Re: [Idnet] Applying AI into network management//FW: [nmrg] 45th NMRG meeting: Call for Contributions

"Diego R. Lopez" <diego.r.lopez@telefonica.com> Tue, 19 September 2017 19:06 UTC

Return-Path: <diego.r.lopez@telefonica.com>
X-Original-To: idnet@ietfa.amsl.com
Delivered-To: idnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DE58126BF3 for <idnet@ietfa.amsl.com>; Tue, 19 Sep 2017 12:06:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.91
X-Spam-Level:
X-Spam-Status: No, score=-2.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=-1, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3qSEboYjoxY0 for <idnet@ietfa.amsl.com>; Tue, 19 Sep 2017 12:06:29 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0115.outbound.protection.outlook.com [104.47.0.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F22213436F for <idnet@ietf.org>; Tue, 19 Sep 2017 12:06:28 -0700 (PDT)
Received: from DB6PR0601MB2167.eurprd06.prod.outlook.com (10.168.57.26) by DB6PR0601MB2069.eurprd06.prod.outlook.com (10.168.56.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.56.11; Tue, 19 Sep 2017 19:06:25 +0000
Received: from DB6PR0601MB2167.eurprd06.prod.outlook.com ([fe80::29a6:d86f:ad2:e821]) by DB6PR0601MB2167.eurprd06.prod.outlook.com ([fe80::29a6:d86f:ad2:e821%15]) with mapi id 15.20.0056.016; Tue, 19 Sep 2017 19:06:25 +0000
From: "Diego R. Lopez" <diego.r.lopez@telefonica.com>
To: "Ciavaglia, Laurent (Nokia - FR/Nozay)" <laurent.ciavaglia@nokia-bell-labs.com>, yanshen <yanshen@huawei.com>, Sheng Jiang <jiangsheng@huawei.com>, "idnet@ietf.org" <idnet@ietf.org>
Thread-Topic: [Idnet] Applying AI into network management//FW: [nmrg] 45th NMRG meeting: Call for Contributions
Thread-Index: AQHTMXpjANhJ2zgnkkuzzkNvYOK7mA==
Date: Tue, 19 Sep 2017 19:06:25 +0000
Message-ID: <7C7632E4-0225-46F0-A7B6-E872D424CDE2@telefonica.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.26.0.170902
authentication-results: spf=none (sender IP is ) smtp.mailfrom=diego.r.lopez@telefonica.com;
x-originating-ip: [78.22.24.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DB6PR0601MB2069; 6:OS8rbe/FU8Go7Lrodc6EPGCFMygrggygdYzS2Pa+gw6/iTGhgp0y6bj3O+uyk+n71jhxQsHi6lX7lb4fneK9OnVkNwleCDgsodO4c2Ze+3FUIHkhQxqt6lhDGVblJdXbccNSLTOHci+ZaUyDsXCyudMz4CUwR/gpAhaOWKtxH4QsieAHpREYqdaUND46DVzidZeuTAYkeEl2/FVJ6tMC0RBcFq5V+nziMK9+3J94e3/potqqjwlDGXQ1DSCd41rqVIi04sXjRW98YrMomt32b6DumvRVpenac4dTH4uWcH154e0dcK88UPPthDxI5fA8rxfq/x0UfTX3851vEvV9mw==; 5:F1UUS1k8LAXMhH34F/fE1Me5dyKsFZEjER7LeCjK2/etccVDwuVvfGexpK0Qaf70zVX922lhSuYu5V3wOXMS92sgshmVB+tydOuzWvuRY+BxkwWd/83TCF1M7H194hp+Kiq2f52APXrX7ch6PgvwcA==; 24:47uH6fH0a3b8W2YqlDBIC5DJ/wbaWG5E8jazF/5HPUoG9QgvlwiJSVjg0fp2sHQ9f8WAjf7N8hJZjFOxyb/+8RdN3FjrnmboutWSghD2QeA=; 7:chzcgJgC7YxMKWnI2uMz+PhJ+sOwcpzhkbBaj0ntmPNHdpZ/cMyH7fbwGCVtAzQrdFy85svuTFuL4X5QVCwjo4LL45VxTWMZt/81ONLqV/3Fpo9InAXr04OpKoF37sYBr8XfRbHJv3ucFg7EPwBVbpkfiNy0thGmIH6S25SEFSlP3toCiDMLI6UiMkH5ilUNkgimSaomOPx1Rrth2ELur/6cyAhXc7rDz8YDx2Gjpn8=
