Skip to main content

Detection of Attacks and Attack-Survivable Routing in Carrier Networks

  • Chapter
  • First Online:
  • 1397 Accesses

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

As optical networks represent critical infrastructure supporting the digital society, they are an enticing target of malicious man-made attacks aimed at disrupting services or gaining access to the carried information by breaching the physical-layer. Optical network security management encompasses prevention, detection and reaction to attacks and is becoming increasingly important. In the face of the ever-growing amount, dynamicity and heterogeneity of traffic straining the network, new solutions are necessary to enhance the ability of the optical network to detect physical-layer security breaches and recover from them in a quick, effective and autonomous manner. In spite of the intensifying efforts, many theoretical and practical challenges remain to be solved before optical networks can attain the necessary agility in cognitive management, including attack detection and recovery. This chapter provides an overview of prerequisites of attack cognition and approaches to detect, identify and recover from service disruption stemming from physical-layer security breaches.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chan VWS (2018) Resilient optical networks. In: IEEE International Conference on Transparent Optical Networks (ICTON), Bucharest, pp We.D2.1.1–4

    Google Scholar 

  2. Chan VWS (2018) Cognitive optical networks. In: IEEE Communications Conference (ICC), Kansas City, pp ONS.05.3.1–6

    Google Scholar 

  3. Costa LR, Ramos GN, Drummond AC (2016) Leveraging adaptive modulation with multi-hop routing in elastic optical networks. Comput Netw 105:124–137

    Article  Google Scholar 

  4. Deloitte (2017) Tapping of fibre networks. Available at: https://zybersafe.com/wordpress/wp-content/uploads/2017/04/Deloitte_Fiber_tapping_Q1_2017_English.pdf. Cited 30 May 2019

  5. Dong Z, Nadeem Khan F, Sui Q, Zhong K, Lu C, Lau APT (2016) Optical performance monitoring: a review of current and future technologies. IEEE/OSA J Lightwave Technol 34(2):525–543

    Article  Google Scholar 

  6. Endsley MR (1995) Toward a theory of situation awareness in dynamic systems. Hum Factors J 37(1):32–64

    Article  Google Scholar 

  7. Medard M, Marquis D, Barry RA, Finn SG (1997) Security issues in all-optical networks. IEEE Netw 11(3):42–48

    Article  Google Scholar 

  8. Monoyios D, Manousakis K, Christodoulou C, Vlachos K, Ellinas G (2018) Attack-aware resource planning and sparse monitor placement in optical networks. Opt Switch Netw 29:46–56

    Article  Google Scholar 

  9. Furdek M, Chan VWS, Natalino C, Wosinska L (2019) Network-wide localization of optical-layer attacks. In: IEEE Optical Network Design and Modeling Conference (ONDM), Athens, pp 1–12

    Google Scholar 

  10. Furdek M, Skorin-Kapov N, Wosinska L (2016) Attack-aware dedicated path protection in optical networks. IEEE/OSA J Lightwave Technol 34(4):1050–1061

    Article  Google Scholar 

  11. Natalino C, Schiano M, Di Giglio A, Wosinska L, Furdek M (2019) Machine-learning-based detection and identification of physical-layer attacks in optical networks. IEEE/OSA J Lightwave Technol 169:1–10

    Google Scholar 

  12. Pederzolli F, Furdek M, Siracusa D, Wosinska L (2018) Towards secure optical networks: a framework to aid localization of harmful connections. In: Optical Networking and Communications Conference (OFC), San Diego, pp Th2A.42.1–3

    Google Scholar 

  13. Rejeb R, Leeson MS, Green RJ (2006) Multiple attack localization and identification in all-optical networks. Opt Switch Netw 3(1):41–49

    Article  Google Scholar 

  14. Rezaee A, Chan VWS (2019) Cognitive network management and control with significantly reduced state sensing. IEEE Trans Cogn Commun Netw 5(3):783–794

    Article  Google Scholar 

  15. Sambo N, Christodoulopoulos K, Argyris N, Giardina P, Delezoide C, Roccato D, Percelsi A, Morro R, Sgambelluri A, Kanakis G, Bernini G, Castoldi P (2018) Dynamic (re)configuration of optical network based on monitoring information: a field trial. In: OSA Advanced Photonics, Photonic Networks and Devices (NETWORKS), Zurich, pp NeM2F.3.1–2

    Google Scholar 

  16. Szyrkowiec T, Santuari M, Chamania M, Siracusa D, Autenrieth A, Lopez V, Cho J, Kellerer W (2018) Automatic intent-based secure service creation through a multilayer SDN network orchestration. IEEE/OSA J Opt Commmun Netw 10(4):289–297

    Article  Google Scholar 

  17. Velasco L, Chiadò Piat A, Gonzàlez O, Lord A, Napoli A, Layec P, Rafique D, D’Errico A, King D, Ruiz M, Cugini F, Casellas R (2019) Monitoring and data analytics for optical networking: benefits, architectures, and use cases. IEEE Netw 33(6):100–108

    Google Scholar 

  18. Wen Y, Chan VWS, Zheng L (2005) Efficient fault-diagnosis algorithms for all-optical WDM networks with probabilistic link failures. IEEE/OSA J Lightwave Technol 23(10):3358–3371

    Article  Google Scholar 

  19. Zhang L, Chan VWS (2014) Joint architecture of data and control planes for optical flow switched networks. In: IEEE Communications Conference (ICC), Sydney, pp 3425–3431

    Google Scholar 

  20. Zhang L, Chan VWS (2015) Optical flow switching with physical layer impairments—modeling, algorithm, and control. In: IEEE Global Communications Conference (GLOBECOM), San Diego, pp ONS3.4.1–7

    Google Scholar 

  21. Zhang X, Li W, Hu H, Dutta NK (2015) High-speed all-optical encryption and decryption based on two-photon absorption in semiconductor optical amplifiers. IEEE/OSA J Opt Commmun Netw 7(4):276–285

    Article  Google Scholar 

  22. Zheng XA, Chan VWS (2019) Cognitive management and control for wavelengths assignments and reconfigurations of all-optical networks. In: IEEE Communications Conference (ICC), Paris, pp ONS4.5.1–7

    Google Scholar 

Download references

Acknowledgements

This chapter is based on work from COST Action CA15127 (“Resilient communication services protecting end-user applications from disaster-based failures—RECODIS”) supported by European Cooperation in Science and Technology (COST).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marija Furdek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Furdek, M., Pederzolli, F., Chan, V.W.S. (2020). Detection of Attacks and Attack-Survivable Routing in Carrier Networks. In: Rak, J., Hutchison, D. (eds) Guide to Disaster-Resilient Communication Networks. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-44685-7_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-44685-7_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-44684-0

  • Online ISBN: 978-3-030-44685-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics