Paper
1 February 2019 Experiment-based detection of service disruption attacks in optical networks using data analytics and unsupervised learning
Author Affiliations +
Abstract
The paper addresses the detection of malicious attacks targeting service disruption at the optical layer as a key prerequisite for fast and effective attack response and network recovery. We experimentally demonstrate the effects of signal insertion attacks with varying intensity in a real-life scenario. By applying data analytics tools, we analyze the properties of the obtained dataset to determine how the relationships among different optical performance monitoring (OPM) parameters of the signal change in the presence of an attack as opposed to the normal operating conditions. In addition, we evaluate the performance of an unsupervised learning technique, i.e., a clustering algorithm for anomaly detection, which can detect attacks as anomalies without prior knowledge of the attacks. We demonstrate the potential and the challenges of unsupervised learning for attack detection, propose guidelines for attack signature identification needed for the detection of the considered attack methods, and discuss remaining challenges related to optical network security.
© (2019) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Marija Furdek, Carlos Natalino, Marco Schiano, and Andrea Di Giglio "Experiment-based detection of service disruption attacks in optical networks using data analytics and unsupervised learning", Proc. SPIE 10946, Metro and Data Center Optical Networks and Short-Reach Links II, 109460D (1 February 2019); https://doi.org/10.1117/12.2509613
Lens.org Logo
CITATIONS
Cited by 8 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Optical networks

Machine learning

Network security

Analytics

Principal component analysis

Signal detection

Detection and tracking algorithms

Back to Top