Skip to main content

Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10060))

  • 1085 Accesses

Abstract

In this article, a multiple crosstalk attacks source identification algorithm under sparse monitoring called Masking algorithm is proposed where the placement of monitors is selected based on the Greedy sparse monitor placement algorithm. The result obtained show that the proposed algorithm successfully identifies multiple sources of crosstalk attack under worst case scenario of 3-level crosstalk attack propagation model in 8-node Grid and Europe 11-node COST239 networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yoon-Suk, H., Gyo-Sun, H., Jin-Young, J., Kyung-Goo, L., Kyung-Woon, S., Sang Soo, L., Keon Young, Y., Jae-seung, L.: 1-Tb/s (100×12.4 gb/s) transmission of 12.5-GHz-spaced ultradense WDM channels over a standard single-mode fiber of 1200 km. IEEE Photonics Technol. Lett. 17(3), 696–698 (2005)

    Article  Google Scholar 

  2. Tao, W., Somani, K.A.: Crosstalk attack monitoring and localization in all-optical networks. IEEE/ACM Trans. Netw. 13(6), 1390–1401 (2005)

    Article  Google Scholar 

  3. Medard, M., Marquis, D., Barry, R.A., Finn, S.G.: Security issues in all-optical networks. IEEE Network 11(3), 42–48 (1997)

    Article  Google Scholar 

  4. Yeom, J., Tonguz, O.K.: Security and self-organization in transparent optical networks: an overview. In: Proceedings of the 1st International Conference on Access Networks, Athens, Greece, pp. 13 (2006)

    Google Scholar 

  5. Katzela, I., Ellinas, G., Yoon, W.S., Stern, T.E.: Fault diagnosis in optical networks. J. High Speed Netw. 10(4), 269–291 (2001)

    Google Scholar 

  6. Mas, C., Thiran, P.: A review on fault location methods and their application to optical networks. Opt. Netw. Mag. 2(4), 73–87 (2001)

    Google Scholar 

  7. Zeng, H., Huang, C., Vukovic, A.: A novel fault detection and localization scheme for meshed all-optical networks based on monitoring-cycles. Photonic Netw. Commun. 11(3), 277–286 (2006)

    Article  Google Scholar 

  8. Kilper, D.C., Bach, R., Blumenthal, D.J., Einstein, D., Landolsi, T., Ostar, L., Preiss, M., Willner, A.E.: Optical performance monitoring. IEEE J. Lightwave Technol. 22(1), 294–304 (2004)

    Article  Google Scholar 

  9. Patell, J.K., Kim, S.U., Su, D.H., Subramaniam, S.S.: A framework for managing faults and attacks in all-optical transport networks. In: DARPA Information Survivability Conference and Exposition II, DISCEX 2001. Proceedings, pp. 137–145 (2001)

    Google Scholar 

  10. Liu, G., Ji, C.: Resilience of all-optical network architectures under in-band crosstalk attacks: a probabilistic graphical model approach. IEEE J. Sel. Areas Commun. 25(3), 2–17 (2007)

    Article  Google Scholar 

  11. Peng, Y., Sun, Z., Du, S., Long, K.: Propagation of all-optical crosstalk attack in transparent optical networks. Opt. Eng. 50(8), 085002 (2011)

    Article  Google Scholar 

  12. Sharma, N.: Effects of crosstalk propagation on the performance of all-optical networks. In: 1st International Conference on Recent Advances in Information Technology, pp. 240–245 (2012)

    Google Scholar 

  13. Zhang, Y.F., Ren, S., Li, J., Liao, X.M., Li, M., Fang, Y.Y.: Research on high power inter-channel crosstalk attack in optical networks. J. Shanghai Jiaotong Univ. (Sci.) 20(1), 7–13 (2015)

    Article  Google Scholar 

  14. Mdard, M., Chinn, S.R., Saengudomlert, P.: Node wrappers for QoS monitoring in transparent optical nodes. J. High Speed Netw. 10(4), 247–268 (2001)

    Google Scholar 

  15. Deng, H., Lazar, A.A., Wang, W.: A probabilistic approach to fault diagnosis in linear lightwave networks. IEEE J. Sel. Areas Commun. 11, 1438–1448 (1993)

    Article  Google Scholar 

  16. Mas, C., Tomkos, I., Tonguz, K.O.: Failure location algorithm for transparent optical networks. IEEE J. Sel. Areas Commun. 23(8), 1508–1519 (2005)

    Article  Google Scholar 

  17. Jaccard, P.: Nouvelles recherches sur la distribution florale. Bulletin de la Sociète Vaudense des Sciences Naturelles 44, 223–270 (1998)

    Google Scholar 

  18. Chvatal, V.: A Greedy heuristic for the set-covering problem. Math. Oper. Res. 4(3), 233–235 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  19. Dijkstra, E.W.: A note on two problems in connection with graphs. Numer. Math. 1(1), 269–271 (1959). doi:10.1007/BF01386390

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saw Chin Tan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Siew, H.W., Tan, S.C., Lee, C.K. (2016). Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring. In: Bao, F., Chen, L., Deng, R., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2016. Lecture Notes in Computer Science(), vol 10060. Springer, Cham. https://doi.org/10.1007/978-3-319-49151-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49151-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49150-9

  • Online ISBN: 978-3-319-49151-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics