Vulnerabilities and Security Issues in Optical Networks

被引:0
|
作者
Furdek, Marija [1 ,2 ]
Skorin-Kapov, Nina [3 ]
Zsigmond, Szilard [4 ]
Wosinska, Lena [1 ]
机构
[1] KTH Royal Inst Technol, ICT Sch, Electrum 229, S-16440 Kista, Sweden
[2] Univ Zagreb, Fac Elect Engn & Comp, Zagreb 10000, Croatia
[3] Cent Univ Defensa CUD, Ribera, Spain
[4] Alcatel Lucent, Murray Hill, NJ 60070 USA
关键词
optical network security; eavesdropping; high-power jamming; signal insertion; alien wavelengths; architecture on demand; network hijacking; latency attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The paper provides a comprehensive overview of security issues in state-of-the-art optical networks. It identifies and describes the main vulnerabilities of today's and future networks and outlines potential methods of attack which could exploit these vulnerabilities.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Security Issues and Vulnerabilities in Web Application
    Anumotu, Sitara
    Jha, Kushagra
    Balhara, Amit
    Chawla, Pronika
    [J]. NEXT GENERATION OF INTERNET OF THINGS, 2023, 445 : 103 - 114
  • [2] Security issues and vulnerabilities of the SNMP protocol
    Chatzimisios, P
    [J]. 2004 1st International Conference on Electrical and Electronics Engineering (ICEEE), 2004, : 74 - 77
  • [3] Security issues in optical networks physical layer
    Teixeira, A.
    Vieira, A.
    Andrade, J.
    Quinta, A.
    Lima, M.
    Nogueira, R.
    Andre, P. S.
    Beleffi, G. Tosi
    [J]. ICTON 2008: PROCEEDINGS OF 2008 10TH ANNIVERSARY INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 4, 2008, : 123 - +
  • [4] Security issues in all-optical networks
    Medard, M
    Marquis, D
    Barry, RA
    Finn, SG
    [J]. IEEE NETWORK, 1997, 11 (03): : 42 - 48
  • [5] Security Issues and Vulnerabilities in Connected Car Systems
    Becsi, Tamas
    Aradi, Szilard
    Gaspar, Peter
    [J]. 2015 INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2015, : 477 - 482
  • [6] E-Learning Software Security Tested for Security Vulnerabilities & Issues
    Violettas, George E.
    Theodorou, Tryfon L.
    Stephanides, George C.
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON E-LEARNING "BEST PRACTICES IN MANAGEMENT, DESIGN AND DEVELOPMENT OF E-COURSES: STANDARDS OF EXCELLENCE AND CREATIVITY, 2013, : 233 - 240
  • [7] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    [J]. IEEE ACCESS, 2021, 9 : 162401 - 162437
  • [8] Managing Cyber Security Vulnerabilities in Large Networks
    Chang, Edward S.
    Jain, Aridaman K.
    Slade, David M.
    Tsao, S. Lee
    [J]. Bell Labs Technical Journal, 4 (3-4): : 252 - 272
  • [9] Vulnerabilities and security for ad-hoc networks
    Mishra, Renu
    Sharma, Sanjeev
    Agrawal, Rajeev
    [J]. 2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 192 - 196
  • [10] Managing cyber security vulnerabilities in large networks
    Chang, ES
    Jain, AK
    Slade, DM
    Tsao, SL
    [J]. BELL LABS TECHNICAL JOURNAL, 1999, 4 (04) : 252 - 272