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: dadda8e9-2249-4c83-d7a9-08d4ff918697
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(48565401081)(300000503095)(300135400095)(2017052603199)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:DB6PR0601MB2069;
x-ms-traffictypediagnostic: DB6PR0601MB2069:
x-exchange-antispam-report-test: UriScan:(40392960112811)(278428928389397)(50582790962513)(248736688235697);
x-microsoft-antispam-prvs: <DB6PR0601MB206959E5D7DF63850E25058ADF600@DB6PR0601MB2069.eurprd06.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(8121501046)(5005006)(100000703101)(100105400095)(93006095)(93001095)(3002001)(10201501046)(6055026)(6041248)(20161123562025)(20161123564025)(201703131423075)(201702281529075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(20161123555025)(20161123560025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DB6PR0601MB2069; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DB6PR0601MB2069;
x-forefront-prvs: 04359FAD81
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(346002)(376002)(39860400002)(189002)(24454002)(40134004)(199003)(13464003)(377454003)(25724002)(252514010)(58126008)(53546010)(6506006)(6436002)(786003)(97736004)(189998001)(305945005)(54356999)(6486002)(36756003)(50986999)(2900100001)(316002)(82746002)(66066001)(83506001)(478600001)(5660300001)(83716003)(14454004)(7736002)(966005)(6512007)(99286003)(6306002)(53936002)(3660700001)(25786009)(105586002)(6116002)(561944003)(229853002)(6246003)(2906002)(101416001)(3280700002)(33656002)(68736007)(8936002)(86362001)(81156014)(5250100002)(5890100001)(81166006)(102836003)(110136005)(2501003)(3846002)(8676002)(106356001); DIR:OUT; SFP:1102; SCL:1; SRVR:DB6PR0601MB2069; H:DB6PR0601MB2167.eurprd06.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: telefonica.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <3711B62B8D210F40A1B03599D296AE7C@eurprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: telefonica.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Sep 2017 19:06:25.1865 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0601MB2069
Archived-At: <https://mailarchive.ietf.org/arch/msg/idnet/QzwWoiVJNv3E9tWs4tQRdapEQbQ>
Subject: Re: [Idnet] Applying AI into network management//FW: [nmrg] 45th NMRG meeting: Call for Contributions
X-BeenThere: idnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The IDNet \(Intelligence-Defined Network\) " <idnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idnet>, <mailto:idnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idnet/>
List-Post: <mailto:idnet@ietf.org>
List-Help: <mailto:idnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idnet>, <mailto:idnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Sep 2017 19:06:32 -0000

