Skip to main content
Log in

BHP flooding vulnerability and countermeasure

  • Published:
Photonic Network Communications Aims and scope Submit manuscript

Abstract

Optical burst switching (OBS) is a switching technology that can efficiently operate in the optical core network using WDM technology and can also develop the future optical internet. The OBS switching technology presents a trade-off between the two switching technologies: optical circuit switching (OCS) and optical packet switching (OPS). This switching approach increases resource utilization compared with OCS technology and avoids the technological barriers of OPS networks. In OBS networks, many packets are assembled into one data burst at the edge node and a burst header packet (BHP) is sent before the burst transmission by an offset time in order to reserve the required resources in core nodes. This can cause security issues in the network and more specifically denial of service attacks that can occur if a source node is compromised. In this paper, we study a specific denial of service attack which we refer to as “BHP flooding attack”, which prevents legitimate traffics from reserving the required resources at intermediate core nodes. We also propose the design of a reconfigurable BHP flooding countermeasure module that allows to counter against this type of attacks in an OBS network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Kartalopoulos, S.: Quantum Cryptography for Secure Optical Networks. (Glasgow, Scotland) (2007)

  2. Ghafouri-Shiraz, H., Karbassian, M.M.: Optical CDMA Networks: Principles, Analysis and Applications. Wiley-IEEE Press, Hoboken (2012)

    Book  Google Scholar 

  3. Soriano, M.C., Colet, P., Mirasso, C.R.: Security implications of open- and closed-loop receivers in all-optical chaos-based communications. IEEE Photonics Technol. Lett. 21, 426–428 (2009)

    Article  Google Scholar 

  4. Marquis, D., Medard, M., Barry, R.A., Finn, S.G.: Security issues in all-optical networks. IEEE Netw. 3, 42–48 (1997)

    Google Scholar 

  5. Wu, T., Somani, A.K.: Cross-talk attack monitoring and localization in all-optical networks. IEEE/ACM Trans. Netw. 13, 1390–1401 (2005)

    Article  Google Scholar 

  6. Mas, C., Tomkos, I., Tonguz, O.K.: Failure location algorithm for transparent optical networks. IEEE J. Sel. Areas Commun. 23, 1508–1519 (2005)

    Article  Google Scholar 

  7. Sivakumar, M., Shenai, R.K., Sivalingam, K.M.: A Survey of Survivability Techniques for Optical WDM Networks. Ch 3. Springer Science, Berlin (2005)

    Google Scholar 

  8. Sun, X., Chan, C.K., Chen, L.K.: A survivable WDM-PON architecture with centralized alternate-path protection switching for traffic restoration. IEEE Photonics Technol. Lett. 18, 631–633 (2006)

    Article  Google Scholar 

  9. Sun, X., Chan, C.K., Wang, Z., Lin, C., Chen, L.K.: A single-fiber bi-directional WDM self-healing ring network with bi-directional OADM for metro-access applications. IEEE J. Sel. Areas Commun. 5, 18–24 (2007)

    Article  Google Scholar 

  10. Fok, M., Wang, Z., Deng, Y., Prucnal, P.: Optical layer security in fiber-optic networks. IEEE Trans. Inf. Forensics Secur. 6, 725–736 (2011)

    Article  Google Scholar 

  11. Yuan, S., Stewart, D.: Protection of optical networks against interchannel eavesdropping and jamming attacks. In: International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, pp. 34–38, 10–13 March 2014

  12. Chen, Y., Verma, P. K.: Secure optical burst switching: framework and research directions. In: IEEE Communication Magazine, Aug 2008

  13. Chen, Y., Verma, P.K., Kak, S.: Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks. Secur. Commun. Netw. 2, 546–554 (2009)

    Article  Google Scholar 

  14. Subramanian, P.S., Muthuraj, K.: Threats in optical burst switched network. Int. J. Comput. Technol. Appl. 2, 510–514 (2011)

    Google Scholar 

  15. Furdek, M., Skorin-Kapov, N.: Physical-layer attacks in all-optical WDM networks. In: Proceedings of the 34th International Convention, Opatija, Croatia, May 2011

  16. Skorin-Kapov, N., Chen, J., Wosinska, L.: A new approach to optical networks security: attack-aware routing and wavelength assignment. IEEE/ACM Trans. Netw. 18(3), 750–760 (2010)

    Article  Google Scholar 

  17. Furdek, M., Skorin-Kapov, N., Zsigmond, S., Wosinska, L.: Vulnerabilities and security issues in optical networks. In: 16th International Conference on Transparent Optical Networks (ICTON), Graz, Austria, pp. 1–4, 6–10 July 2014

  18. Sliti, M., Hamdi, M., Boudriga, N.: A novel optical firewall architecture for burst switched networks. In: Proceedings of the 12th International Conference on Transparent Optical Networks (ICTON 2010) (2010)

  19. Muthuraj, K., Sreenath, N.: Secure optical internet: an attack on OBS node in a TCP over OBS network. Int. J. Emerg. Trends Technol. Comput. Sci. 1(4), 75–80 (2012)

    Google Scholar 

  20. Batti, S., Zghal, M., Boudriga, N.: New all-optical switching node including virtual memory and synchronizer. J. Netw. 5, 165–179 (2010)

    Google Scholar 

  21. Pradeep, C.: Implementation of optical burst switched IP-over-WDM networks using tunable transmitter and tunable receiver. In: Proceedings of the International Conference on Communication Systems and Network Technologies, Gwalior, India, April 2013

  22. Li, H., Yin., H.: An analytical approach to chaotic behavior of TCP in OBS networks. In: Proceedings of the International Conference on Communications in China, Xi’an, China, Aug 2013

  23. Riadi, S., Ghanami, D.E., Maach, A.: An efficient burst cloning scheme for optical burst switching over star networks. In: Proceedings of the ACS International Conference on Computer Systems and Applications, Ifrane, Morocco, May 2013

  24. Coulibaly, Y., Latiff, M., Selamat, A.: A novel routing optimization in optical burst switching networks. In: Proceedings of the Second International Conference on Communication Theory, Reliability, and Quality of Service, Colmar, France, July 2009

  25. Djordjevic, I.B., Vasic, B.V.: Novel combinatorial construction of optical orthogonal codes for incoherent optical CDMA system. J. Lightwave Technol. 21, 1869–1875 (2003)

    Article  Google Scholar 

  26. Boudriga, N., Sliti, M., Abdallah, W.: Optical code-based filtering architecture for providing access control to all-optical networks. In: Proceedings of International Conference on Transparent Optical Networks (ICTON 2012), (2012)

  27. Liu, Y., Hill, M., de Waardt, H., Khoe, G., Dorren, H.: All-optical buffering using laser neural networks. IEEE Photonics Technol. Lett. 15, 596–598 (2003)

    Article  Google Scholar 

  28. Guan, Y., Wang, R.: Demonstration of an optical switch based on SOA-MZI operation at 10 gbit/s. In: Proceedings of the International Conference on Artificial Intelligence and Software Engineering, China, July 2013

  29. Rostam, R., Wahid, M., Rais, S., Faridus, M.: The effect of signal repetition rate, injected current and switching window on cross-phase modulation in SOA-NOLM. In: Proceedings of the IEEE Regional Symposium on Micro and Nanoelectronics, Malaysia, Sept 2011

  30. Tan, H.N., Matsuura, M., Kishi, N.: Parallel WDM regenerative waveform conversion for mixed NRZ and RZ transmission networks using a SOA-based multiple switching-window optical gate. In: Proceedings of the Optical Fiber Communication Conference and Exposition (OFC/NFOEC), Los Angeles, USA, March 2011

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maha Sliti.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sliti, M., Boudriga, N. BHP flooding vulnerability and countermeasure. Photon Netw Commun 29, 198–213 (2015). https://doi.org/10.1007/s11107-014-0484-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11107-014-0484-9

Keywords

Navigation