An Algorithm for Detection and Mitigation of Degradation Attack in Ethernet Passive Optical Networks
نویسندگان
چکیده
To my mother Rose " I'm great believer in luck, and I find the harder I work the more I have of it. " Chapter 6. Analysis of simulation results 44 6.1 TCP transmission client-to-server 44 6.2 TCP transmission server-to-client 49 6.3 Interaction of retransmission time-out mechanism 53 and mitigation algorithm Chapter 7. Conclusion 57 Bibliography 58 Acknowledges 59 III IV Abstract The work presented in this thesis is based on adding new techniques to enhance current security in Ethernet Optical Passive Networks (EPONs). An Ethernet PON is type of Passive Optical Network (PON) which carries all data encapsulated in Ethernet frames. In this way EPON combines Passive Optical Networks (PONs) capable of delivering bandwidth-intensive integrated, data, voice, and video services at distances beyond 20 km with Ethernet protocol. Main advantage of Ethernet protocol is that it is an inexpensive technology that is ubiquitous and interoperable with variety of legacy equipment. Due to exponential growth of internet traffic in the last decades and high number of new services and applications which require large bandwidth existing technologies based on cooper (e.g. Digital Subscriber Line(DSL)) could not keep any more with such demands. EPON has emerged to be good candidate for offering higher capacity to the subscribers under relatively low costs. As in every telecommunication network that is serving high number of users transferring data at the high bit rate, security in EPON is one of very important issues. While security in downstream transmission channel in EPON was focus of many researches due to its broadcast nature, upstream direction was always assumed to be secure. In upstream direction, due to directional properties of passive couplers, which act as passive splitters for downstream, Ethernet frames from many ONU will only reach the OLT and not any other ONU. In this scenario attacks like eavesdropping and all other attacks that are based on exploiting broadcast nature of transmission channel are eliminated. But this does not means that upstream streams cannot be destroyed or that quality of upstream transmission cannot be degraded in some way. In upstream direction, the logical behavior of an EPON is similar to point-to-point networks, but unlike in a true point-to-point network, collisions may occur among frames transmitted from different ONUs. In general EPON should avoid collisions by means of Multi-Point Control Protocol (MPCP) in the Medium Access Control (MAC) layer. But eventual collisions in upstream direction can not be totally …
منابع مشابه
Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملA collusion mitigation scheme for reputation systems
Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of col...
متن کاملA Novel Protection Guaranteed, Quality of Transmission Aware Routing and Wavelength Assignment Algorithm for All-optical Networks
Transparent All Optical Networks carry huge traffic and any link failure can cause the loss of gigabits of data; hence protection and its guarantee becomes necessary at the time of failure. Many protection schemes were presented in the literature, but none of them speaks about protection guarantee. Also, in all optical networks, due to absence of regeneration capabilities, the physical layer i...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010