loading page

Root Cause Analysis for Autonomous Optical Network Security Management
  • +1
  • Carlos Natalino ,
  • Marco Schiano ,
  • Andrea Di Giglio ,
  • Marija Furdek
Carlos Natalino
Chalmers University of Technology, Chalmers University of Technology, Chalmers University of Technology

Corresponding Author:[email protected]

Author Profile
Marco Schiano
Author Profile
Andrea Di Giglio
Author Profile
Marija Furdek
Author Profile


The ongoing evolution of optical networks towards autonomous systems supporting high-performance services beyond 5G requires advanced functionalities for automated security management. To cope with evolving threat landscape, security diagnostic approaches should be able to detect and identify the nature not only of existing attack techniques, but also those hitherto unknown or insufficiently represented. Machine Learning (ML)-based algorithms perform well when identifying known attack types, but cannot guarantee precise identification of unknown attacks. This makes Root Cause Analysis (RCA) crucial for enabling timely attack response when human intervention is unavoidable. We address these challenges by establishing an ML-based framework for security assessment and analyzing RCA alternatives for physical-layer attacks. We first scrutinize different Network Management System (NMS) architectures and the corresponding security assessment capabilities. We then investigate the applicability of supervised and unsupervised learning (SL and UL) approaches for RCA and propose a novel UL-based RCA algorithm called Distance-Based Root Cause Analysis (DB-RCA). The framework’s applicability and performance for autonomous optical network security management is validated on an experimental physical-layer security dataset, assessing the benefits and drawbacks of the SL- and UL-based RCA. Besides confirming that SL-based approaches can provide precise RCA output for known attack types upon training, we show that the proposed UL-based RCA approach offers meaningful insight into the anomalies caused by novel attack types, thus supporting the human security officers in advancing the physical-layer security diagnostics.
Sep 2022Published in IEEE Transactions on Network and Service Management volume 19 issue 3 on pages 2702-2713. 10.1109/TNSM.2022.3198139