Re: [Nmlrg] Machine Learning in network - solicitation for use cases
"Dacheng Zhang" <dacheng.zdc@alibaba-inc.com> Mon, 07 September 2015 01:46 UTC
Return-Path: <dacheng.zdc@alibaba-inc.com>
X-Original-To: nmlrg@ietfa.amsl.com
Delivered-To: nmlrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id A9A291B3EC7
for <nmlrg@ietfa.amsl.com>; Sun, 6 Sep 2015 18:46:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.35
X-Spam-Level: **
X-Spam-Status: No, score=2.35 tagged_above=-999 required=5
tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, MIME_CHARSET_FARAWAY=2.45,
MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001,
UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id P1gq9XuOK-SB for <nmlrg@ietfa.amsl.com>;
Sun, 6 Sep 2015 18:46:30 -0700 (PDT)
Received: from out4133-18.mail.aliyun.com (out4133-18.mail.aliyun.com
[42.120.133.18])
by ietfa.amsl.com (Postfix) with ESMTP id E107B1B3EC1
for <nmlrg@irtf.org>; Sun, 6 Sep 2015 18:46:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=alibaba-inc.com; s=default;
t=1441590389; h=Date:Subject:From:To:Message-ID:Mime-version:Content-type;
bh=u0TL4Ysn9DbFbRahDrgU5ayqRlvm+rRxw6SIIFbpUHA=;
b=oFB9qkpAiG5Suck9syre3ikPsRJsTwPqBLFeeY3iQD6Nk/NlzkXFmRDoj2tdTVDj1zIbSsA949cIKCb+vsE8Zme1DCulawjY2NBQ1KGovYF5fsMrkYdmqVxrWg79gunHPOPEn0FT8QtoKW1jc/YjxC/1v2EOXrhmtDX29av5YRk=
X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R161e4;
FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03276; MF=dacheng.zdc@alibaba-inc.com; NM=1;
PH=DS; RN=2; SR=0;
Received: from 10.62.53.139(mailfrom:dacheng.zdc@alibaba-inc.com
ip:182.92.253.23) by smtp.aliyun-inc.com(127.0.0.1);
Mon, 07 Sep 2015 09:46:23 +0800
User-Agent: Microsoft-MacOutlook/14.5.4.150722
Date: Mon, 07 Sep 2015 09:46:18 +0800
From: "Dacheng Zhang" <dacheng.zdc@alibaba-inc.com>
To: Sheng Jiang <jiangsheng@huawei.com>,
"nmlrg@irtf.org" <nmlrg@irtf.org>
Message-ID: <D2130D3C.26ABA%dacheng.zdc@alibaba-inc.com>
Thread-Topic: [Nmlrg] Machine Learning in network - solicitation for use cases
References: <D20A251E.25E52%dacheng.zdc@alibaba-inc.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2B192@nkgeml512-mbx.china.huawei.com>
<D20B2C03.25EC7%dacheng.zdc@alibaba-inc.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2D062@nkgeml512-mbx.china.huawei.com>
<D211D160.26495%dacheng.zdc@alibaba-inc.com>
<D211D7F2.2651C%dacheng.zdc@alibaba-inc.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2D300@nkgeml512-mbx.china.huawei.com>
In-Reply-To: <5D36713D8A4E7348A7E10DF7437A4B927BB2D300@nkgeml512-mbx.china.huawei.com>
Mime-version: 1.0
Content-type: text/plain;
charset="GB2312"
Content-transfer-encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmlrg/LHcC8Xu2S9Ts2rdPM4PjviX1ccA>
Subject: Re: [Nmlrg] Machine Learning in network - solicitation for use cases
X-BeenThere: nmlrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Machine Learning Research Group <nmlrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmlrg>,
<mailto:nmlrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmlrg/>
List-Post: <mailto:nmlrg@irtf.org>
List-Help: <mailto:nmlrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmlrg>,
<mailto:nmlrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Sep 2015 01:46:31 -0000
在 15-9-6 下午5:01, "Sheng Jiang" <jiangsheng@huawei.com> 写入: >>Some more detailed introduction. >> >>DDoS and APT are very active research topics. Application layer DDoS >>attacks are more difficult to detect than layer 4 DDoS attacks. In many >>cases, the application layer DDoS does not introduce large amount >>traffics. However, by using big data and data mining tech, it is possible >>to find out the clues of such attacks. > >Hi, Dacheng, > >Applying machine learning in DDoS protection is an interest use case. For >my understanding, the machine would learn the potential attack behaviors, >am I right? > >If yes, I have two questions: a) does the machine learning has the >possibility to learn/identify new attack behaviors, which was not >recognized before? If yes, what is the working principles? b) is it >possible for autonomic reaction from the network operational perspective >after detect such DDoS attack? Give the machine learning may not be >accurate, my guess is human intervention is needed. > >Best regards, > >Sheng > >>There were some related discussions in Dots. If you are interested, I >>could find them out later. >> >>_______________________________________________ >>nmlrg mailing list >>nmlrg@irtf.org >>https://www.irtf.org/mailman/listinfo/nmlrg
- [Nmlrg] Machine Learning in network - solicitatio… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- [Nmlrg] Using Machine Learning for Network Device… Liubing (Leo)
- Re: [Nmlrg] Using Machine Learning for Network De… Sheng Jiang
- Re: [Nmlrg] Using Machine Learning for Network De… Liubing (Leo)
- Re: [Nmlrg] Using Machine Learning for Network De… Sheng Jiang
- Re: [Nmlrg] Using Machine Learning for Network De… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang