Secure Optical Internet: A Novel Attack Prevention Mechanism for an OBS node in TCP/OBS Networks

Similar documents
Threats in Optical Burst Switched Network

International Journal of Research in Computer and Communication Technology, Vol 2, Issue 2, Feb-2013

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic

Performance Analysis of Optical Burst Switching (OBS) Network

Enhancing Fairness in OBS Networks

Delayed Reservation and Differential Service For Multimedia Traffic In Optical Burst Switched Networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Comparison of Different Burst Switching Techniques for High Speed Network

Adaptive Data Burst Assembly in OBS Networks

Generalized Burst Assembly and Scheduling Techniques for QoS Support in Optical Burst-Switched Networks

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS

Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks

EVALUATING THE PERFORMANCE OF TCP-RENO, TCP- NEWRENO AND TCP-VEGAS ON AN OBS NETWORK

Working Analysis of TCP/IP with Optical Burst Switching Networks (OBS)

OPTICAL BURST SWITCHING ISSUES AND ITS FEATURES

Performance Analysis of Scheduling Algorithms In Optical Burst Switching Networks

Delayed reservation decision in optical burst switching networks with optical buffers

Optical Burst Switching (OBS): The Dawn of A New Era in Optical Networking

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Retransmission schemes for Optical Burst Switching over star networks

A Novel Approach to Reduce Packet Loss in OBS Networks

Study of Different Burst Scheduling Algorithms Using FDLs as QoS in Wavelength Division Multiplexing OBS Networks

TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS

IMPLEMENTATION OF OPTICAL BURST SWITCHING FRAMEWORK IN PTOLEMY SIMULATOR

Effect of Link Bandwidth, Number of Channels and Traffic Load on Designing Optical Burst Switching Networks

Absolute QoS Differentiation in Optical Burst-Switched Networks

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

Hybrid Optical Switching Network and Power Consumption in Optical Networks

MULTICAST CONNECTION CAPACITY OF WDM SWITCHING NETWORKS WITHOUT WAVELENGTH CONVERSION

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

An OMNeT++ Model for the Evaluation of OBS Routing Strategies

End-To-End Signaling and Routing for Optical IP Networks

Design of Optical Burst Switches based on Dual Shuffle-exchange Network and Deflection Routing

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network

Ultra-Low Latency, Bit-Parallel Message Exchange in Optical Packet Switched Interconnection Networks

Synchronous Stream Optical Burst Switching

Pre-Deflection Routing with Blocking Probability Estimation Scheme in Optical Burst Switch Networks

TM ALGORITHM TO IMPROVE PERFORMANCE OF OPTICAL BURST SWITCHING (OBS) NETWORKS

Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Content Aware Burst Assembly Supporting Telesurgery and Telemedicine in Optical Burst Switching Networks *

New Approaches to Optical Packet Switching in Carrier Networks. Thomas C. McDermott Chiaro Networks Richardson, Texas

An OMNeT++ Model for the Evaluation of OBS Routing Strategies

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

REDUCTION OF BLOCKING PROBABILITY IN SHARED PROTECTED OPTICAL NETWORK

Optical Packet Switching

Performance evaluation of TCP-Reno, TCP- N ewreno and TCP-Westwood on Burstification in an OBS Network

Routing Protocols in MANET: Comparative Study

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

SIMULATION ISSUES OF OPTICAL PACKET SWITCHING RING NETWORKS

Research on Control Routing Technology in Communication Network

under grant CNS This work was supported in part by the National Science Foundation (NSF)

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Architectures and Performance of AWG-Based Optical Switching Nodes for IP Networks

Internet Engineering Task Force (IETF) Request for Comments: November 2015

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

Optical networking technology

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Multi Protocol Label Switching

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

IPv4 to IPv6 Network Migration and Coexistence

Design and Implementation of GMPLS-basd Optical Slot Switching Network with PLZT High-speed Optical Switch

Performance Comparison and Analysis of DSDV and AODV for MANET

MPLS Multi-Protocol Label Switching

Performance Analysis of the Signaling Channels of OBS Switches

Simulation of All Optical Networks

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Security improvement in IOT based on Software

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

Bridging and Switching Basics

IMPACT OF BURSTIFICATION TIME OUT ON THE PERFORMANCE OF DELAY-BASED TCP VARIANTS OVER OBS NETWORKS

Core Networks Evolution

A New Approach of Forward Error Correction For Packet Loss Recovery

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Unequal Load Balance Routing for OBS Networks Based on Optical Parameters Dependent Metric

