Abstract
In this article, a multiple crosstalk attacks source identification algorithm under sparse monitoring called Masking algorithm is proposed where the placement of monitors is selected based on the Greedy sparse monitor placement algorithm. The result obtained show that the proposed algorithm successfully identifies multiple sources of crosstalk attack under worst case scenario of 3-level crosstalk attack propagation model in 8-node Grid and Europe 11-node COST239 networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yoon-Suk, H., Gyo-Sun, H., Jin-Young, J., Kyung-Goo, L., Kyung-Woon, S., Sang Soo, L., Keon Young, Y., Jae-seung, L.: 1-Tb/s (100×12.4 gb/s) transmission of 12.5-GHz-spaced ultradense WDM channels over a standard single-mode fiber of 1200 km. IEEE Photonics Technol. Lett. 17(3), 696–698 (2005)
Tao, W., Somani, K.A.: Crosstalk attack monitoring and localization in all-optical networks. IEEE/ACM Trans. Netw. 13(6), 1390–1401 (2005)
Medard, M., Marquis, D., Barry, R.A., Finn, S.G.: Security issues in all-optical networks. IEEE Network 11(3), 42–48 (1997)
Yeom, J., Tonguz, O.K.: Security and self-organization in transparent optical networks: an overview. In: Proceedings of the 1st International Conference on Access Networks, Athens, Greece, pp. 13 (2006)
Katzela, I., Ellinas, G., Yoon, W.S., Stern, T.E.: Fault diagnosis in optical networks. J. High Speed Netw. 10(4), 269–291 (2001)
Mas, C., Thiran, P.: A review on fault location methods and their application to optical networks. Opt. Netw. Mag. 2(4), 73–87 (2001)
Zeng, H., Huang, C., Vukovic, A.: A novel fault detection and localization scheme for meshed all-optical networks based on monitoring-cycles. Photonic Netw. Commun. 11(3), 277–286 (2006)
Kilper, D.C., Bach, R., Blumenthal, D.J., Einstein, D., Landolsi, T., Ostar, L., Preiss, M., Willner, A.E.: Optical performance monitoring. IEEE J. Lightwave Technol. 22(1), 294–304 (2004)
Patell, J.K., Kim, S.U., Su, D.H., Subramaniam, S.S.: A framework for managing faults and attacks in all-optical transport networks. In: DARPA Information Survivability Conference and Exposition II, DISCEX 2001. Proceedings, pp. 137–145 (2001)
Liu, G., Ji, C.: Resilience of all-optical network architectures under in-band crosstalk attacks: a probabilistic graphical model approach. IEEE J. Sel. Areas Commun. 25(3), 2–17 (2007)
Peng, Y., Sun, Z., Du, S., Long, K.: Propagation of all-optical crosstalk attack in transparent optical networks. Opt. Eng. 50(8), 085002 (2011)
Sharma, N.: Effects of crosstalk propagation on the performance of all-optical networks. In: 1st International Conference on Recent Advances in Information Technology, pp. 240–245 (2012)
Zhang, Y.F., Ren, S., Li, J., Liao, X.M., Li, M., Fang, Y.Y.: Research on high power inter-channel crosstalk attack in optical networks. J. Shanghai Jiaotong Univ. (Sci.) 20(1), 7–13 (2015)
Mdard, M., Chinn, S.R., Saengudomlert, P.: Node wrappers for QoS monitoring in transparent optical nodes. J. High Speed Netw. 10(4), 247–268 (2001)
Deng, H., Lazar, A.A., Wang, W.: A probabilistic approach to fault diagnosis in linear lightwave networks. IEEE J. Sel. Areas Commun. 11, 1438–1448 (1993)
Mas, C., Tomkos, I., Tonguz, K.O.: Failure location algorithm for transparent optical networks. IEEE J. Sel. Areas Commun. 23(8), 1508–1519 (2005)
Jaccard, P.: Nouvelles recherches sur la distribution florale. Bulletin de la Sociète Vaudense des Sciences Naturelles 44, 223–270 (1998)
Chvatal, V.: A Greedy heuristic for the set-covering problem. Math. Oper. Res. 4(3), 233–235 (1979)
Dijkstra, E.W.: A note on two problems in connection with graphs. Numer. Math. 1(1), 269–271 (1959). doi:10.1007/BF01386390
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Siew, H.W., Tan, S.C., Lee, C.K. (2016). Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring. In: Bao, F., Chen, L., Deng, R., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2016. Lecture Notes in Computer Science(), vol 10060. Springer, Cham. https://doi.org/10.1007/978-3-319-49151-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-49151-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49150-9
Online ISBN: 978-3-319-49151-6
eBook Packages: Computer ScienceComputer Science (R0)