Re: [Idnet] Intelligence-Defined Network Architecture and Call for Interests

David Meyer <dmm@1-4-5.net> Wed, 29 March 2017 14:25 UTC

Return-Path: <dmm@1-4-5.net>
X-Original-To: idnet@ietfa.amsl.com
Delivered-To: idnet@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72143129514 for <idnet@ietfa.amsl.com>; Wed, 29 Mar 2017 07:25:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=1-4-5-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rBSeQg3v_kMB for <idnet@ietfa.amsl.com>; Wed, 29 Mar 2017 07:25:50 -0700 (PDT)
Received: from mail-qk0-x235.google.com (mail-qk0-x235.google.com [IPv6:2607:f8b0:400d:c09::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED5E412953E for <idnet@ietf.org>; Wed, 29 Mar 2017 07:25:41 -0700 (PDT)
Received: by mail-qk0-x235.google.com with SMTP id f11so14134622qkb.0 for <idnet@ietf.org>; Wed, 29 Mar 2017 07:25:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1-4-5-net.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=0QuCB2iLvvf9ov41blPcxP6xkpe1WYAuN3V1iRU29PM=; b=R7OL4gRHIanb7ueUE2yJLlmQZ5LrQO+wPqU3dJItEKGxJlIo73uX5GIoG+VOv9HrwC i6A2M21xvJsa+JXXc0WITCm/1fUS+f8CE9obgK2GAfmA56K0+DSzzQHYEPTR5hWcX3r2 Th7Ax/9BKy2MIEiFO+B8OLxgT0B+CDUrl81w3+TIrWsDG6ov/6pOOZozae5opI/Q7i1x wNUkBzc7xIoTFpK6q00cirBMSsum2fdLrsgSjouic4Q4N76qjYXaDt9/28hT5Vfr93TW Am+6hh+SMRlFDOYwPRddscN+XAg+W9db3l0oJudW3BV5tcGjpkgEHbBG9hG89L60DpTK nIFg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=0QuCB2iLvvf9ov41blPcxP6xkpe1WYAuN3V1iRU29PM=; b=GXpTRUYKMsWRGMOt5c4cdbo/X92yeTnAWqRFQvUgqrBNVjziRV7oxqi9OvfHdk8X2X msxGfqh632hXQppUVS1vyx5lA0yZ5sGZzq/vNvT8EwRbNdXdUl7//7O7rQGP917OjN2t 8rmT8T/I88J4oEFiIPCrxC0a9havexDVmZ2ueypCkBzychZebB6bftfI0QxsvaYlk3Er GGtofiRqNkx5BYYC9mKGQvx7raDUHXMXJJiyfx/goepW7kpLTOU/jbc1WgVz7X9PP13+ um9l32/3GSXGe2iqOxcXw1JQ4z+LasIkJEIwBUkMqM/XPwNPklsl9LClJW/HMqPuYtUL p0UQ==
X-Gm-Message-State: AFeK/H1+AGq9vInnJKpLp6zsfrPinD/ujBaDiIE5QUXjKHhZixaZTBa1FbliqxBGH7T1ACeZg9a8vM+rK41MLA==
X-Received: by 10.55.65.81 with SMTP id o78mr794170qka.82.1490797540989; Wed, 29 Mar 2017 07:25:40 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.12.149.34 with HTTP; Wed, 29 Mar 2017 07:25:40 -0700 (PDT)
X-Originating-IP: [128.223.156.253]
In-Reply-To: <CAHiKxWg-D3fCj0at2sxSr76MV8jiHO_TXisyiwSwM7hOXUSOdw@mail.gmail.com>
References: <5D36713D8A4E7348A7E10DF7437A4B927CD15A18@NKGEML515-MBS.china.huawei.com> <CABo5upUAQaGXTP5Q+pp++ABipMc-Yu2rKp=DGVFky+L3qzdUEg@mail.gmail.com> <CAAAu=jwv=gmtFPJC3RQ9YBjTSukz5p7BoGLmHubJnHCWgkQnCA@mail.gmail.com> <f4a0ef2b-bba1-8b02-ba63-b119438fc13e@inria.fr> <CAAAu=jytqiHmL17z_x6828Jy5YZegV=sJ_RrS0uTsNnSZZr7cg@mail.gmail.com> <5BC916BD50F92F45870ABA46212CB29CE4C966@SMTP1.etri.info> <CAHiKxWg-D3fCj0at2sxSr76MV8jiHO_TXisyiwSwM7hOXUSOdw@mail.gmail.com>
From: David Meyer <dmm@1-4-5.net>
Date: Wed, 29 Mar 2017 07:25:40 -0700
Message-ID: <CAHiKxWjmW6hbTCgKyVPvh98WjOBCOPJsRF9w+pJJdxr6jDv0AQ@mail.gmail.com>
To: 김민석 <mskim16@etri.re.kr>
Cc: Brian Njenga <iambrianmuhia@gmail.com>, Jérôme François <jerome.francois@inria.fr>, Oscar Mauricio Caicedo Rendon <omcaicedo@unicauca.edu.co>, Sheng Jiang <jiangsheng@huawei.com>, "idnet@ietf.org" <idnet@ietf.org>
Content-Type: multipart/alternative; boundary="001a114ac54edcf708054bdf5981"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idnet/TUv3usHf_4Y8ayHqiNY44dYmgh0>
Subject: Re: [Idnet] Intelligence-Defined Network Architecture and Call for Interests
X-BeenThere: idnet@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "The IDNet \(Intelligence-Defined Network\) " <idnet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idnet>, <mailto:idnet-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idnet/>
List-Post: <mailto:idnet@ietf.org>
List-Help: <mailto:idnet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idnet>, <mailto:idnet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Mar 2017 14:25:53 -0000

Apparently you can't attach a .pptx. The attachment is here (pptx and pdf):

http://www.1-4-5.net/~dmm/ml/misc/musings.pptx
http://www.1-4-5.net/~dmm/ml/misc/musings.pdf

Thx,

Dave


On Wed, Mar 29, 2017 at 7:17 AM, David Meyer <dmm@1-4-5.net> wrote:

>
> Hey Min-Suk,
>
> Totally agree we need to learn from our environment, and RL is a natural
> approach. After all, the network is always changing, has adversaries, etc.
> All of this means. among other things,  that we can't make simplifying
> assumptions like stationary distributions,  iid data, .... So RL is one way
> to attack these problems, and the classic algorithms you mention below are
> certainly a reasonable approach (I've been working with policy gradients
> [0], trying to model/adapt the two-player game approach of AlphaGo to
> networking; the problem there is that we don't have a source of labeled
> expert data like the KGS Go server (https://www.gokgs.com/) to build the
> supervised policy network....).
>
> You might also want to check out the recent "boot" of evolution strategies
> as a black-box approach to RL (in particular no gradients). See [1],  [2],
>  [3]. There is also a ton of code around if you want to try some of this
> out (see e.g.,https://github.com/dennybritz/reinforcement-learning; this
> one is in tensorflow). Finally, I've attached a few summary slides with
> some of my musings on this topic from past talks.
>
> Thanks,
>
> Dave
>
> [BTW, two player minimax games seem to be popping up everywhere: AlphaGo,
> variational autoencoders [4], GANs [5], and many others; something to thing
> about for our domain]
>
> [0] https://papers.nips.cc/paper/1713-policy-gradient-
> methods-for-reinforcement-learning-with-function-approximation.pdf
> [1] https://blog.openai.com/evolution-strategies/
> [2] https://arxiv.org/pdf/1703.03864.pdf
> [3] http://jmlr.csail.mit.edu/papers/volume15/wierstra14a/wierstra14a.pdf
> [4] http://www.1-4-5.net/~dmm/ml/vae.pdf
> [5] https://arxiv.org/pdf/1406.2661.pdf
>
> On Tue, Mar 28, 2017 at 4:04 PM, 김민석 <mskim16@etri.re.kr> wrote:
>
>> Hi Brian,
>>
>>
>> As you mentioned by the prior email, anticipating network DDos
>> attacks is really trendy issue to solve by ML techniques.
>>
>> We also make some efforts how to avoid fagile nodes by a trustworthy
>> communication, that means quantifying trustworthiness of node with
>> normalization of various requirements such as security function, bandwidth
>> and etc.
>>
>> We are freshly approaching in routing layer with confidence using our own
>> requirements, TPD(Trust Policy Distribution) and TD(Trust Degree). These
>> requirements are considered to be solved by Reinforcement Learning
>> (RL) that is one of the ML algorithms. RL is useful to control some of
>> network policy about specific actions and states with reinforced and
>> purnished rewards (+/-), but the problem is too slow to acquire satisified
>> performance. Other ways to say it, anormaly dectection and regression
>> analysis might be both efficient approaching methods to solve the issues
>> Dave mentioned.
>>
>>
>> Best Regards,
>>
>>
>> Min-Suk Kim
>>
>> Senior Researcher / Ph.D.
>> Intelligent IoE Network Research Section,
>> *E*lectronics and *T*elecommunications *R*esearch *I*nstitute (*ETRI)*
>> e-mail          :  mskim16@etri.re.kr <nskim@etri.re.kr>
>> http://www.etri.re.kr/
>>
>>
>>
>>
>>
>>
>>