MIT Libraries logoDSpace@MIT

MIT
View Item 
  • DSpace@MIT Home
  • MIT Libraries
  • MIT Theses
  • Graduate Theses
  • View Item
  • DSpace@MIT Home
  • MIT Libraries
  • MIT Theses
  • Graduate Theses
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Comprehensive security strategy for all-optical networks

Author(s)
Feffer, Antonia Lynn
Thumbnail
DownloadFull printable version (10.28Mb)
Other Contributors
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.
Advisor
Vincent W.S. Chan.
Terms of use
M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582
Metadata
Show full item record
Abstract
Optical networking is a powerful means of communication in modem times of high bandwidth demands and high data speeds. While developments in optical networking continue to progress, however, the security implications they create have not yet caught up. In this thesis, we characterize a selection of damaging attacks against optical networks. By providing a detailed description of the attacks, we are also able to better understand their effects across the different layers of the network model. We also propose the current best practices for sensing and detection of these attacks when they occur, as well as mitigation techniques to limit the damage they incur. The attacks are not fully eliminated, however, and so we also identify remaining vulnerabilities these attacks can exploit. After characterizing the attacks, we propose a method for diagnosing attacks as they occur within a network given the analysis we have conducted. We also propose an algorithm for diagnosing attacks, as well as a monitoring system framework that relies on the establishment of autonomous zones of the network in order to efficiently limit damage and quarantine problem areas from the rest of the healthy network. This framework can be applied to a wide variety of network set-ups and topologies, with the ability to customize it to fit the needs of the system.
Description
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.
 
Cataloged from PDF version of thesis.
 
Includes bibliographical references (pages 107-109).
 
Date issued
2015
URI
http://hdl.handle.net/1721.1/99866
Department
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Publisher
Massachusetts Institute of Technology
Keywords
Electrical Engineering and Computer Science.

Collections
  • Graduate Theses

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries
PrivacyPermissionsAccessibilityContact us
MIT
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.