2020
DOI: 10.1109/jlt.2020.2987032
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Optical Network Security Monitoring: A Practical Perspective

Abstract: In order to accomplish cost-efficient management of complex optical communication networks, operators are seeking automation of network diagnosis and management by means of Machine Learning (ML). To support these objectives, new functions are needed to enable cognitive, autonomous management of optical network security. This paper focuses on the challenges related to the performance of ML-based approaches for detection and localization of optical-layer attacks, and to their integration with standard Network Ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
46
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 41 publications
(46 citation statements)
references
References 38 publications
0
46
0
Order By: Relevance
“…A polarization scrambling attack, in which the fiber is squeezed at a high frequency to cause fast-varying changes in the channel polarization state, can cause error bursts without affecting the channel power levels or OSNR. Encompassing experimental studies of physical-layer attacks at the optical link-and network level were performed in [13] and [14], respectively. Due to the complex interplay among different OPM parameters and the absence of models capable of capturing these effects or even consistent observable trends in OPM parameter values for different attack regimes, it is not possible to rely on a threshold-based approach for detection and identification of physical-layer attacks.…”
Section: Machine Learning For Security Monitoring Automationmentioning
confidence: 99%
See 2 more Smart Citations
“…A polarization scrambling attack, in which the fiber is squeezed at a high frequency to cause fast-varying changes in the channel polarization state, can cause error bursts without affecting the channel power levels or OSNR. Encompassing experimental studies of physical-layer attacks at the optical link-and network level were performed in [13] and [14], respectively. Due to the complex interplay among different OPM parameters and the absence of models capable of capturing these effects or even consistent observable trends in OPM parameter values for different attack regimes, it is not possible to rely on a threshold-based approach for detection and identification of physical-layer attacks.…”
Section: Machine Learning For Security Monitoring Automationmentioning
confidence: 99%
“…Due to their ability to process massive amounts of data and identify intricate patterns among a great number of performance indicators without the need to explicitly specify models or parameter thresholds, machine learning (ML) techniques are highly suitable for optical layer security diagnostics. ML has been applied to the detection of unauthorized signal presence by scrutinizing the received optical spectrum [16], and to the detection and identification of in-, out-of-band jamming and polarization scrambling [13,14], demonstrating strong potential to perform these functions in runtime environments. Despite this huge potential, carrier-grade deployment of ML techniques is still in its infancy and many challenges need to be overcome before achieving cognitive and autonomous optical network security management.…”
Section: Machine Learning For Security Monitoring Automationmentioning
confidence: 99%
See 1 more Smart Citation
“…Optical Performance Monitoring (OPM) and the detection of anomalies (e.g., caused by physical layer intrusions or device degradation) are key tasks during optical network operation. The detection of anomalies is particularly challenging to be performed by humans or analytical models, and Machine Learning (ML) models for anomaly detection have shown promising performance [2], [3] . However, ML-based anomaly detection (enabled mainly by semi-or unsupervised learning) typically only detects the anomaly, without determining its causes.…”
Section: Introductionmentioning
confidence: 99%
“…The RCA module uses the information provided by an anomaly detection module based on unsupervised ML to compute the changes in the OPM parameters incurred by the anomaly. The framework is validated on a physical layer security use case, using experimental data obtained by inserting harmful jamming sig- nals and fiber squeezing for external polarization modulation [3] . While these attacks can cause severe service disruption, no exact theoretical models for their effects are known to date, which hinders their detection and counteraction.…”
Section: Introductionmentioning
confidence: 99%