Machine Learning for Optical Network Security Monitoring: A Practical Perspective

被引:32
|
作者
Furdek, Marija [1 ]
Natalino, Carlos [1 ]
Lipp, Fabian [2 ]
Hock, David [2 ]
Di Giglio, Andrea [3 ]
Schiano, Marco [3 ]
机构
[1] Chalmers Univ Technol, Dept Elect Engn, S-41296 Gothenburg, Sweden
[2] Infosim GmbH & Co KG, D-97074 Wurzburg, Germany
[3] Telecom Italia, I-10121 Turin, Italy
关键词
Optical fiber networks; Security; Monitoring; Adaptive optics; Training; Jamming; Telemetry; Attack detection; machine learning; monitoring; optical network security; EFFICIENT;
D O I
10.1109/JLT.2020.2987032
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to accomplish cost-efficient management of complex optical communication networks, operators are seeking automation of network diagnosis and management by means of Machine Learning (ML). To support these objectives, new functions are needed to enable cognitive, autonomous management of optical network security. This article focuses on the challenges related to the performance of ML-based approaches for detection and localization of optical-layer attacks, and to their integration with standard Network Management Systems (NMSs). We propose a framework for cognitive security diagnostics that comprises an attack detection module with Supervised Learning (SL), Semi-Supervised Learning (SSL), and Unsupervised Learning (UL) approaches, and an attack localization module that deduces the location of a harmful connection and/or a breached link. The influence of false positives and false negatives is addressed by a newly proposed Window-based Attack Detection (WAD) approach. We provide practical implementation guidelines for the integration of the framework into the NMS and evaluate its performance in an experimental network testbed subjected to attacks, resulting with the largest optical-layer security experimental dataset reported to date.
引用
收藏
页码:2860 / 2871
页数:12
相关论文
共 50 条
  • [21] A Semantic Machine Learning Approach for Cyber Security Monitoring
    Goyal, Yogita
    Sharma, Anand
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 439 - 442
  • [22] Machine Learning Security: Threats, Countermeasures, and Evaluations
    Xue, Mingfu
    Yuan, Chengxiang
    Wu, Heyi
    Zhang, Yushu
    Liu, Weiqiang
    IEEE ACCESS, 2020, 8 : 74720 - 74742
  • [23] Machine Learning Security in Industry: A Quantitative Survey
    Grosse, Kathrin
    Bieringer, Lukas
    Besold, Tarek R.
    Biggio, Battista
    Krombholz, Katharina
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1749 - 1762
  • [24] Data Auditing for Intelligent Network Security Monitoring
    Hong, SeukGue
    Seo, HyungBin
    Yoon, MyungKeun
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (03) : 74 - 79
  • [25] Fault monitoring in passive optical network through the integration of machine learning and fiber sensors
    Usman, Auwalu
    Zulkifli, Nadiatulhuda
    Salim, Mohd Rashidi
    Khairi, Kharina
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (09)
  • [26] A real-time machine learning application for browser extension security monitoring
    Fowdur, Tulsi Pawan
    Hosenally, Shuaib
    INFORMATION SECURITY JOURNAL, 2024, 33 (01): : 16 - 41
  • [27] Adaptive Network Security through Stream Machine Learning
    Mulinka, Pavol
    Casas, Pedro
    SIGCOMM'18: PROCEEDINGS OF THE ACM SIGCOMM 2018 CONFERENCE: POSTERS AND DEMOS, 2018, : 4 - 5
  • [28] Impact of Machine Learning in Various Network Security Applications
    Banerjee, Jayashree
    Maiti, Sumana
    Chakraborty, Sumalya
    Dutta, Surajit
    Chakraborty, Arpita
    Banerjee, Jyoti Sekhar
    PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 276 - 281
  • [29] Adjusting Optical Polarization with Machine Learning for Enhancing Practical Security of Continuous-Variable Quantum Key Distribution
    Zhou, Zicheng
    Guo, Ying
    ELECTRONICS, 2024, 13 (08)
  • [30] Bio-Inspired Machine Learning Based Wireless Sensor Network Security
    Rathore, Heena
    Jha, Sushmita
    2013 WORLD CONGRESS ON NATURE AND BIOLOGICALLY INSPIRED COMPUTING (NABIC), 2013, : 140 - 146