Enhancing optical network security with machine learning
Paper i proceeding, 2019
As critical communication infrastructure, optical networks have a vital role in safe and dependable transmission of massive amounts of data, supporting essential societal services. However, these networks are inherently vulnerable to a multitude of deliberate, man-made attacks targeting service disruption at the physical layer. Physical-layer attack techniques can range in their scope and effects, level of sophistication, locality, detectability, etc. An example of a relatively unsophisticated attack method is a deliberate fiber cut, typically targeting critical network elements (e.g., links with the highest betweenness) and resulting in straightforward transmission interruption . More refined attack techniques rely on the insertion of harmful signal (e.g. in- and out-of-band jamming) , or on external tampering with the fiber to degrade the transmission quality (e.g., polarization scrambling via fiber squeezing) . Diverse attack techniques cause different effects, which complicates their detectability. For example, some attacks add unfilterable noise, some reduce the power of the affected optical channels, while some inflict changes in the state of polarization too quick for the coherent receiver to compensate . Therefore, monitoring only the spectrum , or individual signal parameters such as the power, optical signal-to-noise ratio (OSNR), or presence of errors may result in inaccurate diagnostics and root cause attribution. This obstacle in quick recovery of affected services is further pronounced for newly emerging attack techniques whose effects may deviate from the attack signatures previously known to the network management system .The complexity of the evolving physical-layer security landscape and the intricate interplay of different optical performance monitoring (OPM) parameters in the presence of diverse attack methods can greatly benefit from the application of machine learning techniques capable of deep data analysis. In this talk, we present how different data analytics and machine learning approaches can be applied to interpret the OPM data reported from the commercially available coherent receivers to identify anomalous operation and trigger security threat warnings. The analytical techniques are applied to experimental data obtained from an operator's metropolitan testbed subjected to in- and out-of-band jamming, and external polarization scrambling attacks. We begin with an analysis of the optical signal degradation caused by the different attack methods. We then investigate the application of several supervised learning approaches that, once trained on the experimental data, can detect the presence of an attack and identify its type and intensity. The accuracy of several classifiers is scrutinized, along with the relevance of OPM parameters reported by the coherent receivers and the impact of missing features. To gain insight into the potential of the network to detect emerging, previously unseen attack techniques, we further analyse the performance of unsupervised learning techniques that detect the anomalies in signal parameters introduced by attacks. The presented findings help achieve timely and accurate detection of physical-layer attacks and serve as a prerequisite for fast and effective attack response and network recovery.