Paper
16 April 2010 Techniques to maintain functionality during degraded performance
Author Affiliations +
Abstract
In technology the notion of beyond state-of-the-art often begins when a paradigm is shifted. In this paper the authors present their work which has fundamentally enabled an enterprise to insure operational viability under the very real cyber facts: "we are under constant attack, it is a hostile space and we can control the point of contact." That point of contact is the optical bit stream which is currently beyond the scope of the standard cyber toolset. EverisTM, in working with our customers, has developed the tools to capture, view, analyze, and control the correlative (interdependent network, metadata, data and users) information as it traverses the core, regional, and global fiber optic networks. This capability to visualize below the operational picture afforded by current network intrusion detection systems can be combined with real-time intervention at the network core yielding prioritization, identification, and authentication of authentication. This directly translates into sophisticated end user interaction across the interdependencies often viewed as the "cloud". Everis has demonstrated unique applications based on this capability that includes mitigation of DDOS (Distributed Denial of Service), identification of "forged" IP (Internet Protocol) addresses, malicious executable destruction, WAN (Wide Area Network) IPS (Intrusion Prevention System) and connectionless routing vs. connection based switching.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Joseph R. McCoy and Joshua S. White "Techniques to maintain functionality during degraded performance", Proc. SPIE 7700, Enabling Photonics Technologies for Defense, Security, and Aerospace Applications VI, 770009 (16 April 2010); https://doi.org/10.1117/12.854804
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Internet

Defense and security

Network security

Optical networks

Clouds

Computer intrusion detection

Information security

RELATED CONTENT

Software-defined anti-DDoS: Is it the next step?
Proceedings of SPIE (October 01 2018)
Defense and security of a wireless tactical network
Proceedings of SPIE (August 28 2001)
Honeynets
Proceedings of SPIE (February 21 2001)

Back to Top