Re: [Idnet] Intelligence-Defined Network Architecture and Call for Interests

David Meyer <dmm@1-4-5.net> Tue, 28 March 2017 18:29 UTC

Return-Path: <dmm@1-4-5.net>
X-Original-To: idnet@ietfa.amsl.com
Delivered-To: idnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A2B11299C8 for <idnet@ietfa.amsl.com>; Tue, 28 Mar 2017 11:29:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=1-4-5-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kqPUh8b2TjYb for <idnet@ietfa.amsl.com>; Tue, 28 Mar 2017 11:29:02 -0700 (PDT)
Received: from mail-qk0-x22e.google.com (mail-qk0-x22e.google.com [IPv6:2607:f8b0:400d:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 145C6129A07 for <idnet@ietf.org>; Tue, 28 Mar 2017 11:28:48 -0700 (PDT)
Received: by mail-qk0-x22e.google.com with SMTP id d10so67452896qke.1 for <idnet@ietf.org>; Tue, 28 Mar 2017 11:28:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1-4-5-net.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Klk9NaQJ17C/XsJbf3bc3vMnS5tyNV2A54l/4eoaqzw=; b=aUTr32l9FJIGAyMInNVym0AAWhgbxdN/BYC+Sx6siMaesq/xa+9rnUe2qXhX7gTI7c rlDe01hbXoGKv2Sf9ZYExJzKuLlnoySsgWa/2OiBlBKjdPGbNiXcQlj/0JR6PLf4yuZu YSvQz7Tjl8gBOs33fVxyn78rynVZYe11EeNsJs4S7bAefQHTZb5/Nqwqb2nMMsAf8tjZ 9esv+ZAdJS9x7zrxD78nS6PL4sDOCAw41GrivBf9HlGjO0h+SPrNNebuglto/h7fIcFE cnnaMErZgSDqqsU/PQqBa2UldJw9UlbLH9KW/q0iEg6fahLWo5kQcQaGOUdJ8mYJEoCu +J6A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Klk9NaQJ17C/XsJbf3bc3vMnS5tyNV2A54l/4eoaqzw=; b=Fnxi8tqCB5eDC23QOUCXisARTIL2xypkYprMYm0QgwevSvN5UKYht5n3UA6jOqUT0N PUe5kIQ3hD6DSqaVkD/Dp+VQtGdZ6LdRIWSkU+pm/iCKVk0D9oQTaPC0OSFtQe3XiPhf Oklxw3/JgxQaNudulMTHbWMSLUJEYJlCLOG4YOwWkXcHMWjLEYQgw/7KxEx6tWQI14Tj L8kEzlZF6rwfwyghTeFeVyJ6NJy1PTbBfUGvXnmhu6DBInWbMmnG9HBMKJfj7JWFQikN IDWNEHJjfnQEw2Af+hUH79BPXGQ0vpxES4NcRgojzE+qRAq9T5MMGJ5z2tJyz7c0hQYT D/jA==
X-Gm-Message-State: AFeK/H0n2jg6tqLzZ4S15iHRUpx1nlH6Bt0q7wiG7XgS+l8UrD04Le8DGY8MBzPaFtHQbJOaaeIQbDtf1LjrRw==
X-Received: by 10.55.200.88 with SMTP id c85mr26170720qkj.155.1490725727123; Tue, 28 Mar 2017 11:28:47 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.12.149.34 with HTTP; Tue, 28 Mar 2017 11:28:46 -0700 (PDT)
X-Originating-IP: [128.223.156.253]
In-Reply-To: <CAAAu=jwAr4mgCqKv6y47ZRQ2p1_0ceXjSTTGxpXstmn7+0=5ZQ@mail.gmail.com>
References: <5D36713D8A4E7348A7E10DF7437A4B927CD15A18@NKGEML515-MBS.china.huawei.com> <CABo5upUAQaGXTP5Q+pp++ABipMc-Yu2rKp=DGVFky+L3qzdUEg@mail.gmail.com> <CAAAu=jwv=gmtFPJC3RQ9YBjTSukz5p7BoGLmHubJnHCWgkQnCA@mail.gmail.com> <CAHiKxWjFVpnHF58JTt+b7Y+ceoQ+97YmAMvOaqF-We3iwDUPOA@mail.gmail.com> <CAAAu=jwAr4mgCqKv6y47ZRQ2p1_0ceXjSTTGxpXstmn7+0=5ZQ@mail.gmail.com>
From: David Meyer <dmm@1-4-5.net>
Date: Tue, 28 Mar 2017 11:28:46 -0700
Message-ID: <CAHiKxWgqggSe1FmBjJef3Z1F9GSe7eY=WHin4WxOBFSLjfXGxQ@mail.gmail.com>
To: Brian Njenga <iambrianmuhia@gmail.com>
Cc: Oscar Mauricio Caicedo Rendon <omcaicedo@unicauca.edu.co>, Sheng Jiang <jiangsheng@huawei.com>, "idnet@ietf.org" <idnet@ietf.org>
Content-Type: multipart/alternative; boundary=001a11433d0e6c552c054bcea159
Archived-At: <https://mailarchive.ietf.org/arch/msg/idnet/9c02E51IyS6HaQYrw2LlS1EvaG0>
Subject: Re: [Idnet] Intelligence-Defined Network Architecture and Call for Interests
X-BeenThere: idnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The IDNet \(Intelligence-Defined Network\) " <idnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idnet>, <mailto:idnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idnet/>
List-Post: <mailto:idnet@ietf.org>
List-Help: <mailto:idnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idnet>, <mailto:idnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Mar 2017 18:29:05 -0000

Brian,

Fortunately for us, there is tons of tutorial material (and code) around
the network. Distill is a cool idea, but there are many more.

