2014 International Conference on Communication and Signal Processing 2014
DOI: 10.1109/iccsp.2014.6949804
|View full text |Cite
|
Sign up to set email alerts
|

Burstification threat in Optical Burst Switched Networks

Abstract: Optical Burst Switching, an efficient core networking architecture, suffers from various security vulnerabilities. This paper proposes the Burstification threat and summarizes other potential threats for optical nodes.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Security threats that OBS networks suffer from can be categorized into two groups: Orphan Bursts and Malicious Burst Headers [8]. An orphan burst occurs during transmission when the scheduling request for a BHP is rejected because of excessive demands and the corresponding data burst is not handled [9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Security threats that OBS networks suffer from can be categorized into two groups: Orphan Bursts and Malicious Burst Headers [8]. An orphan burst occurs during transmission when the scheduling request for a BHP is rejected because of excessive demands and the corresponding data burst is not handled [9].…”
Section: Introductionmentioning
confidence: 99%
“…As a consequence, by flowing along an unintended path it may waste the bandwidth or might be tapped by attackers. BHPs compromised by attackers may lead to forming malicious burst headers and can be used in different types of attacks including Burst Hijacking, Burst Control Header Flooding attack, Land attack, Timeout attack and Replay attack [8].…”
Section: Introductionmentioning
confidence: 99%