Abstract
As optical networks represent critical infrastructure supporting the digital society, they are an enticing target of malicious man-made attacks aimed at disrupting services or gaining access to the carried information by breaching the physical-layer. Optical network security management encompasses prevention, detection and reaction to attacks and is becoming increasingly important. In the face of the ever-growing amount, dynamicity and heterogeneity of traffic straining the network, new solutions are necessary to enhance the ability of the optical network to detect physical-layer security breaches and recover from them in a quick, effective and autonomous manner. In spite of the intensifying efforts, many theoretical and practical challenges remain to be solved before optical networks can attain the necessary agility in cognitive management, including attack detection and recovery. This chapter provides an overview of prerequisites of attack cognition and approaches to detect, identify and recover from service disruption stemming from physical-layer security breaches.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chan VWS (2018) Resilient optical networks. In: IEEE International Conference on Transparent Optical Networks (ICTON), Bucharest, pp We.D2.1.1–4
Chan VWS (2018) Cognitive optical networks. In: IEEE Communications Conference (ICC), Kansas City, pp ONS.05.3.1–6
Costa LR, Ramos GN, Drummond AC (2016) Leveraging adaptive modulation with multi-hop routing in elastic optical networks. Comput Netw 105:124–137
Deloitte (2017) Tapping of fibre networks. Available at: https://zybersafe.com/wordpress/wp-content/uploads/2017/04/Deloitte_Fiber_tapping_Q1_2017_English.pdf. Cited 30 May 2019
Dong Z, Nadeem Khan F, Sui Q, Zhong K, Lu C, Lau APT (2016) Optical performance monitoring: a review of current and future technologies. IEEE/OSA J Lightwave Technol 34(2):525–543
Endsley MR (1995) Toward a theory of situation awareness in dynamic systems. Hum Factors J 37(1):32–64
Medard M, Marquis D, Barry RA, Finn SG (1997) Security issues in all-optical networks. IEEE Netw 11(3):42–48
Monoyios D, Manousakis K, Christodoulou C, Vlachos K, Ellinas G (2018) Attack-aware resource planning and sparse monitor placement in optical networks. Opt Switch Netw 29:46–56
Furdek M, Chan VWS, Natalino C, Wosinska L (2019) Network-wide localization of optical-layer attacks. In: IEEE Optical Network Design and Modeling Conference (ONDM), Athens, pp 1–12
Furdek M, Skorin-Kapov N, Wosinska L (2016) Attack-aware dedicated path protection in optical networks. IEEE/OSA J Lightwave Technol 34(4):1050–1061
Natalino C, Schiano M, Di Giglio A, Wosinska L, Furdek M (2019) Machine-learning-based detection and identification of physical-layer attacks in optical networks. IEEE/OSA J Lightwave Technol 169:1–10
Pederzolli F, Furdek M, Siracusa D, Wosinska L (2018) Towards secure optical networks: a framework to aid localization of harmful connections. In: Optical Networking and Communications Conference (OFC), San Diego, pp Th2A.42.1–3
Rejeb R, Leeson MS, Green RJ (2006) Multiple attack localization and identification in all-optical networks. Opt Switch Netw 3(1):41–49
Rezaee A, Chan VWS (2019) Cognitive network management and control with significantly reduced state sensing. IEEE Trans Cogn Commun Netw 5(3):783–794
Sambo N, Christodoulopoulos K, Argyris N, Giardina P, Delezoide C, Roccato D, Percelsi A, Morro R, Sgambelluri A, Kanakis G, Bernini G, Castoldi P (2018) Dynamic (re)configuration of optical network based on monitoring information: a field trial. In: OSA Advanced Photonics, Photonic Networks and Devices (NETWORKS), Zurich, pp NeM2F.3.1–2
Szyrkowiec T, Santuari M, Chamania M, Siracusa D, Autenrieth A, Lopez V, Cho J, Kellerer W (2018) Automatic intent-based secure service creation through a multilayer SDN network orchestration. IEEE/OSA J Opt Commmun Netw 10(4):289–297
Velasco L, Chiadò Piat A, Gonzàlez O, Lord A, Napoli A, Layec P, Rafique D, D’Errico A, King D, Ruiz M, Cugini F, Casellas R (2019) Monitoring and data analytics for optical networking: benefits, architectures, and use cases. IEEE Netw 33(6):100–108
Wen Y, Chan VWS, Zheng L (2005) Efficient fault-diagnosis algorithms for all-optical WDM networks with probabilistic link failures. IEEE/OSA J Lightwave Technol 23(10):3358–3371
Zhang L, Chan VWS (2014) Joint architecture of data and control planes for optical flow switched networks. In: IEEE Communications Conference (ICC), Sydney, pp 3425–3431
Zhang L, Chan VWS (2015) Optical flow switching with physical layer impairments—modeling, algorithm, and control. In: IEEE Global Communications Conference (GLOBECOM), San Diego, pp ONS3.4.1–7
Zhang X, Li W, Hu H, Dutta NK (2015) High-speed all-optical encryption and decryption based on two-photon absorption in semiconductor optical amplifiers. IEEE/OSA J Opt Commmun Netw 7(4):276–285
Zheng XA, Chan VWS (2019) Cognitive management and control for wavelengths assignments and reconfigurations of all-optical networks. In: IEEE Communications Conference (ICC), Paris, pp ONS4.5.1–7
Acknowledgements
This chapter is based on work from COST Action CA15127 (“Resilient communication services protecting end-user applications from disaster-based failures—RECODIS”) supported by European Cooperation in Science and Technology (COST).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Furdek, M., Pederzolli, F., Chan, V.W.S. (2020). Detection of Attacks and Attack-Survivable Routing in Carrier Networks. In: Rak, J., Hutchison, D. (eds) Guide to Disaster-Resilient Communication Networks. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-44685-7_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-44685-7_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44684-0
Online ISBN: 978-3-030-44685-7
eBook Packages: Computer ScienceComputer Science (R0)