This paper focuses on theoretical methods for detecting intentional attacks upon the infrastructure of an all-optical network. Applications of existing methods used in traditional networks, as well as discussion of a new method for detecting attacks are presented. Advantages and limitations of both classes of methods are considered.
Muriel Médard, Douglas Marquis, Stephen R.