11.2. Crosstalk Attack Features and Monitoring Techniques
Among the attack methods listed previously, the crosstalk attack has the highest damage capabilities. In this case, an attacker injects a malicious signal with a very high power, far beyond the expected value. When this connection passes through a wavelength selective switch, the leakage energy (crosstalk) of this malicious connection significantly affects the normal connections passing through the same switch. Unlike other attacks, a crosstalk attack not only affects those connections that are sharing the same link or node with it, but also may induce attack capabilities to those connections that are attacked [3, 16–19] as explained below. We first describe the characteristics of crosstalk ...
Get Information Assurance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.