Splitter Placement in All-Optical WDM Networks

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

PROVIDING SERVICE DIFFERENTIATION IN OBS NETWORKS THROUGH PROBABILISTIC PREEMPTION. YANG LIHONG (B.ENG(Hons.), NTU)

A Layered Architecture for Supporting Optical Burst Switching

Class-based Traffic Aggregation In Optical Packet Switched WDM Networks

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

CURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela

OPTICAL BURST SWITCHING PROTOCOLS IN ALL-OPTICAL NETWORKS

Design of an Agile All-Photonic Network (AAPN)

OPTICAL burst switching [1], [2] is a promising solution

Introduction To Optical Networks Optical Networks: A Practical Perspective

UNIT- 2 Physical Layer and Overview of PL Switching

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges

Constraint-Based Loose Explicit Routing and Signaling for Inter- Domain Lightpath Provisioning in Wavelength Routed Optical Network

BURST SEGMENTATION: A NEW APPROACH TO REDUCE PACKET LOSS IN OPTICAL BURST SWITCHED NETWORKS. Vinod M. Vokkarane, B.E. in CS

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

Burst Assembly Techniques in Optical Burst Switching (OBS)

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Transcription:

Secure Optical Internet: A Novel Attack Prevention Mechanism for an node in TCP/ Networks K. Muthuraj Computer science and Engineering Department Pondicherry Engineering College Puducherry, India N. Sreenath Computer science and Engineering Department Pondicherry Engineering College Puducherry, India Abstract Optical Internet has become a strong development and its commercial use is growing rapidly. Due to transparency and virtual sharing infrastructure, they provide ultra-fast data rates with the help of optical burst switching technology, which transmits data in the form of bursts. From the security perspective, one of the nodes in the optical network is compromised, causes the vulnerability. This paper is dealt to identify the vulnerabilities and named as burst hijacking attack and provide the prevention mechanism for the same. The NSFnet 14 nodes and the ns2 simulator with modified n patch is used to simulate and verify the security parameters. Keywords-optical internet security; burst hijacking attack; threats and vulnerabilities in TCP/ networks. can provide a cost effective means of interconnecting heterogeneous networks regardless of lower-level protocols used in optical internet [9-11]. For example, an network is able to transport 10 GB/s Ethernet traffic between two subnetworks without the need to interpret lower level protocols, or to make two geographically distant wireless networks to act as an integrated whole without protocol translations. The illustration of optical burst switching networks in the optical internet as shown in below Fig.1. TABLE I. SCOPE OF SWITCHING TECHNOLOGY Technique Bandwidth Latency Buffer Overhead Adaptive OCS Low High - Low Low OPS High Low Yes High High High Low - Low High I. INTRODUCTION The benefits of optical internet have been known for quite awhile; but it was not until the invention of wavelength division multiplexing (WDM) that the potential of fiber was fully realized [1]. This divides the available bandwidth of the fiber into a number of separate wavelength s and allows tens or hundreds of wavelength s to be transmitted over a single optical fiber at a rate of 10 Gb/s/ and beyond. This means that the data rate can reach 10 Tb/s in each individual fiber [2]. To carry IP traffic over WDM networks three switching technologies exist namely optical circuit switching (OCS), optical packet switching (OPS) and optical burst switching ().Optical circuit switching, also known as lambda switching, can only switch at the wavelength level, and is not suitable for bursty internet traffic [3-5]. Optical packet switching, which can switch at the packet level with a fine granularity, is not practical in the foreseeable future. The two main obstacles are lack of random access optical buffers, and optical synchronization of the packet header and payload. Optical burst switching can provide fine granularity than optical circuit switching, and does not encounter the technical obstacles that optical packet switching faces. is considered the most promising form of optical switching technology, which combines the advantages and avoids the shortcomings of OCS and OPS as tabulated in Table1 [6-8]. Figure 1. Illustration of optical burst switching network In networks, there is a strong separation between the control and data planes, which allows for great network manageability and flexibility. In addition, its dynamic nature leads to high network adaptability and scalability, which makes it quite suitable for transmission of bursty traffic. Unfortunately, networks suffer from security vulnerabilities. Since every data burst is pass through the intermediate routers. If one of the intermediate routers is compromised, it causes security issues and denial of services [12-15]. The remainder of this paper is organized as follows. The architecture of and about in-band and out-of-band signaling with its functional diagram is described in Section II. The Section III explains the TCP over networks in Optical Internet. The Section IV demonstrates the main objective of this paper that is the identification of the attack on node in TCP/ networks in Optical Internet as named as Burst hijacking attack. Section V depicts the attack 76 P a g e