Hi,

I'd like to propose a presentation on the results of the COGNET project, including the double closed loop we have been devising as main architecture, and the results on dataset generation.

Be goode,

--
"Esta vez no fallaremos, Doctor Infierno"

Dr Diego R. Lopez
Telefonica I+D
http://people.tid.es/diego.lopez/

e-mail: diego.r.lopez@telefonica.com
Tel:    +34 913 129 041
Mobile: +34 682 051 091
----------------------------------


On 19/9/2017, 09:34 , "IDNET on behalf of Ciavaglia, Laurent (Nokia - FR/Nozay)" <idnet-bounces@ietf.org on behalf of laurent.ciavaglia@nokia-bell-labs.com> wrote:

    Dear Yansen, all,

    We (NMRG chairs) will coordinate with Sheng/IDNET for defining the agenda.
    Please send your proposal to either lists.

    Thanks, Laurent.


    -----Original Message-----
    From: IDNET [mailto:idnet-bounces@ietf.org] On Behalf Of yanshen
    Sent: Tuesday, September 19, 2017 8:48 AM
    To: Sheng Jiang <jiangsheng@huawei.com>; idnet@ietf.org
    Subject: Re: [Idnet] Applying AI into network management//FW: [nmrg] 45th NMRG meeting: Call for Contributions

    Hi Sheng,

    I would like to have a short presentation about the Use case of Traffic Prediction/QoS Model.

    My question is how to "register"? I directly send Email to the NMRG chair or we have a pre-registration in IDNet ?

    I attach the brief summary of use cases in the end. Hope it helpful.

    Yansen


    ==========================================
    1. Gap and Requirement Analysis
        1.1 Network Management requirement
        1.2 TBD
    2. Use Cases
        2.1 Traffic Prediction
    Proposed by: yanshen@huawei.com
    Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00131.html
    Abstract: Collect the history traffic data and external data which may influence the traffic. Predict the traffic in short/long/specific term. Avoid the congestion or risk in previously.

        2.2 QoS Management
    Proposed by: yanshen@huawei.com
    Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00131.html
    Abstract: Use multiple paths to distribute the traffic flows. Adjust the percentages. Avoid congestion and ensure QoS.

        2.3 Application (and/or DDoS) detection
    Proposed by: aydinulas@gmx.net
    Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00133.html
    Abstract: Detect the application (or attack) from network packets (HTTPS or plain) Collect the history traffic data and identify a service or attack (ex: Skype, Viber, DDoS attack etc.)

    2.4 QoE Management
    Proposed by: albert.cabellos@gmail.com
    Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00137.html
    Abstract: Collect low-level metrics (SNR, latency, jitter, losses, etc) and measure QoE. Then use ML to understand what is the relation between satisfactory QoE and the low-level metrics. As an example learn that when delay>N then QoE is degraded, but when M<delay<N then QoE is satisfactory for the customers (please note that QoE cannot be measured directly over your network). This is useful to understand how the network must be operated to provide satisfactory QoE.

    2.5 (Encrypted) Traffic Classification
    Proposed by: jerome.francois@inria.fr; mskim16@etri.re.kr
    Track: [Jerome] https://www.ietf.org/mail-archive/web/idnet/current/msg00141.html ; [Min-Suk Kim] https://www.ietf.org/mail-archive/web/idnet/current/msg00153.html
    Abstract:
    [Jerome] collect flow-level traffic metrics such as protocol information but also meta metrics such as distribution of packet sizes, inter-arrival times... Then use such information to label the traffic with the underlying application assuming that the granularity of classification may vary (type of application, exact application name, version...)
    [Min-Suk Kim]continuously collect packet data, then applying learning process for traffic classification with generating application using deep learning models such as CNN (convolutional neural network) and RNN (recurrent neural network). Data-set to apply into the models are generated by precessing with features of information from flow in packet data.

    2.6 Anomaly Detection
    Proposed by: steniofernandes@gmail.com
    Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00186.html
    Abstract:
    [Jerome] collect flow-level traffic metrics such as protocol information but also meta metrics such as distribution of packet sizes, inter-arrival times... Then use such information to label the traffic with the underlying application assuming that the granularity of classification may vary (type of application, exact application name, version...)
    [Min-Suk Kim]continuously collect packet data, then applying learning process for traffic classification with generating application using deep learning models such as CNN (convolutional neural network) and RNN (recurrent neural network). Data-set to apply into the models are generated by precessing with features of information from flow in packet data.

