Analysis of vulnerability propagation for the all-optical network based on Bio-PEPA
- 44 Downloads
Aiming at the vulnerability propagation of all-optical networks, combining with the characteristics of the all-optical network, a formal modeling and analysis method for vulnerability propagation based on Bio-PEPA is proposed in this paper. First of all, the main characteristics that influence the vulnerability propagation are analyzed. Then, the optical fibers, optical amplifiers and optical switches are abstract into three different clusters, and the propagation behavior of vulnerability in intra-cluster and inter-cluster are described accurately. In addition, Ordinary Differential Equations is used for model parsing. Finally, through testing the main factors of vulnerability propagation, such as the number of nodes with potential vulnerability, system detection and repair rate, it is shown that the model constructed in this paper can reflect the vulnerability propagation trend of all-optical networks reasonably. At the same time, the proposed method can avoid the state space explosion problem of traditional modeling methods.
KeywordsAll-optical network Formal modeling Vulnerability propagation Bio-PEPA
This work is supported by the National Natural Science Foundation of China (61403109), the Specialized Research Fund for the Doctoral Program of Higher Education of China (20112303120007) and the Scientific Research Fund of Heilongjiang Provincial Education Department (12541169).
- 1.Deng, N., & Jia, W. (2016). Technology evolution of all optical switching. In Asia Communications and Photonics Conference (pp. 2–5).Google Scholar
- 4.Silva, C., Batista, R., Queiroz, R., et al. (2016) Towards a taxonomy for security threats on the web ecosystem. In Noms IEEE/IFIP Network Operations and Management Symposium, IEEE (pp. 584–590).Google Scholar
- 6.Morris-King, J., & Cam, H. (2015). Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edge. In Military Communications Conference, IEEE (Vol. 23(3), pp. 336–341).Google Scholar
- 8.Furdek, M., & Skorin-Kapov, N. (2011). Physical-layer attacks in all-optical WDM networks. In 2011 Proceedings of the 34th International Convention MIPRO, IEEE (pp. 446–451).Google Scholar
- 9.Furdek, M., & Skorin-Kapov, N. (2012). Physical-layer attacks in transparent optical networks. In N. Das (Ed.), Optical Communications Systems. Available from: http://www.intechopen.com/books/optical-communications-systems/physical-layer-attacksin-transparentoptical-networks.
- 10.Ma, J., Zhang, L., Zhang, S., et al. (2013). Vulnerability analysis of the optical network NMS. In Second International Conference on Instrumentation, IEEE. Google Scholar
- 11.Patel, D. S., & Pancholi, P. N. (2013) Security issues and attack management in AON—A review. In International Conference on Emerging Technology Trends in Electronics, IEEE.Google Scholar
- 13.Wang, J., Zhang, Y., et al. (2012). Research on assessing the vulnerability of optical network from the network geography distribution. In Fourth International Symposium on Information Science and Engineering, Shanghai (pp. 7–11).Google Scholar
- 14.Ruiz, M., & Velasco, L. (2014). Vulnerability modelling for periodical flexgrid network planning. In International Conference on Transparent Optical Networks, IEEE.Google Scholar
- 15.Meixner, C. C., Dikbiyik, F., Tornatore, M., et al. (2013). Disaster-resilient virtual-network mapping and adaptation in optical networks. In 2013 17th International Conference on Optical Networking Design and Modeling, IEEE.Google Scholar
- 21.Zhao, H., Mamoori, S. A., Jaekel, A. (2016). Attack-aware RWA using knowledge of demand holding times. In Electrical and Computer Engineering, IEEE.Google Scholar
- 22.Xiao, Y., Shao, A., Dou, Q., et al. (2013). Dedicated-path protection algorithm for preventing high-powered optical crosstalk in Transparent Optical Networks. In Wireless and Optical Communication Conference (pp. 523–526).Google Scholar
- 24.Sun, Z., Peng, Y., & Long, K. (2011). Propagation effect of high-powered jamming attack in transparent optical networks. Proceedings of SPIE—The International Society for Optical Engineering, 8310(1), 1–6.Google Scholar
- 26.Ciocchetta, F., Duguid, A., Gilmore, S., et al. (2009). The Bio-PEPA tool suite. In The 2009 Sixth International Conference on the Quantitative Evaluation of Systems (pp. 309–310).Google Scholar
- 27.Agrawal, A., & Khan, R. A. (2012). Role of coupling in vulnerability propagation. Software Engineering, 2(1), 60–68.Google Scholar