Physical Layer Attacks

Download Report

Transcript Physical Layer Attacks

Lecture: 6 Network Survivability and Robustness
Ajmal Muhammad, Robert Forchheimer
Information Coding Group
ISY Department
Outline


Introduction to Network Survivability
Protection Techniques Classification





Physical Layer Attacks
Optical Network Component Vulnerabilities


Link failure, equipment failure
Path protection, link protection
Dedicated resources, shared resources
Fibers, switches, amplifiers
Protection and Prevention of Attacks
Network Survivability
A very important aspect of modern networks



Optical fibers with extremely large capacity has becomes dominant
transport medium.
Interruption for even short period of time may have disastrous
consequences.
No service provider is willing to accept unprotected networks anymore.
Restoration = function of rerouting failed connections
Survivability = property of a network to be resilient to failure
Requires physical redundancy and restoration protocols.
Optics in the Internet
Data
Center
SONET
SONET
DWD
M
DWD
M
SONET
SONET
Access
Metro
Long Haul
Metro
Access
Protection and Restoration in Internet
A well defined set of restoration techniques already exists in
the upper electronic layers:



ATM/MPLS
IP
TCP
Restoration speeds in different layers:




BGP-4: 15 – 30 minutes
OSPF: 10 seconds to minutes
SONET: 50 milliseconds
Optical Mesh: currently hundred milliseconds to minutes
Why Optical Layer Protection?
Advantages:
 Speed
 Efficiency
Limitations
 Detection of all faults not possible (3R).
 Protects traffic in units of lightpaths.
 Race conditions when optical and client layer both try
to protect against same failure.
Protection Techniques Classification
Restoration techniques can protect the network against:


Link failures
 Fiber-cables cuts and link devices failures (amplifiers)
Equipment failures
 OXCs, OADMs, electro-optical interface
Protection can be implemented in:


Optical channel sub-layer (path protection)
Optical multiplex sub-layer (link protection)
Different protection techniques for:
 Ring networks
 Mesh networks
Protection in Ring Network
Unidirectional Path Switched Ring
1+1 Path Protection
Used in access rings for
traffic aggregation into
central office
Bidirectional Link Switched Ring
Bidirectional Link Switched Ring
1:1 Span and Link Protection 1:1 Link Protection
Used in metropolitan or longhaul rings
Used for inter-office
rings
Unidirectional Path Switched Ring (UPSR)
Signal sent on
both working and
protected path
Best quality
signal selected
Receiving Traffic
Sending Traffic
N2
N1
Outside Ring = Working
Inside Ring = Protection
N3
N4
N1 send data to N2
1+1 Protection




Traffic is sent over two parallel paths, and the
destination selects a better one.
In case of failure, the destination switch onto
the other path.
Pros: simple for implementation and fast
restoration
Cons: waste of bandwidth
Bidirectional Link Switched Ring (2-Fiber
BLSRs)
Sending/Receiving
Traffic
N2
Sending/Receiving
Traffic
N1
Both Rings = Working & Protection
N3
N4
N1 send data to N2 & N2 replies to N1
1:1 Protection




During normal operation, no traffic or low priority traffic
is sent across the backup path.
In case failure both the source and destination switch
onto the protection path.
Pros: better network utilization.
Cons: required signaling overhead, slower restoration.
Protection in Mesh Networks
Network planning and survivability design
 Disjoint path idea: service working route and its backup
route are topologically diverse
 Lightpaths of a logical topology can withstand physical
link failures
Working Path
Backup Path
Reactive / Proactive
Reactive



A search is initiated to find a
new lightpath which does not
use the failed components
after the failure happens.
It can not guarantee
successful recovery,
Longer restoration time
Proactive


Taxonomy

Backup lightpaths are
identified and resources are
reserved at the time of
establishing the primary
lightpath itself.
100 percent restoration
Faster recovery
Path Protection
Dedicated Path Protection
•
•
•
Shared Path Protection
Backup resources are used for protection of multiple
links
Assume independent failure and handle single failure
The capacity reserved for protection is greatly reduced
Link and Channel Based Protection
Link-based Protection
Channel-based Protection
Path Protection / Link Protection
Normal Operation
Path Switching: restoration is
handled by the source and
the destination.
Link Switching: restoration is
Link Switching: restoration is
handled by the nodes adjacent to
handled by the nodes adjacent
the failure.
to the failure.
Span Protection: if additional fiber
Link Protection
is available.
Outline


