2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET) 2012
DOI: 10.1109/icceet.2012.6203922
|View full text |Cite
|
Sign up to set email alerts
|

Secure Optical Internet: Attack detection and prevention mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Sending the Burst Header Packet (BHP) prior the transmission of data packets with specific offset time exposes the data payload to different security challenges. The authors in [SMS12] discussed the burst hijacking attack where a source node can maliciously create a copy of the original BCH and modify its value to setup a path to a malicious destination. The data payload is forwarded to the original destination as well as the malicious destination.…”
Section: Optical Packet Switched Networkmentioning
confidence: 99%
“…Sending the Burst Header Packet (BHP) prior the transmission of data packets with specific offset time exposes the data payload to different security challenges. The authors in [SMS12] discussed the burst hijacking attack where a source node can maliciously create a copy of the original BCH and modify its value to setup a path to a malicious destination. The data payload is forwarded to the original destination as well as the malicious destination.…”
Section: Optical Packet Switched Networkmentioning
confidence: 99%
“…The time-out field is used for timer based assembly mechanism [9]. When this value is changed, bursts of shorter length are formed causing lot of unwanted mice flows in the network.…”
Section: Timeout Attackmentioning
confidence: 99%
“…The time-out field is used for timer based assembly mechanism [11]. When this value is changed, bursts of shorter length are formed causing lot of unwanted mice flows in the network.…”
Section: Vulnerabilities In Obs Networkmentioning
confidence: 99%