Abstract

Optical burst switching (OBS) is a switching technology that can efficiently operate in the optical core network using WDM technology and can also develop the future optical internet. The OBS switching technology presents a trade-off between the two switching technologies: optical circuit switching (OCS) and optical packet switching (OPS). This switching approach increases resource utilization compared with OCS technology and avoids the technological barriers of OPS networks. In OBS networks, many packets are assembled into one data burst at the edge node and a burst header packet (BHP) is sent before the burst transmission by an offset time in order to reserve the required resources in core nodes. This can cause security issues in the network and more specifically denial of service attacks that can occur if a source node is compromised. In this paper, we study a specific denial of service attack which we refer to as "BHP flooding attack", which prevents legitimate traffics from reserving the required resources at intermediate core nodes. We also propose the design of a reconfigurable BHP flooding countermeasure module that allows to counter against this type of attacks in an OBS network.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.