Dave


On Tue, Mar 28, 2017 at 11:26 AM, Brian Njenga <iambrianmuhia@gmail.com>
wrote:

> Thanks, Dave. I'll check them out.
>
> Something I currently think is very cool is the Distill journal, at
> https://distill.pub, edited by Shan Carter and Chris Olah.
>
> I would love to see more ML tutorials​ and lessons written in that style.
> They're​accepting submissions for tutorials, I think, so if any ML expert
> here would like to explain any technique in an explorable manner, please
> reach out to them.
>
> On Tue, 28 Mar 2017, 21:17 David Meyer, <dmm@1-4-5.net> wrote:
>
>> Hey Brian,
>>
>> We are working on anomaly detection technologies to detect things like
>> DDOS attacks; we're about to publish some results and will let you know
>> when that is ready. In the mean time, you might want to look at attacks
>> against ML itself, see [0], [1], and [2].  The bottom line here is that
>> even simple linear models are susceptible to adversarial attacks, so things
>> like the autoencoders we used to do binary classification (e.g., anomaly
>> detection) are susceptible; see slides 16+ of [3].
>>
>> Dave
>>
>> [0] https://arxiv.org/pdf/1312.6199.pdf
>> [1] https://arxiv.org/pdf/1412.6572.pdf
>> [2] https://arxiv.org/pdf/1602.02697.pdf
>> [3] http://www.1-4-5.net/~dmm/ml/talks/2016/cor_ml4networking.pdf
>>
>> On Tue, Mar 28, 2017 at 11:06 AM, Brian Njenga <iambrianmuhia@gmail.com>
>> wrote:
>>
>> I'm glad that the discussions​ on how to make AI/ML useful in the design
>> of the internet's architecture are continuing, albeit under a different
>> name. I'd like to participate remotely as well.
>>
>> I have a question that someone more thoughtful​ than I could answer: Are
>> there research questions on how to anticipate network-threatening DDOS
>> attacks, such as those coming from the Mirai botnet family, using ML? Even
>> going as far as designing and standardising an efficient, secure network
>> protocol for IoT devices. This is a complicated issue, which involves
>> emerging markets, so I'm interested in useful ideas from any angle.
>>
>> Thanks, and I'm glad to meet you all.
>>
>> Best regards,
>> Brian Muhia.
>>
>> On Tue, 28 Mar 2017, 20:02 Oscar Mauricio Caicedo Rendon, <
>> omcaicedo@unicauca.edu.co> wrote:
>>
>> Hi, all,
>>
>> If there is a meeting, I would like to participate remotely.
>>
>> Best regards,
>>
>> Oscar
>>
>> On Tue, Mar 28, 2017 at 11:29 AM, Sheng Jiang <jiangsheng@huawei.com>
>> wrote:
>>
>> Hi, all,
>>
>> Although there are many understanding for Intelligence-Defined Network,
>> we are actually using this IDN as a term reference to the SDN-beyond
>> architecture that we presented in IETF97, see the below link. A reference
>> model is presented in page 3, while potential standardization works is
>> presented in page 9.
>>
>> https://www.ietf.org/proceedings/97/slides/slides-
>> 97-nmlrg-intelligence-defined-network-01.pdf
>>
>> Although it might be a little bit too early for AI/ML in network giving
>> the recent story of the concluded proposed NMLRG, we still would like to
>> call for interests in IDN. Anybody (on site in Chicago this week) are
>> interested in this or even wider topics regarding to AI/ML in network,
>> please contact me on jiangsheng@huawei.com . Then we may have an
>> informal meeting to discuss some common interests and potential future
>> activities (not any activities in IETF, but also other STO or experimental
>> trails, etc.)  on Thursday morning.
>>
>> FYI, we have already working on a Work Item, called IDN in the ETSI NGP
>> (Next Generation Protocol) ISG, links below.
>>
>> https://portal.etsi.org/tb.aspx?tbid=844&SubTB=844
>> https://portal.etsi.org/webapp/WorkProgram/Report_
>> WorkItem.asp?WKI_ID=51011
>>
>> Meanwhile, please do use this mail list as a forum to discuss any topics
>> that may applying AI/ML into network area.
>>
>> Best regards,
>>
>> Sheng
>> _______________________________________________
>> IDNET mailing list
>> IDNET@ietf.org
>> https://www.ietf.org/mailman/listinfo/idnet
>>
>>
>>
>>
>> --
>> *Oscar Mauricio Caicedo Rendón*
>> *PhD Computer Science - Federal University of Rio Grande do Sul*
>> *Full Profesor - University of Cauca*
>>
>> ------------------------------
>> *Universidad del Cauca: Comprometidos con la calidad.*
>> _______________________________________________
>> IDNET mailing list
>> IDNET@ietf.org
>> https://www.ietf.org/mailman/listinfo/idnet
>>
>> --
>> Some say he really tries to learn efficiently.
>>
>> _______________________________________________
>> IDNET mailing list
>> IDNET@ietf.org
>> https://www.ietf.org/mailman/listinfo/idnet
>>
>>
>> --
> Some say he really tries to learn efficiently.
>