Introduction to Network Survivability
Protection Techniques Classification





Physical Layer Attacks
Optical Network Component Vulnerabilities


Link failure, equipment failure
Path protection, link protection
Dedicated resources, shared resources
Fibers, switches, amplifiers
Protection and Prevention of Attacks
Physical Layer Attacks
Attack: Intentional action against the ideal and secure functioning
of the network
Attacks are much more hazardous than component failures as the
damage they cause is more difficult to prevent:
Attacks Classification
Service disruption: prevents communication or degrades the quality
of service (QoS)
 All connections and components appear to be functioning well in
the optical domain, but the electrical bit error rates (BERs) of the
legitimate channels are already impaired
Tapping: compromises privacy by providing unauthorized users access to
data, which can then be used for eavesdropping or traffic analyses
Component Vulnerabilities: Fibers
Bending the fiber violates the total internal reflection and causes
light to leak outside the fiber
Photodetector can pick up such leakage and
deliver the transmitted content to the intruder
Exploiting fiber nonlinearities: cross-phase modulation and Raman
effects may cause a signal on one wavelength to amplify or
attenuate a signal on another wavelength

Co-propagate a malicious signal on a fiber and decrease QoS or tap
legitimate signals
Commercial tapping devices introduce losses less than 0.5 dB and
some even below 0.1 dB
Optical Switches
Optical switches are prone to signal leakage, giving rise to crosstalk
Malicious users can take advantage of
this to cause service degradation and/or
perform eavesdropping
Inter-channel crosstalk: occurs between signals on adjacent
channels. Can be eliminated by using narrow pass-band receivers.
Intra-channel crosstalk: occurs among signals on the same
wavelengths, or signals whose wavelengths fall within each other’s
receiver pass-band.
Crosstalk levels of optical switches range from -35 dB (SOA, liquid
crystal, electro-optical, thermo-optical) to -55 dB for MEMS.
Examples
Tapping attack exploiting intra-channel crosstalk in an optical switch
If a tapper gains access to upper output port,
part of the signal at lambda 2 is delivered
straight into his hands
Jamming attack exploiting intra-channel crosstalk in an optical
switch
Attacker injects a high-powered signal on the same
Wavelength (in-band jamming) as other legitimate
data signals.
Components of the high-power signal will leak onto
adjacent channels, impairing the quality of the
transmission on those signals
Optical Amplifiers
Erbium-doped fiber amplifiers (EDFAs) are the most commonly used
amplifier in today’s WDM networks.
An optical amplifier is characterized by its gain, gain bandwidth, gain
saturation, polarization sensitivity and amplifier noise.
The distribution of excited electrons is not uniform
at various levels within a band
The gain of an EDFA depends on the wavelength of
the incoming signal with a peak around 1532 nm
Can be compensated by employing passive or dynamic
gain equalization
Gain Competition in EDFA
The limited number of available upper-state photons necessary for signal
amplification must be divided among all incoming signals.
Each of the signals is granted photons proportional to its power level, which
can lead to gain competition.
Stronger incoming signals receive more gain, while weaker signals receive
less
Gain competition can be exploited to create service disruption
A malicious user can inject a powerful signal on a wavelength different from
those of other legitimate signals (out-of-band jamming), but still within the
pass-band of the amplifier.
The stronger malicious signal will get more gain than weaker legitimate
signals, robbing them of power.
Qos level of the legitimate signals will deteriorate, potentially leading to
service denial.
Equip amplifiers with input and output power monitoring capability
Low Power QoS Attack
Optical splitter is attached at the head of link AB to attenuate the
propagation power by a certain amount (7 dB).
Link AB OSNR degradation for LP1 & LP3 exacerbate to 18.5 dB.
Attack is able to propagate by taking advantage of the OXC equalizations.
Equalizer in node B will attenuate LP2
to ensure the flat power spectrum on link
Make the network more
BC
sensitive to the abnormal
changes
The amplifier (with gain control of 15 dB)
are placed such that each can exactly
compensate the loss introduced by the
preceding fiber spans
75 km
Performance monitoring at
the amps & OXCs should
be aware of the real-time
LP configuration and vary
the alarming thresholds
accordingly
7 dB attenuation
Performance metrics of each channel measured at
different places of the network
Protection and Prevention of Attacks
Achieving complete protection requires large investments by the network
operator.
Hardware measures- shielding the fiber, additional equipment capable of
limiting excessive power (e.g., optical limiting amplifiers, variable optical
attenuators or optical fuses). Use components with lower crosstalk levels.
Transmission schemes- applying different modulation and
techniques, limiting the bandwidth and power of certain signals.
coding
Architecture and protocol design- identifying and avoiding risky links
or assigning different routes and wavelengths to separate trusted
from untrusted users.
Optical encryption- protect communication confidentiality by making
it incomprehensible to an eavesdropper.