Re: [Nmlrg] Machine Learning in network - solicitation for use cases
Jérôme François <jerome.francois@inria.fr> Wed, 16 September 2015 16:13 UTC
Return-Path: <jerome.francois@inria.fr>
X-Original-To: nmlrg@ietfa.amsl.com
Delivered-To: nmlrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id B4CEC1A0091
for <nmlrg@ietfa.amsl.com>; Wed, 16 Sep 2015 09:13:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.559
X-Spam-Level:
X-Spam-Status: No, score=-3.559 tagged_above=-999 required=5
tests=[BAYES_50=0.8, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001,
MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01]
autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id ZBxfEEbNqMez for <nmlrg@ietfa.amsl.com>;
Wed, 16 Sep 2015 09:13:19 -0700 (PDT)
Received: from mail3-relais-sop.national.inria.fr
(mail3-relais-sop.national.inria.fr [192.134.164.104])
(using TLSv1.2 with cipher RC4-SHA (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 2E29A1A02BE
for <nmlrg@irtf.org>; Wed, 16 Sep 2015 09:13:19 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.17,540,1437429600";
d="scan'208,217";a="147502789"
Received: from marly.loria.fr (HELO [152.81.8.41]) ([152.81.8.41])
by mail3-relais-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES128-SHA;
16 Sep 2015 18:13:17 +0200
Message-ID: <55F9951C.8010703@inria.fr>
Date: Wed, 16 Sep 2015 18:13:16 +0200
From: =?UTF-8?B?SsOpcsO0bWUgRnJhbsOnb2lz?= <jerome.francois@inria.fr>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: nmlrg@irtf.org
References: <D20A251E.25E52%dacheng.zdc@alibaba-inc.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2B192@nkgeml512-mbx.china.huawei.com>
<D20B2C03.25EC7%dacheng.zdc@alibaba-inc.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2D062@nkgeml512-mbx.china.huawei.com>
<D211D160.26495%dacheng.zdc@alibaba-inc.com>
<D211D7F2.2651C%dacheng.zdc@alibaba-inc.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2D300@nkgeml512-mbx.china.huawei.com>
<55EC9987.9030002@gmail.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2D65D@nkgeml512-mbx.china.huawei.com>
<55ED09ED.3090406@gmail.com>
<5D36713D8A4E7348A7E10DF7437A4B927BB2DD75@nkgeml512-mbx.china.huawei.com>
<8AE0F17B87264D4CAC7DE0AA6C406F45C227BE52@nkgeml506-mbx.china.huawei.com>
<55EE6648.4040804@gmail.com>
In-Reply-To: <55EE6648.4040804@gmail.com>
Content-Type: multipart/alternative;
boundary="------------040303010504010900010001"
Archived-At: <http://mailarchive.ietf.org/arch/msg/nmlrg/Z6evgS4S3uAbPSAUZbkCqZpWT3k>
Subject: Re: [Nmlrg] Machine Learning in network - solicitation for use cases
X-BeenThere: nmlrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Machine Learning Research Group <nmlrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmlrg>,
<mailto:nmlrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmlrg/>
List-Post: <mailto:nmlrg@irtf.org>
List-Help: <mailto:nmlrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmlrg>,
<mailto:nmlrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Sep 2015 16:13:21 -0000
Hi , > > The two cases are rather different. > > 1. The system signals "attack in progress" to the NOC. The operators have a look > and decide that there is no attack, it is just some unusual traffic. > (Example: you are live-streaming the Olympic Games. Two seconds after the > end of the 100 metres final, there is an enormous burst of traffic. > The machine learning system signals an attack, because it was not trained > on the data set from the previous Olympic Games.) > > In this case the NOC operators urgently tell the algorithm it is wrong. > It needs to learn that the signature of a sudden burst just after the > end of an event is less likely to be an attack than a sudden burst > at another time. > > 2. Someone invents a new kind of DDoS attack, which is therefore not > in the historical training data. The system doesn't identify it. > In this case, the NOC operators tell the algorithm "Attack started > at <time>." This automatically becomes high quality training data > for the algorithm: the signature of the new traffic at that time > is 100% certain to be an attack. > > I think the hard part is extracting useful signatures from the > traffic stream in real time; the learning/training part is fairly > standard. > > Brian > > Extracting the signatures should be the output of the learning part but ML algorithms will not necessarily produce standards signatures like patterns, for example this can consist in a set of classifier functions. Also, I think most of efforts have been done on the automated detection in the past making the human relatively not active during the detection, usually limited to tell yes or no (case 1), more interactive real-time ML would be helpful for complex attacks like APT to support the human decisions. jerome
- [Nmlrg] Machine Learning in network - solicitatio… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- [Nmlrg] Using Machine Learning for Network Device… Liubing (Leo)
- Re: [Nmlrg] Using Machine Learning for Network De… Sheng Jiang
- Re: [Nmlrg] Using Machine Learning for Network De… Liubing (Leo)
- Re: [Nmlrg] Using Machine Learning for Network De… Sheng Jiang
- Re: [Nmlrg] Using Machine Learning for Network De… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- Re: [Nmlrg] Machine Learning in network - solicit… Dacheng Zhang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Sebastian Abt
- Re: [Nmlrg] Machine Learning in network - solicit… Brian E Carpenter
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Jérôme François
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang
- Re: [Nmlrg] Machine Learning in network - solicit… Liubing (Leo)
- Re: [Nmlrg] Machine Learning in network - solicit… Sheng Jiang