prevention mechanism for the same. The simulation results are shown in section VI. Finally we conclude and notify the future work in Section VII. II. OPTICAL BURST SWITCHING ARCHITECTURE The Offset time is the transmission time gap between the and, which is used to allow the control part in intermediate core nodes to reserve the required resources for the onward transmission of bursts. Input Traffic Burst Assembly Routing Edge Scheduling Ingress Edge Signaling Scheduling Contention Resolution Core Burst Disassembly Packet Forwarding Egress Edge Figure 2. Architecture of optical burst switching The pictorial representation of architecture is shown in the above Fig. 2. In general, network is composed of two types of routers, namely edge routers and core routers. Edge routers represent the electronic transit point between the burst-switched backbone and IP routers in an Optical Internet. The assembling of bursts from IP packets and disassembling of burst into IP packets is carried out at these edge routers. Core routers are connected to either edge routers or core routers. It transfers the incoming optical data into an outgoing link in the optical form without conversion of electronic form. In, the basic switching entity is burst which contains the number of encapsulated packets. For every burst, there is a corresponding Burst Control Header () to establish a path from source to destination [16-18]. of a connection is sent prior to the transmission of Data Burst () with specific offset time on the same wavelength is termed as In band signaling shown in Fig. 3. Offset Time Figure 5. functional diagram The functional diagram is shown in Fig. 5. It describes the ingress node is responsible for burst assembly, routing, wavelength assignment and scheduling of burst at the edge node. The core node is responsible for signaling and contention resolution. The egress edge node is responsible for disassembling the burst and forwarding the packets to the higher network layer [19-21]. III. TCP OVER NETWORK In a TCP/IP network, IP layer is involved in routing of packets, congestion control and addressing the nodes. When is introduced in the network, it takes care of routing of data and congestion control. The routing information computed by IP layer need not be considered by routers. It is because, the routes at the are computed based on number of hops and wavelength availability. However, the addressing of the various nodes in the network is not taken care by by default. Hence the functionality of IP may be limited to addressing and packet formation. Due to above reasons, this proposal consider the stack TCP/ rather than TCP/IP/. This is shown in Fig. 6. Application Application Communication Transport Transport Figure 3. In band signaling All s of various connections are sent on the same control and their corresponding s will sent on the different s with specific offset time named as out of band signaling is shown in Fig. 4. Offset Time Figure 4. Out of band signaling Control Data Data Source Figure 6. TCP/ Layer Architecture IV. Router BURST HIJACKING ATTACK Destination In Optical Internet, an optical virtual source node is inevitable for multicast routing, which is an optical node holds both wavelength splitting capability and wavelength conversion capability. It can transmit an incoming burst to multiple destinations on any wavelength. If it is compromised, 77 P a g e

a new type of attack is possible named as burst hijacking attack. During the data transmission, Burst Control Header () is converted from an optical form to electronic form and is processed at every intermediate core node. The core node is to receive the and setup the path for the corresponding Data Burst () and forward to the next intermediate optical node until it reaches the egress node. If a compromised optical virtual source node receives, it can maliciously create a copy of original and modifies its value to setup a path to a malicious destination then the corresponding will travel into the original destination as well as the malicious destination as shown in Fig. 7. The malicious destination will not send the acknowledgment for this hijacked burst and it escapes from being caught. Thus it compromises the authentication of data burst and also denial of service. This threat can be detected and named as Burst hijacking attack. TCP Source Attacker Address TCP Packet Ingress Compromised Core Core Figure 7. Burst hijacking attack Ingress TCP Destination The provisioning of security has two aspects, attack detection and attack prevention. In attack detection the intermediate optical nodes are being monitored using trusted optical nodes. These trusted optical nodes use the statistical report to identify the malicious nodes. When an intermediate core router gets, it collects the statistical information like burst id, source, destination, number of packets present inside the burst and the size of the burst. If the buffer is not present in the particular intermediate node then the collected statistical information is sent immediately to the trusted optical node. If it has buffers then it stores the statistical information and starts a timer. Once the timer gets expired or the buffer gets full, it sends the statistical information to the trusted optical node. The collected statistical information is stored in the buffer table of the trusted optical node based on the burst id. The statistical information is observed for some predetermined number of seconds and it should be analyzed and determines whether the node is behaving maliciously or not. In Burst hijacking attack, a new connection established between the compromised intermediate virtual source node and destination node. Just to escape from being caught, the intelligent compromised virtual source node changes the burst id every time and creates a new connection between the intermediate core node and destination. In this case, the trusted optical node should check the burst size, number of packets inside the burst and detects the malicious optical node. V. ATTACK PREVENTION MECHANISM recv (struct * PACKET packet) Determine nodetype from packet. if ((nodetype = intermediate core node ) OR (nodetype = egress node )) a) Extract burst id, source, destination, num_of_packets, burst_size from the packet. b) Create a new packet and store the extracted information inside the new packet. c) Send the new packet to the trusted node else if (nodetype == trusted_node ) a) Extract statistics from packet. b) Insert the statistics into the linked list based on burst id. c) Collect some more statistics. d) Now extract the source, destination and burst id from the linked list head. e) For burst hijacking attack, verify a new connection is established in virtual source node and burst_id or statistics matches with the original source and destination. f) If the node s trust value reaches below threshold, inform other nodes. VI. SIMULATION RESESULTS Figure 8. NSFNet topology with nodes 0 to 13 Topology : NSFNet Number of Optical s : 14 78 P a g e

