Re: [Nmlrg] Machine Learning in network - solicitation for use cases

"Dacheng Zhang" <dacheng.zdc@alibaba-inc.com> Sun, 06 September 2015 03:46 UTC

Return-Path: <dacheng.zdc@alibaba-inc.com>
X-Original-To: nmlrg@ietfa.amsl.com
Delivered-To: nmlrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 964A71ACE6A for <nmlrg@ietfa.amsl.com>; Sat, 5 Sep 2015 20:46:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.451
X-Spam-Level:
X-Spam-Status: No, score=0.451 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MIME_CHARSET_FARAWAY=2.45, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id runiPVUyhHjc for <nmlrg@ietfa.amsl.com>; Sat, 5 Sep 2015 20:46:30 -0700 (PDT)
Received: from out4133-50.mail.aliyun.com (out4133-50.mail.aliyun.com [42.120.133.50]) by ietfa.amsl.com (Postfix) with ESMTP id B55451ACE0E for <nmlrg@irtf.org>; Sat, 5 Sep 2015 20:46:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alibaba-inc.com; s=default; t=1441511188; h=Date:Subject:From:To:Message-ID:Mime-version:Content-type; bh=zpPf3DI4o1cE7skXrrsErVvTiWKdRqqs6/klNuQrqbA=; b=KlTdM2uzMB+Riqruj9vWO3RCwVQWteVgGfCjHXK+8XVeCb49AYMUN22KQ/imCXbggZ9bIEq/AOcf1f6L/taHrzkUUpx+WVFal2DyJJD49zprKB0N+8UkSV8ww5uhQ6Yv3uVL0YtaSqSXjFawKZhbhIEWp4YK0IQlNXX/X//RW6U=
X-Alimail-AntiSpam: AC=PASS; BC=-1|-1; BR=01201311R191e4; FP=0|-1|-1|-1|0|-1|-1|-1; HT=e02c03296; MF=dacheng.zdc@alibaba-inc.com; NM=1; PH=DS; RN=1; SR=0;
Received: from 10.32.179.196(mailfrom:dacheng.zdc@alibaba-inc.com ip:182.92.253.16) by smtp.aliyun-inc.com(127.0.0.1); Sun, 06 Sep 2015 11:46:22 +0800
User-Agent: Microsoft-MacOutlook/14.5.4.150722
Date: Sun, 06 Sep 2015 11:46:19 +0800
From: "Dacheng Zhang" <dacheng.zdc@alibaba-inc.com>
To: <nmlrg@irtf.org>
Message-ID: <D211D7F2.2651C%dacheng.zdc@alibaba-inc.com>
Thread-Topic: [Nmlrg] Machine Learning in network - solicitation for use cases
References: <D20A251E.25E52%dacheng.zdc@alibaba-inc.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2B192@nkgeml512-mbx.china.huawei.com> <D20B2C03.25EC7%dacheng.zdc@alibaba-inc.com> <5D36713D8A4E7348A7E10DF7437A4B927BB2D062@nkgeml512-mbx.china.huawei.com> <D211D160.26495%dacheng.zdc@alibaba-inc.com>
In-Reply-To: <D211D160.26495%dacheng.zdc@alibaba-inc.com>
Mime-version: 1.0
Content-type: text/plain; charset="GB2312"
Content-transfer-encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmlrg/QT_gBx0O36izRc8H4TIC_Vi6L4g>
Subject: Re: [Nmlrg] Machine Learning in network - solicitation for use cases
X-BeenThere: nmlrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Machine Learning Research Group <nmlrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmlrg>, <mailto:nmlrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmlrg/>
List-Post: <mailto:nmlrg@irtf.org>
List-Help: <mailto:nmlrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmlrg>, <mailto:nmlrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Sep 2015 03:46:31 -0000


>Some more detailed introduction.
>
>DDoS and APT are very active research topics. Application layer DDoS
>attacks are more difficult to detect than layer 4 DDoS attacks. In many
>cases, the application layer DDoS does not introduce large amount
>traffics.However, by using big data and data mining tech, it is possible
>to find out the clues of such attacks.
>
>There were some related discussions in Dots. If you are interested, I
>could find them out later.
>
>
>>>>>
>>>>>>-----Original Message-----
>>>>>>From: Dacheng Zhang [mailto:dacheng.zdc@alibaba-inc.com]
>>>>>>Sent: Monday, August 31, 2015 3:39 PM
>>>>>>To: Sheng Jiang; nmlrg@irtf.org
>>>>>>Subject: Re: [Nmlrg] Machine Learning in network - solicitation for
>>>>>>use
>>>>>>cases
>>>>>>
>>>>>>I think ML on security would be a good use case. For instance, Huawei
>>>>>>is
>>>>>>proposing an approaching using big data for more accurate DDoS
>>>>>>detection.
>>>>>>
>>>>>>Cheers
>>>>>>
>>>>>>Dacheng
>>>>>>
>>>>>>
>>>>>>
>>>>>>在 15-8-31 上午11:15, "nmlrg on behalf of Sheng Jiang"
>>>>>><nmlrg-bounces@irtf.org on behalf of jiangsheng@huawei.com> 写入:
>>>>>>
>>>>>>>Hi, all,
>>>>>>>
>>>>>>>Thanks for subscribe to NMLRG (Network Machine Learning) mail list.
>>>>>>>As
>>>>>we
>>>>>>>know, there are already many ongoing researches for Machine Learning
>>>in
>>>>>>>network, in many areas. But up to now, there are few matured
>>>>>>>applications
>>>>>>>yet. So it is the time for a Research Group to work on this
>>>>>>>future-oriented technology.
>>>>>>>
>>>>>>>The first step would be to collect possible use cases: where the
>>>>>>>machine
>>>>>>>learning mechanism could be used in networks. The use cases does not
>>>>>need
>>>>>>>to be mature, but should have potential.
>>>>>>>
>>>>>>>Note that this topic is rapidly moving from academic research into
>>>>>>>practical application. Therefore, use cases from university
>>>>>>>environments,
>>>>>>>industrial research and development organizations are all welcome.
>>>>>>>
>>>>>>>Best regards,
>>>>>>>
>>>>>>>Sheng
>>>>>>>_______________________________________________
>>>>>>>nmlrg mailing list
>>>>>>>nmlrg@irtf.org
>>>>>>>https://www.irtf.org/mailman/listinfo/nmlrg
>>>>>>
>>>>
>>>
>>
>