Multi-domain optical network multipoint crosstalk attack monitoring node selection and monitoring positioning method
A technology for monitoring nodes and positioning methods, applied in the field of multi-domain optical networks, can solve the problems of lack of multi-domain and multi-point crosstalk attack monitoring and positioning methods, and achieve the effect of real-time detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0078] This embodiment uses the NSF network topology to analyze the proposed multi-domain optical network crosstalk attack monitoring method as an example. The NSF network has 14 nodes and 20 links in total. Its layered PCE architecture is as follows: Figure 4 As shown, the NSF network is divided into three domains D1, D2, and D3. Each domain has a different number of nodes, and each domain has a certain number of border nodes connected to the other two domains.
[0079] Set the multi-domain optical network G=(14,17), and the source node of the crosstalk attack is q 1 ,q 6 , the destination node is p 7 ,p 9 , p 13 . First enter the monitoring placement selection module, pPCE finds the domain where the attack source node and destination node are located in the network, and uses the Dijkstra algorithm to calculate the attack propagation path set u 1 ={q 1 ,n 2 ,n 8 ,p 7}, u 2 ={q 1 ,n 2 ,n 8 ,p 9},u 3 ={q 1 ,n 4 ,n 5 ,p 7},u 4 ={q 1 ,n 4 ,n 11 ,p 13},u ...
Embodiment 2
[0081] There are various types of crosstalk attacks in multi-domain optical networks, among which the in-band crosstalk at OXC will cause more serious damage to user signals. In this paper, OXC is used as the main attack node in multi-domain optical networks. Optical Fibers and Gain amplifier EDFA is the secondary attack node, and an example analysis of the proposed multi-domain optical network crosstalk attack location method is carried out. Such as Figure 4 As shown, set the input user signal as Tx 1 ~Tx 6 , the main attack node of the high-power crosstalk attack is OXC 1 ~OXC 7 , the secondary attack node is F 1 ~F 6 、EDFA 1 ~EDFA 3 , the monitoring node is M 1 ~ M 6 .
[0082] To the user signal input terminal Tx 2 、Tx 6 N 1 and N 2 Two places inject high-power crosstalk attack signals. The monitoring node in the network detects the crosstalk attack, switches to the alarm state and sends out an alarm message. The PCE collects the alarm information through th...
Embodiment 3
[0091] This embodiment adopts the VPI optical network software platform to carry out the simulation experiment, and the multi-domain optical network multi-point crosstalk attack detection and location method (I-CADL for short) based on the layered PCE proposed by the invention is compared with the literature [1] (Li Wei, Wang Fang, Zhao Feng. Detection and location of attacks in all-optical networks [J]. Modern Electronic Technology, 2008, 31(15): 18-20.) A crosstalk attack detection and location method based on parameter comparison (referred to as P- CADL) and literature [6] (Li Fang. Research on multi-domain optical network crosstalk attack detection and intrusion tolerance technology [D]. Shaanxi: Armed Police Engineering University, 2018.) proposed a crosstalk attack detection and location method based on gray theory (referred to as G-CADL) for comparative analysis. The main modules used in the simulation experiment construction process are signal sending module, signal tr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


