Re: [Nmlrg] Machine Learning in network - solicitation for use cases

"Dacheng Zhang" <dacheng.zdc@alibaba-inc.com> Mon, 07 September 2015 01:46 UTC

Return-Path: <dacheng.zdc@alibaba-inc.com>
X-Original-To: nmlrg@ietfa.amsl.com
Delivered-To: nmlrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9A291B3EC7 for <nmlrg@ietfa.amsl.com>; Sun, 6 Sep 2015 18:46:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.35
X-Spam-Level: **
X-Spam-Status: No, score=2.35 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MIME_CHARSET_FARAWAY=2.45, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P1gq9XuOK-SB for <nmlrg@ietfa.amsl.com>; Sun, 6 Sep 2015 18:46:30 -0700 (PDT)
Received: from out4133-18.mail.aliyun.com (out4133-18.mail.aliyun.com [42.120.133.18]) by ietfa.amsl.com (Postfix) with ESMTP id E107B1B3EC1 for <nmlrg@irtf.org>; Sun, 6 Sep 2015 18:46:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alibaba-inc.com; s=default; t=1441590389; h=Date:Subject:From:To:Message-ID:Mime-version:Content-type; bh=u0TL4Ysn9DbFbRahDrgU5ayqRlvm+rRxw6SIIFbpUHA=; b=oFB9qkpAiG5Suck9syre3ikPsRJsTwPqBLFeeY3iQD6Nk/NlzkXFmRDoj2tdTVDj1zIbSsA949cIKCb+vsE8Zme1DCulawjY2NBQ1KGovYF5fsMrkYdmqVxrWg79gunHPOPEn0FT8QtoKW1jc/YjxC/1v2EOXrhmtDX29av5YRk=
X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R161e4; FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03276; MF=dacheng.zdc@alibaba-inc.com; NM=1; PH=DS; RN=2; SR=0;
Received: from 10.62.53.139(mailfrom:dacheng.zdc@alibaba-inc.com ip:182.92.253.23) by smtp.aliyun-inc.com(127.0.0.1); Mon, 07 Sep 2015 09:46:23 +0800
User-Agent: Microsoft-MacOutlook/14.5.4.150722
Date: Mon, 07 Sep 2015 09:46:18 +0800
From: "Dacheng Zhang" <dacheng.zdc@alibaba-inc.com>
To: Sheng Jiang <jiangsheng@huawei.com>, "nmlrg@irtf.org" <nmlrg@irtf.org>
Message-ID: <D2130D3C.26ABA%dacheng.zdc@alibaba-inc.com>
Thread-Topic: [Nmlrg] Machine Learning in network - solicitation for use cases
References: <D20A251E.25E52%dacheng.zdc@alibaba-inc.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2B192@nkgeml512-mbx.china.huawei.com> <D20B2C03.25EC7%dacheng.zdc@alibaba-inc.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2D062@nkgeml512-mbx.china.huawei.com> <D211D160.26495%dacheng.zdc@alibaba-inc.com> <D211D7F2.2651C%dacheng.zdc@alibaba-inc.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2D300@nkgeml512-mbx.china.huawei.com>
In-Reply-To: <5D36713D8A4E7348A7E10DF7437A4B927BB2D300@nkgeml512-mbx.china.huawei.com>
Mime-version: 1.0
Content-type: text/plain; charset="GB2312"
Content-transfer-encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmlrg/LHcC8Xu2S9Ts2rdPM4PjviX1ccA>
Subject: Re: [Nmlrg] Machine Learning in network - solicitation for use cases
X-BeenThere: nmlrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Machine Learning Research Group <nmlrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmlrg>, <mailto:nmlrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmlrg/>
List-Post: <mailto:nmlrg@irtf.org>
List-Help: <mailto:nmlrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmlrg>, <mailto:nmlrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Sep 2015 01:46:31 -0000


在 15-9-6 下午5:01, "Sheng Jiang" <jiangsheng@huawei.com> 写入:

>>Some more detailed introduction.
>>
>>DDoS and APT are very active research topics. Application layer DDoS
>>attacks are more difficult to detect than layer 4 DDoS attacks. In many
>>cases, the application layer DDoS does not introduce large amount
>>traffics. However, by using big data and data mining tech, it is possible
>>to find out the clues of such attacks.
>
>Hi, Dacheng,
>
>Applying machine learning in DDoS protection is an interest use case. For
>my understanding, the machine would learn the potential attack behaviors,
>am I right?
>
>If yes, I have two questions: a) does the machine learning has the
>possibility to learn/identify new attack behaviors, which was not
>recognized before? If yes, what is the working principles? b) is it
>possible for autonomic reaction from the network operational perspective
>after detect such DDoS attack? Give the machine learning may not be
>accurate, my guess is human intervention is needed.
>
>Best regards,
>
>Sheng
>
>>There were some related discussions in Dots. If you are interested, I
>>could find them out later.
>>
>>_______________________________________________
>>nmlrg mailing list
>>nmlrg@irtf.org
>>https://www.irtf.org/mailman/listinfo/nmlrg