Number of Electronic s : 28 Number of TCP/IP Connection : 10 Max. Number of attacker nodes : 03 Max. Number of packets : 200 Max Lambda : 20 Link Speed : 1GB Switch Time : 0.000005 The simulations are done using n, an ns2 based network simulator. NSFNet topology is used to demonstrate the effect of the flooding attack as shown in Fig. 8. s 0 to 13 represent the optical nodes and 14 to 41 represent the electronic nodes. The optical network is modeled with 1Gbps bandwidth and 10ms propagation delay. The TCP/IP links have 155 Mbps bandwidth each with 1 ms link propagation delay. In the beginning let us assume that there are no compromised nodes in the network. In that case, number of bursts sent by the ingress edge node is almost equal to number of bursts received by the egress edge node as shown in Fig. 9. Indicates that the number of bursts that are hijacked at that particular interval of time. Figure 11. Effect of burst hijacking attack when the number of compromised node is 3. Figure 9. Number of bursts sent/received without any attacker nodes. Figure 12. After implementing the solution to burst hijacking attack (number of compromised node = 1) Figure 10. Effect of burst hijacking attack when the number of compromised node is 1. Figure 13. After implementing the solution to burst hijacking attack (number of compromised node = 3) 79 P a g e

If the number of compromised nodes is 1 and 3 then the amount of hijacked bursts is also increased as shown in Fig. 10 and Fig. 11. And the Fig 12 and Fig. 13 shows the simulation results after implementing the solution for burst hijacking attack. Even though some bursts are hijacked initially, it is detected by the trusted nodes based on statistical information and an alternate trusted path is used for further communication. Thereby the burst hijacking attack is removed. VII. CONCLUSION AND FUTURE WORK TCP/ networks are the future networks and optical burst switching will turn as the most broadly used technology in the mere future due to its speed and as it provides an end to end optical path among the communicating parties. Since optical burst switching has typical features, it is quite natural to suffer from the security attacks. In this paper, identified the new-fangled type of attack and named as Burst Hijacking Attack. From the statistical approach, its countermeasures are discussed from the normal scenario, attack scenario and attack removal scenario separately using ns2 simulator with the modified n patch. In the future when the optical burst switching is employed in everywhere then some more security attacks will arise. Future research in this area will help us to identify and remove other possible attack in TCP/ networks and make optical burst switching technique a superior one for optical internet. ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the Editor in Chief for their valuable comments that have helped us to improve the manuscript. REFERENCES [1] B. Mukherjee, WDM Optical Communication Networks: Progress and Challenges, IEEE Journal on Selected Areas in Communications, pp.1810-1823, October 2000. [2] C. Qiao and M. Yoo, Optical Burst Switching () - a New Paradigm for an Optical Internet, Journal of High Speed Networks, pp.69-84, January 1999. [3] S. Verma, H. Chaskar, and R. Ravikanth, Optical Burst Switching: A Viable Solution for Terabit IP Backbone, IEEE Network, pp. 48-53, November/December 2000. [4] S. Yoo, S. J. B. Yoo, and B.Mukherjee, All-Optical Packet Switching for Metropolitan Area Networks: Opportunities and Challenges, IEEE Communications Magazine, vol. 39, pp. 142-148, March 2001. [5] X. Cao, J. Li, Y. Chen, and C. Qiao, Assembling TCP/IP Packets in Optical Burst Switched Networks., Proceeding of IEEE Globecom, December 2002. [6] Guray Gurel and Ezhan Karasan, Effect of Number of Burst Assemblies