Vol. 11616 LNCS 310-322 1570530976978-303038084-7 (ISBN)
Athens, Greece,
Subject Categories
Computer Engineering
Telecommunications
Communication Systems
Areas of Advance
Information and Communication Technology
DOI
10.1007/978-3-030-38085-4_27