    3. Data Focus
        3.1 Data attribute
        3.2 Data format
        3.3 TBD

    4. Support Technologies
        4.1 Benchmarking Framework
    Proposed by: pedro@nict.go.jp
    Track: https://www.ietf.org/mail-archive/web/idnet/current/msg00146.html
    Abstract: A proper benchmarking framework comprises a set of reference procedures, methods, and models that can (or better *must*) be followed to assess the quality of an AI mechanism proposed to be applied to the network management/control area. Moreover, and much more specific to the IDNET topics, is the inclusion, dependency, or just the general relation of a standard format enforced to the data that is used (input) and produced (output) by the framework, so a kind of "data market" can arise without requiring to transform the data. The initial scope of input/output data would be the datasets, but also the new knowledge items that are stated as a result of applying the benchmarking procedures defined by the framework, which can be collected together to build a database of benchmark results, or just contrasted with other existing entries in the database to know the position of the solution just evaluated. This increases the usefulness of IDNET.

        4.2 TBD

    =========================================

    > -----Original Message-----
    > From: IDNET [mailto:idnet-bounces@ietf.org] On Behalf Of Sheng Jiang
    > Sent: Wednesday, September 13, 2017 10:20 PM
    > To: idnet@ietf.org
    > Subject: [Idnet] Applying AI into network management//FW: [nmrg] 45th
    > NMRG
    > meeting: Call for Contributions
    >
    > Hi, IDNet,
    >
    > After coordinating with NMRG chairs, a Call for Contributions message
    > (see
    > below) has been sent by them to the NMRG mailing list regarding to the
    > topic of applying AI into network management. This is in line with our
    > earlier discussion to have a session on this in NMRG, Singapore. You
    > could send email to volunteer for presentations in either NMRG or
    > IDNet mailing list (I will bridge to NMRG chairs in the IDNet case) or cross post.
    >
    > Looking forward for your contributions and good discussion in Singapore.
    >
    > Best regards,
    >
    > Sheng
    >
    > -----Original Message-----
    > From: nmrg [mailto:nmrg-bounces@irtf.org] On Behalf Of Lisandro
    > Zambenedetti Granville
    > Sent: Wednesday, September 13, 2017 9:57 PM
    > To: nmrg@irtf.org
    > Subject: [nmrg] 45th NMRG meeting: Call for Contributions
    >
    > Call for Contributions
    > 45th NMRG meeting at IETF 100
    >
    > In the next IETF100/Singapore we will be organizing the 45th NMRG meeting.
    > We would like to center the upcoming meeting around the use of
    > artificial intelligence (AI) for network management, including related
    > topics as diverse as machine-learning and intelligent-defined networks, for example.
    >
    > AI for network management is not a new topic, as can be easily
    > observed in the literature produced by the network management community already years ago.
    > On the other hand, AI has matured a lot, finding applications is several areas.
    > People interested in the subject also formed communities that can
    > contribute too. As such, revisiting AI for network management is not
    > only appropriate but also timely.
    >
    > In this Call for Contributions we would like to receive proposals of
    > presentations/discussions for the upcoming 45th NMRG meeting. That
    > includes, for example:
    >
    > - Use cases where AI could/should be used in network management
    > - Real-life experiments, results, and findings on AI for network
    > management
    > - Disruptive and/or new management paradigms based on AI
    > - Potential standard requirements for applying AI for network
    > management
    > - Both preliminary and mature approaches
    >
    > Please contribute and feel free to distribute this call to other
    > mailing lists whose members you believe would be interested and could contribute too.
    >
    > Best regards, Lisandro and Laurent.
    > _______________________________________________
    > nmrg mailing list
    > nmrg@irtf.org
    > https://www.irtf.org/mailman/listinfo/nmrg
    > _______________________________________________
    > IDNET mailing list
    > IDNET@ietf.org
    > https://www.ietf.org/mailman/listinfo/idnet

    _______________________________________________
    IDNET mailing list
    IDNET@ietf.org
    https://www.ietf.org/mailman/listinfo/idnet

    _______________________________________________
    IDNET mailing list
    IDNET@ietf.org
    https://www.ietf.org/mailman/listinfo/idnet



________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição