Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-domain optical network multipoint crosstalk attack monitoring node selection and monitoring positioning method

A technology for monitoring nodes and positioning methods, applied in the field of multi-domain optical networks, can solve the problems of lack of multi-domain and multi-point crosstalk attack monitoring and positioning methods, and achieve the effect of real-time detection

Active Publication Date: 2021-02-09
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a monitoring node selection and positioning method for multi-domain optical network multi-point crosstalk attacks, so as to solve the problem of lack of monitoring and positioning methods for multi-domain and multi-point crosstalk attacks in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-domain optical network multipoint crosstalk attack monitoring node selection and monitoring positioning method
  • Multi-domain optical network multipoint crosstalk attack monitoring node selection and monitoring positioning method
  • Multi-domain optical network multipoint crosstalk attack monitoring node selection and monitoring positioning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] This embodiment uses the NSF network topology to analyze the proposed multi-domain optical network crosstalk attack monitoring method as an example. The NSF network has 14 nodes and 20 links in total. Its layered PCE architecture is as follows: Figure 4 As shown, the NSF network is divided into three domains D1, D2, and D3. Each domain has a different number of nodes, and each domain has a certain number of border nodes connected to the other two domains.

[0079] Set the multi-domain optical network G=(14,17), and the source node of the crosstalk attack is q 1 ,q 6 , the destination node is p 7 ,p 9 , p 13 . First enter the monitoring placement selection module, pPCE finds the domain where the attack source node and destination node are located in the network, and uses the Dijkstra algorithm to calculate the attack propagation path set u 1 ={q 1 ,n 2 ,n 8 ,p 7}, u 2 ={q 1 ,n 2 ,n 8 ,p 9},u 3 ={q 1 ,n 4 ,n 5 ,p 7},u 4 ={q 1 ,n 4 ,n 11 ,p 13},u ...

Embodiment 2

[0081] There are various types of crosstalk attacks in multi-domain optical networks, among which the in-band crosstalk at OXC will cause more serious damage to user signals. In this paper, OXC is used as the main attack node in multi-domain optical networks. Optical Fibers and Gain amplifier EDFA is the secondary attack node, and an example analysis of the proposed multi-domain optical network crosstalk attack location method is carried out. Such as Figure 4 As shown, set the input user signal as Tx 1 ~Tx 6 , the main attack node of the high-power crosstalk attack is OXC 1 ~OXC 7 , the secondary attack node is F 1 ~F 6 、EDFA 1 ~EDFA 3 , the monitoring node is M 1 ~ M 6 .

[0082] To the user signal input terminal Tx 2 、Tx 6 N 1 and N 2 Two places inject high-power crosstalk attack signals. The monitoring node in the network detects the crosstalk attack, switches to the alarm state and sends out an alarm message. The PCE collects the alarm information through th...

Embodiment 3

[0091] This embodiment adopts the VPI optical network software platform to carry out the simulation experiment, and the multi-domain optical network multi-point crosstalk attack detection and location method (I-CADL for short) based on the layered PCE proposed by the invention is compared with the literature [1] (Li Wei, Wang Fang, Zhao Feng. Detection and location of attacks in all-optical networks [J]. Modern Electronic Technology, 2008, 31(15): 18-20.) A crosstalk attack detection and location method based on parameter comparison (referred to as P- CADL) and literature [6] (Li Fang. Research on multi-domain optical network crosstalk attack detection and intrusion tolerance technology [D]. Shaanxi: Armed Police Engineering University, 2018.) proposed a crosstalk attack detection and location method based on gray theory (referred to as G-CADL) for comparative analysis. The main modules used in the simulation experiment construction process are signal sending module, signal tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of multi-domain optical networks, and discloses a multi-domain optical network multipoint crosstalk attack monitoring node selection and monitoring positioning method. According to the method, the influence of the nodes in the network is described by utilizing different feature attribute access degrees and clustering coefficients of the nodes, a monitoring node set conforming to the monitoring density is obtained through a two-round selection mechanism, and the nodes with high influence in the network are selected as much as possible to place monitoring devices; the purposes of monitoring the crosstalk attack in real time and accurately positioning the source node of the crosstalk attack are achieved.

Description

technical field [0001] The invention belongs to the technical field of multi-domain optical networks, and in particular relates to a monitoring node selection and monitoring and positioning method for multi-point crosstalk attacks in multi-domain optical networks. Background technique [0002] With the rapid development of optical transmission technology, optical networks carry multi-service, large-capacity, and high-speed information transmission tasks. Cybersecurity brings risks and challenges. Therefore, how to realize the effective monitoring and accurate positioning of the multi-point crosstalk attack in the multi-domain optical network is an important problem that needs to be solved urgently. [0003] At present, it is still challenging to realize the effective monitoring and accurate positioning of multi-domain optical network crosstalk attacks. Literature [1] (Li Wei, Wang Fang, Zhao Feng. Detection and location of attacks in all-optical networks [J]. Modern Electr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q11/00H04L29/06
CPCH04Q11/0062H04L63/1416H04L63/1441H04Q2011/0079Y02D30/50
Inventor 吴启武刘雪玥姜姗姜灵芝
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE