Re: [Nmlrg] I-D Action: draft-jiang-nmlrg-traffic-machine-learning-00.txt

Brian E Carpenter <brian.e.carpenter@gmail.com> Sun, 12 June 2016 23:32 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: nmlrg@ietfa.amsl.com
Delivered-To: nmlrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D84A12D752 for <nmlrg@ietfa.amsl.com>; Sun, 12 Jun 2016 16:32:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p8uyii_Mq8Rl for <nmlrg@ietfa.amsl.com>; Sun, 12 Jun 2016 16:32:45 -0700 (PDT)
Received: from mail-pf0-x234.google.com (mail-pf0-x234.google.com [IPv6:2607:f8b0:400e:c00::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 713CE12D753 for <nmlrg@irtf.org>; Sun, 12 Jun 2016 16:32:45 -0700 (PDT)
Received: by mail-pf0-x234.google.com with SMTP id t190so39915576pfb.3 for <nmlrg@irtf.org>; Sun, 12 Jun 2016 16:32:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:to:references:from:organization:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding; bh=atpJXA4bcSexn+/K385vwJV3vAzT889ibeyDe14RCnY=; b=hdMscZhLNN9UaMvTkjZbvYNzcco1wQnAsraJzTTLTOJH5yKwsrDfVlxVmKjTM9rWDZ rtCkxeOe5qMJiOk0vB9h6/GqskvXkhbX6wmvDnIQ/w0FWGu6gkROu0/bkpl2cJs/9Gju hDcJzBCyubscPEQI2J2WCOfIB7004/+ggFoRfrluF03UdashIqSLy0XW3dgjqg6NTEHX WLBo1bI22eE6XUetRqgNMu2GylEXsetofR64He4aLo+9JddyyC/Pkvalhx2KbT7Sl64o WtitW2hMedLUr+QkESXrotKdvEYTNp11l0+FLDTw/hRCqTB6lHquaKe/114NHv0Mnq+y WWhQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:to:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-transfer-encoding; bh=atpJXA4bcSexn+/K385vwJV3vAzT889ibeyDe14RCnY=; b=mOcHikJ3JOEX5eXQmx+v4hbKlU7NUC7q7YOPOzdHX266NFK9WobxdQ8GPyOHumAgVD w4eoFMO2Rfnf/zfnYM7nv/vlcT3gsXkgRvQHuZxwAhpMeOH5iKojuRjq9p2VjcH3U9zw 5FK5sahyrJNnC04AVcQRNeRU4cnRKhYsz/fjPMJPrgg+ql2TYgzk6i8r4stM8LMIO9yv /yOKigrfKvY7AHihVHNVQ2WMKs50wf7nrO9q2U4V4ddHXCjWfyWTqxfylb92DyYZz+Ur AujbT3XavnADNUv+IjWRb+cjQOo44OlRAWqVFH4i0/+C37sAolG7nss1WFsEcKBf/Pm/ M2Rw==
X-Gm-Message-State: ALyK8tK36cUxZgc9eJhF1ZO7odZcP+QC+wJ1srVVpprNDH/6OLnVhALUY4AWtKo4Hvm3EQ==
X-Received: by 10.98.86.72 with SMTP id k69mr18265617pfb.166.1465774364785; Sun, 12 Jun 2016 16:32:44 -0700 (PDT)
Received: from ?IPv6:2406:e007:5ebf:1:28cc:dc4c:9703:6781? ([2406:e007:5ebf:1:28cc:dc4c:9703:6781]) by smtp.gmail.com with ESMTPSA id et3sm32437276pad.48.2016.06.12.16.32.42 for <nmlrg@irtf.org> (version=TLSv1/SSLv3 cipher=OTHER); Sun, 12 Jun 2016 16:32:43 -0700 (PDT)
To: nmlrg@irtf.org
References: <20160603092508.1455.54979.idtracker@ietfa.amsl.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
Message-ID: <05db1128-fde3-bd47-907a-9cc32136e3d8@gmail.com>
Date: Mon, 13 Jun 2016 11:32:41 +1200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.1.1
MIME-Version: 1.0
In-Reply-To: <20160603092508.1455.54979.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/nmlrg/5zuQok2DURrsDBHrvNJNCIbgPjY>
Subject: Re: [Nmlrg] I-D Action: draft-jiang-nmlrg-traffic-machine-learning-00.txt
X-BeenThere: nmlrg@irtf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Machine Learning Research Group <nmlrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmlrg>, <mailto:nmlrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmlrg/>
List-Post: <mailto:nmlrg@irtf.org>
List-Help: <mailto:nmlrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmlrg>, <mailto:nmlrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Jun 2016 23:32:47 -0000

Hi,

Just a couple of comments on this interesting draft:

> 1.  Introduction
...
> 
>    Among many aspects of networks, the network traffic is one of the
>    most complicated managed objectives.  Its volume is rapidly growing
>    along with the Internet explosion.  It is always dynamically
>    changing.  Most network traffic flows only last a few minutes, or
>    even shorter.

That may be true today, but perhaps not in the future. Interactive flows
for audio and video may last much longer, and with RTCWEB they will become
more common. They also present unique difficulties, because a flow may be
very high data rate at one moment in one direction (A is speaking to B)
but then unpredictably the opposite (B is speaking to A). Or a video
conference might switch from presentation (A is speaking to everybody)
to Q/A mode (individuals are speaking to A). The flows will be maintained
but their parameters will change completely.

This makes the problem much more interesting - a measurement made at time T1
will not statistically predict the flow at time T2.

...
> 3.1.  Data of the Network Traffic
...
>    Data within communication protocols  The user contents are
>       encapsulated in layered communication protocols.  Many information
>       are contained within the protocol headers, for example the source
>       and destination IP addresses in the IP header, the port numbers in
>       the TCP/UDP header, etc.  

I think it is useful to mention the traffic class (DSCP) and flow label,
because these are guaranteed to be available even if the payload is
not available. Even the ECN bits might be useful, too.

...
> 5.  Security Considerations

I think that you should discuss Privacy Considerations. There is clearly
a problem, since the data one might capture for ML is exactly the data captured
by commercial or government surveillance. With the new emphasis on resisting such surveillance, the ML approach will have to
find a way to deal with this.
Anonymization of the collected data is one approach that is commonly used in
measurement studies.

Regards
   Brian Carpenter

On 03/06/2016 21:25, internet-drafts@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> 
> 
>         Title           : Use Cases of Applying Machine Learning Mechanism with Network Traffic
>         Authors         : Sheng Jiang
>                           Bing Liu
>                           Panagiotis Demestichas
>                           Jerome Francois
>                           Giovane C. M. Moura
>                           Pere Barlet
> 	Filename        : draft-jiang-nmlrg-traffic-machine-learning-00.txt
> 	Pages           : 18
> 	Date            : 2016-06-03
> 
> Abstract:
>    This document introduces a set of use cases in which machine learning
>    technologies are applied to network traffic relevant activities,
>    including machine learning based traffic classification, traffic
>    management, etc.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-jiang-nmlrg-traffic-machine-learning/
> 
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-jiang-nmlrg-traffic-machine-learning-00
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>