on TCP Performance in Optical Burst Switching Networks, Proceedings of the IEEE BROADNETS, October 2006. [7] M. Yoo and C. Qiao, A Novel Switching Paradigm for Buffer-Less WDM Networks, Optical Fiber Communication Conference (OFC), pp. 177-179, February 1999. [8] J. P. Jue and V. M Vokkarane, Optical Burst Switching, Springer [9] Science, 2005. [10] M. Yoo and C. Qiao, Choices, Features and Issues in Optical Burst Switching (), Optical Networking Magazine, vol. 1, pp. 36-44, April 1999. [11] C. Siva Ram Murthy and Mohan Gurusamy, WDM Optical Networks: Concepts, Design and Algorithms, Prentice Hall PTR, November 2001. [12] Pushpendra Kumar Chandra, Ashok Kumar Turuk, and Bibhudatta Sahoo, Survey on Optical Burst Switching in WDM Networks, Proceding of IEEE communications magazine, December 2009. [13] Malathi Veeraraghavan and Tao Li, Signaling Transport Options in GMPLS Networks: In-band or Out-of-band, International Conference on Computer Communications and Networks, pp. 503-509, August, 2007. [14] Yuhua Chen and Pramode K. Verma, Secure Optical Burst Switching: Framework and Research Directions, IEEE Communication Magazine, pp. 40-45, August 2008. [15] Yuhua Chen, Pramode K. Verma, and Subhash Kak, Embedded Security Framework for Integrated Classical and Quantum Cryptography Services in Optical Burst Switching Networks, Security and Communication Networks, vol. 2, no. 6, pp. 546-554, November- December 2009. [16] N. Sreenath, G. Mohan and C. Siva Ram Murthy, Virtual Source Based Multicast Routing in WDM Optical Networks, IEEE International Conference on Networks (ICON 2000), pp. 385-389, Singapore, September 2000. [17] [16] Guray Gurel, Onur Alparslan and Ezhan Karasan, n: an ns2 based simulation tool for performance evaluation of TCP traffic in networks, Annals of Telecommunications, vol. 62, no. 5-6, pp. 618-632, May-June 2007. [18] J. Turner, Terabit Burst Switching, Journal of High Speed Networks, vol.8, pp. 3-16, January 1999. [19] Turuk, A. K., Kumar, R., A Novel Scheme to Reduce Burst-Loss and Provide QoS in Optical Burst switching Network, In proceeding of HiPC-2004, pp. 19-22, 2004. [20] [19] Dolzer. K., Gauger C., Spath J., and Bodamer S., Evaluation of reservation mechanisms for optical burst switching, AEU International Journal of Electronics and Communications, vol. 55, no. 1, pp. 18-26 April 2001. [21] Siva Subramanian, P., Muthuraj K., Threats in Optical Burst Switched Network. Int. J.Comp. Tech. Appl., vol. 2, no. 3, pp. 510-514, July 2011. [22] N. Sreenath, K. Muthuraj, and P. Sivasubramanian, Secure Optical Internet:Attack Detection and Prevention Mechanism, International Conference on Computing, Electronics and Electrical Technologies, 2012. AUTHORS PROFILE K. Muthuraj is a Research Scholar and pursuing a Doctoral Degree in Computer science and Engineering at the Department of Computer science and Engineering at Pondicherry Engineering College, Pillaichavady, Puducherry 605014, India. He received his B.E in Computer science and Engineering (2000) from Madurai Kamaraj University, Madurai, Tamilnadu, India. He received his M.E in Computer science and Engineering (2008) from Anna University, Chennai, Tamilnadu. His research areas are high speed networks and Optical Internet.. Dr. N. Sreenath is a professor and Head of the Department of Computer science and Engineering at Pondicherry Engineering College, Pillaichavady, Puducherry 605014, India. He received his B.Tech in Electronics and Communication Engineering (1987) from JNTU College of Engineering, Ananthapur 515002, Andra Pradesh, India. He received his M.Tech in Computer science and Engineering (1990) from University of Hyderabad, India. He received his Ph.D in Computer science and Engineering (2003) from IIT Madras. His research areas are high speed networks and Optical networks. 80 P a g e