49 research outputs found

    Machine Learning for Cognitive Optical Network Security Management

    Get PDF
    This talk surveys the security threats pertinent to the optical network and outlines the progress and challenges in developing machine learning approaches for cognitive management of optical network security

    Introduction to the Photonic Networks and Devices (NETWORKS) Special Issue

    Get PDF
    This special issue comprises extended versions of some of the top-scored papers that were presented at the OSA Photonic Networks and Devices (NETWORKS) meeting that was part of the OSA Advanced Photonics Congress held in Burlingame, California, USA, July 29–August 1, 2019. Here, we highlight relevant topics from included papers relating to photonic communication network development

    Enhancing optical network security with machine learning

    Get PDF
    As critical communication infrastructure, optical networks have a vital role in safe and dependable transmission of massive amounts of data, supporting essential societal services. However, these networks are inherently vulnerable to a multitude of deliberate, man-made attacks targeting service disruption at the physical layer. Physical-layer attack techniques can range in their scope and effects, level of sophistication, locality, detectability, etc. An example of a relatively unsophisticated attack method is a deliberate fiber cut, typically targeting critical network elements (e.g., links with the highest betweenness) and resulting in straightforward transmission interruption [1]. More refined attack techniques rely on the insertion of harmful signal (e.g. in- and out-of-band jamming) [2], or on external tampering with the fiber to degrade the transmission quality (e.g., polarization scrambling via fiber squeezing) [3]. Diverse attack techniques cause different effects, which complicates their detectability. For example, some attacks add unfilterable noise, some reduce the power of the affected optical channels, while some inflict changes in the state of polarization too quick for the coherent receiver to compensate [3]. Therefore, monitoring only the spectrum [4], or individual signal parameters such as the power, optical signal-to-noise ratio (OSNR), or presence of errors may result in inaccurate diagnostics and root cause attribution. This obstacle in quick recovery of affected services is further pronounced for newly emerging attack techniques whose effects may deviate from the attack signatures previously known to the network management system [5].The complexity of the evolving physical-layer security landscape and the intricate interplay of different optical performance monitoring (OPM) parameters in the presence of diverse attack methods can greatly benefit from the application of machine learning techniques capable of deep data analysis. In this talk, we present how different data analytics and machine learning approaches can be applied to interpret the OPM data reported from the commercially available coherent receivers to identify anomalous operation and trigger security threat warnings. The analytical techniques are applied to experimental data obtained from an operator\u27s metropolitan testbed subjected to in- and out-of-band jamming, and external polarization scrambling attacks. We begin with an analysis of the optical signal degradation caused by the different attack methods. We then investigate the application of several supervised learning approaches that, once trained on the experimental data, can detect the presence of an attack and identify its type and intensity. The accuracy of several classifiers is scrutinized, along with the relevance of OPM parameters reported by the coherent receivers and the impact of missing features. To gain insight into the potential of the network to detect emerging, previously unseen attack techniques, we further analyse the performance of unsupervised learning techniques that detect the anomalies in signal parameters introduced by attacks. The presented findings help achieve timely and accurate detection of physical-layer attacks and serve as a prerequisite for fast and effective attack response and network recovery

    Machine Learning for Optical Network Security Management

    Get PDF
    We discuss the role of supervised, unsupervised and semi-supervised learning techniques in identification of optical network security breaches. The applicability, performance and challenges related to practical deployment of these techniques are examined

    Optical Network Security Management: Requirements, Architecture and Efficient Machine Learning Models for Detection of Evolving Threats [Invited]

    Get PDF
    As the communication infrastructure that sustains critical societal services, optical networks need to function in a secure and agile way. Thus, cognitive and automated security management functionalities are needed, fueled by the proliferating machine learning (ML) techniques and compatible with common network control entities and procedures. Automated management of optical network security requires advancements both in terms of performance and efficiency of ML approaches for security diagnostics, as well as novel management architectures and functionalities. This paper tackles these challenges by proposing a novel functional block called Security Operation Center (SOC), describing its architecture, specifying key requirements on the supported functionalities and providing guidelines on its integration with optical layer controller. Moreover, to boost efficiency of ML-based security diagnostic techniques when processing high-dimensional optical performance monitoring data in the presence of previously unseen physical-layer attacks, we combine unsupervised and semi-supervised learning techniques with three different dimensionality reduction methods and analyze the resulting performance and trade-offs between ML accuracy and run time complexity

    Design of Programmable Filterless Optical Networks

    Get PDF
    We present the main operating principles and guidelines for the design of programmable filterless networks

    Privacy-Preserving Wireless Federated Learning Exploiting Inherent Hardware Impairments

    Get PDF
    We consider a wireless federated learning system where multiple data holder edge devices collaborate to train a global model via sharing their parameter updates with an honest-but-curious parameter server. We demonstrate that the inherent hardware-induced distortion perturbing the model updates of the edge devices can be exploited as a privacy-preserving mechanism. In particular, we model the distortion as power-dependent additive Gaussian noise and present a power allocation strategy that provides privacy guarantees within the framework of differential privacy. We conduct numerical experiments to evaluate the performance of the proposed power allocation scheme under different levels of hardware impairments

    Guest Editorial Photonic Networks and Devices

    Get PDF

    Root Cause Analysis for Autonomous Optical Networks: A Physical Layer Security Use Case

    Get PDF
    To support secure and reliable operation of optical networks, we propose a framework for autonomous anomaly detection, root cause analysis and visualization of the anomaly impact on optical signal parameters.\ua0Verification on experimental physical layer security data reveals important properties of different attack profiles

    Autonomous Security Management in Optical Networks

    Get PDF
    The paper describes the Optical Security Manager module and focuses on the role of Machine Learning (ML) techniques. Issues related to the accuracy, run-time complexity and interpretability of ML outputs are described and coping strategies outlined
    corecore