Share Email Print

Proceedings Paper

Techniques to maintain functionality during degraded performance
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In technology the notion of beyond state-of-the-art often begins when a paradigm is shifted. In this paper the authors present their work which has fundamentally enabled an enterprise to insure operational viability under the very real cyber facts: "we are under constant attack, it is a hostile space and we can control the point of contact." That point of contact is the optical bit stream which is currently beyond the scope of the standard cyber toolset. EverisTM, in working with our customers, has developed the tools to capture, view, analyze, and control the correlative (interdependent network, metadata, data and users) information as it traverses the core, regional, and global fiber optic networks. This capability to visualize below the operational picture afforded by current network intrusion detection systems can be combined with real-time intervention at the network core yielding prioritization, identification, and authentication of authentication. This directly translates into sophisticated end user interaction across the interdependencies often viewed as the "cloud". Everis has demonstrated unique applications based on this capability that includes mitigation of DDOS (Distributed Denial of Service), identification of "forged" IP (Internet Protocol) addresses, malicious executable destruction, WAN (Wide Area Network) IPS (Intrusion Prevention System) and connectionless routing vs. connection based switching.

Paper Details

Date Published: 16 April 2010
PDF: 9 pages
Proc. SPIE 7700, Enabling Photonics Technologies for Defense, Security, and Aerospace Applications VI, 770009 (16 April 2010); doi: 10.1117/12.854804
Show Author Affiliations
Joseph R. McCoy, Everis Inc. (United States)
Joshua S. White, Everis Inc. (United States)

Published in SPIE Proceedings Vol. 7700:
Enabling Photonics Technologies for Defense, Security, and Aerospace Applications VI
Michael J. Hayduk; Peter J. Delfyett Jr.; Andrew R. Pirich; Eric J. Donkor, Editor(s)

© SPIE. Terms of Use
Back to Top