Re: [Nmlrg] Machine Learning in network - solicitation for use cases
"Dacheng Zhang" <dacheng.zdc@alibaba-inc.com> Sun, 06 September 2015 03:46 UTC
Return-Path: <dacheng.zdc@alibaba-inc.com>
X-Original-To: nmlrg@ietfa.amsl.com
Delivered-To: nmlrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 964A71ACE6A
for <nmlrg@ietfa.amsl.com>; Sat, 5 Sep 2015 20:46:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.451
X-Spam-Level:
X-Spam-Status: No, score=0.451 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, MIME_CHARSET_FARAWAY=2.45,
MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001,
UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id runiPVUyhHjc for <nmlrg@ietfa.amsl.com>;
Sat, 5 Sep 2015 20:46:30 -0700 (PDT)
Received: from out4133-50.mail.aliyun.com (out4133-50.mail.aliyun.com
[42.120.133.50])
by ietfa.amsl.com (Postfix) with ESMTP id B55451ACE0E
for <nmlrg@irtf.org>; Sat, 5 Sep 2015 20:46:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=alibaba-inc.com; s=default;
t=1441511188; h=Date:Subject:From:To:Message-ID:Mime-version:Content-type;
bh=zpPf3DI4o1cE7skXrrsErVvTiWKdRqqs6/klNuQrqbA=;
b=KlTdM2uzMB+Riqruj9vWO3RCwVQWteVgGfCjHXK+8XVeCb49AYMUN22KQ/imCXbggZ9bIEq/AOcf1f6L/taHrzkUUpx+WVFal2DyJJD49zprKB0N+8UkSV8ww5uhQ6Yv3uVL0YtaSqSXjFawKZhbhIEWp4YK0IQlNXX/X//RW6U=
X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R191e4;
FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03296; MF=dacheng.zdc@alibaba-inc.com; NM=1;
PH=DS; RN=1; SR=0;
Received: from 10.32.179.196(mailfrom:dacheng.zdc@alibaba-inc.com
ip:182.92.253.16) by smtp.aliyun-inc.com(127.0.0.1);
Sun, 06 Sep 2015 11:46:22 +0800
User-Agent: Microsoft-MacOutlook/14.5.4.150722
Date: Sun, 06 Sep 2015 11:46:19 +0800
From: "Dacheng Zhang" <dacheng.zdc@alibaba-inc.com>
To: <nmlrg@irtf.org>
Message-ID: <D211D7F2.2651C%dacheng.zdc@alibaba-inc.com>
Thread-Topic: [Nmlrg] Machine Learning in network - solicitation for use cases
References: <D20A251E.25E52%dacheng.zdc@alibaba-inc.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2B192@nkgeml512-mbx.china.huawei.com>
<D20B2C03.25EC7%dacheng.zdc@alibaba-inc.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2D062@nkgeml512-mbx.china.huawei.com>
<D211D160.26495%dacheng.zdc@alibaba-inc.com>
In-Reply-To: <D211D160.26495%dacheng.zdc@alibaba-inc.com>
Mime-version: 1.0
Content-type: text/plain;
charset="GB2312"
Content-transfer-encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmlrg/QT_gBx0O36izRc8H4TIC_Vi6L4g>
Subject: Re: [Nmlrg] Machine Learning in network - solicitation for use cases
X-BeenThere: nmlrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Machine Learning Research Group <nmlrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmlrg>,
<mailto:nmlrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmlrg/>
List-Post: <mailto:nmlrg@irtf.org>
List-Help: <mailto:nmlrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmlrg>,
<mailto:nmlrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Sep 2015 03:46:31 -0000
>Some more detailed introduction. > >DDoS and APT are very active research topics. Application layer DDoS >attacks are more difficult to detect than layer 4 DDoS attacks. In many >cases, the application layer DDoS does not introduce large amount >traffics.However, by using big data and data mining tech, it is possible >to find out the clues of such attacks. > >There were some related discussions in Dots. If you are interested, I >could find them out later. > > >>>>> >>>>>>-----Original Message----- >>>>>>From: Dacheng Zhang [mailto:dacheng.zdc@alibaba-inc.com] >>>>>>Sent: Monday, August 31, 2015 3:39 PM >>>>>>To: Sheng Jiang; nmlrg@irtf.org >>>>>>Subject: Re: [Nmlrg] Machine Learning in network - solicitation for >>>>>>use >>>>>>cases >>>>>> >>>>>>I think ML on security would be a good use case. For instance, Huawei >>>>>>is >>>>>>proposing an approaching using big data for more accurate DDoS >>>>>>detection. >>>>>> >>>>>>Cheers >>>>>> >>>>>>Dacheng >>>>>> >>>>>> >>>>>> >>>>>>在 15-8-31 上午11:15, "nmlrg on behalf of Sheng Jiang" >>>>>><nmlrg-bounces@irtf.org on behalf of jiangsheng@huawei.com> 写入: >>>>>> >>>>>>>Hi, all, >>>>>>> >>>>>>>Thanks for subscribe to NMLRG (Network Machine Learning) mail list. >>>>>>>As >>>>>we >>>>>>>know, there are already many ongoing researches for Machine Learning >>>in >>>>>>>network, in many areas. But up to now, there are few matured >>>>>>>applications >>>>>>>yet. So it is the time for a Research Group to work on this >>>>>>>future-oriented technology. >>>>>>> >>>>>>>The first step would be to collect possible use cases: where the >>>>>>>machine >>>>>>>learning mechanism could be used in networks. The use cases does not >>>>>need >>>>>>>to be mature, but should have potential. >>>>>>> >>>>>>>Note that this topic is rapidly moving from academic research into >>>>>>>practical application. Therefore, use cases from university >>>>>>>environments, >>>>>>>industrial research and development organizations are all welcome. >>>>>>> >>>>>>>Best regards, >>>>>>> >>>>>>>Sheng >>>>>>>_______________________________________________ >>>>>>>nmlrg mailing list >>>>>>>nmlrg@irtf.org >>>>>>>https://www.irtf.org/mailman/listinfo/nmlrg >>>>>> >>>> >>> >> >
- [Nmlrg] Machine Learning in network - solicitatio… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- [Nmlrg] Using Machine Learning for Network Device… Liubing (Leo)
- Re: [Nmlrg] Using Machine Learning for Network De… Sheng Jiang
- Re: [Nmlrg] Using Machine Learning for Network De… Liubing (Leo)
- Re: [Nmlrg] Using Machine Learning for Network De… Sheng Jiang
- Re: [Nmlrg] Using Machine Learning for Network De… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang