Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016



Similar documents
Machine Learning: Overview

Machine Learning Introduction

Introduction to Machine Learning Lecture 1. Mehryar Mohri Courant Institute and Google Research

Learning is a very general term denoting the way in which agents:

Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA

Intended status: Standards Track October 8, 2014 Expires: April 11, 2015

Machine Learning CS Lecture 01. Razvan C. Bunescu School of Electrical Engineering and Computer Science

Machine Learning. Chapter 18, 21. Some material adopted from notes by Chuck Dyer

Steven C.H. Hoi School of Information Systems Singapore Management University

DATA MINING TECHNIQUES AND APPLICATIONS

Internet Engineering Task Force (IETF) Category: Informational. February 2013

MA2823: Foundations of Machine Learning

BIOINF 585 Fall 2015 Machine Learning for Systems Biology & Clinical Informatics

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

Using Artificial Intelligence to Manage Big Data for Litigation

D A T A M I N I N G C L A S S I F I C A T I O N

Contents. Dedication List of Figures List of Tables. Acknowledgments

8. Machine Learning Applied Artificial Intelligence

P. van der Stok. Intended status: Informational February 14, 2014 Expires: August 18, 2014

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks

Applications of Deep Learning to the GEOINT mission. June 2015

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin

Internet Engineering Task Force (IETF) Juniper Networks January 2014

Machine Learning and Data Mining. Fundamentals, robotics, recognition

INTRODUCTION TO MACHINE LEARNING 3RD EDITION

Data Mining Part 5. Prediction

Internet Engineering Task Force (IETF) Request for Comments: 6422 Updates: 3315 Category: Standards Track ISSN: December 2011

Nine Common Types of Data Mining Techniques Used in Predictive Analytics

NEURAL NETWORKS IN DATA MINING

Machine Learning using MapReduce

Introduction to Data Mining

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

Prerequisites. Course Outline

CSE 517A MACHINE LEARNING INTRODUCTION

Intended status: Informational January 15, 2014 Expires: July 19, 2014

Design & Implementation about Mining Enterprise EAM (Enterprise Asset Management) System

Introduction to Machine Learning Using Python. Vikram Kamath

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

Welcome. Data Mining: Updates in Technologies. Xindong Wu. Colorado School of Mines Golden, Colorado 80401, USA

How To Use Neural Networks In Data Mining

Software Development Training Camp 1 (0-3) Prerequisite : Program development skill enhancement camp, at least 48 person-hours.

Machine Learning Capacity and Performance Analysis and R

Course 395: Machine Learning

ISSN: (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies

Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15

Maschinelles Lernen mit MATLAB

Data Mining and Machine Learning in Bioinformatics

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

Sense Making in an IOT World: Sensor Data Analysis with Deep Learning

Classification algorithm in Data mining: An Overview

Intrusion Detection via Machine Learning for SCADA System Protection

Data Mining + Business Intelligence. Integration, Design and Implementation

Data Mining for Business Analytics

Data Warehousing and Data Mining in Business Applications

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Dan French Founder & CEO, Consider Solutions

Using Data Mining for Mobile Communication Clustering and Characterization

Introduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing

Introduction to Data Mining

Discovering, Not Finding. Practical Data Mining for Practitioners: Level II. Advanced Data Mining for Researchers : Level III

Mobile Phone APP Software Browsing Behavior using Clustering Analysis

CS 2750 Machine Learning. Lecture 1. Machine Learning. CS 2750 Machine Learning.

ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING)

Sanjeev Kumar. contribute

Introduction to Learning & Decision Trees

: Introduction to Machine Learning Dr. Rita Osadchy

ADVANCED MACHINE LEARNING. Introduction

Knowledge Based Descriptive Neural Networks

Advanced analytics at your hands

Customer Classification And Prediction Based On Data Mining Technique

CPSC 340: Machine Learning and Data Mining. Mark Schmidt University of British Columbia Fall 2015

Machine Learning and Statistics: What s the Connection?

Internet Engineering Task Force. Intended status: Experimental Expires: September 6, 2012 March 5, 2012

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

The Cyber Threat Profiler

Data Mining and Neural Networks in Stata

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning

Data Mining. 1 Introduction 2 Data Mining methods. Alfred Holl Data Mining 1

Analytics on Big Data

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning

MS1b Statistical Data Mining

Machine Learning. CUNY Graduate Center, Spring Professor Liang Huang.

Machine Learning. Mausam (based on slides by Tom Mitchell, Oren Etzioni and Pedro Domingos)

Data Mining Solutions for the Business Environment

Master's projects at ITMO University. Daniil Chivilikhin PhD ITMO University

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

6.2.8 Neural networks for data mining

Intended status: Standards Track

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

INVESTIGATIONS INTO EFFECTIVENESS OF GAUSSIAN AND NEAREST MEAN CLASSIFIERS FOR SPAM DETECTION

Ericsson Y. Tochio, Ed. Fujitsu H. van Helvoort, Ed. Hai Gaoming BV M. Vissers, Ed. Huawei P. Doolan, Ed. Coriant October 15, 2015

Comparison of K-means and Backpropagation Data Mining Algorithms

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

Increasing the Efficiency of Customer Relationship Management Process using Data Mining Techniques

Data Mining Analytics for Business Intelligence and Decision Support

Learning outcomes. Knowledge and understanding. Competence and skills

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

How To Create A Text Classification System For Spam Filtering

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree

Azure Machine Learning, SQL Data Mining and R

Transcription:

Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00 This document introduces background information of machine learning briefly, then explores the potential of machine learning techniques for networks. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on April 21, 2016. Copyright Notice Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Jiang Expires April 21, 2016 [Page 1]

Table of Contents 1. Introduction........................ 2 2. Terminology......................... 3 3. Brief Background of Machine Learning............ 3 3.1. Machine Learning Categories............... 3 3.2. Machine Learning Approaches............... 3 3.3. Successful Applications................. 5 3.4. Precondition of Applying Machine Learning Approach... 5 3.5. Limitation of Machine Learning Mechanism........ 5 4. Case Study of Applying Machine Learning in Network..... 6 5. Security Considerations................... 7 6. IANA Considerations..................... 7 7. Acknowledgements...................... 7 8. Change log [RFC Editor: Please remove]........... 7 9. Informative References................... 7 Author s Address........................ 7 1. Introduction Machine learning techniques help to make predictions or decisions by learning from historical data. As machine learning mechanism could dynamically adapt to varying situations and enhance their own intelligence by learning from new data, they are more flexible in handling complicated tasks than strictly static program instructions. Therefore, machine learning techniques have been widely applied in image analysis, pattern recognition, language recognition, conversation simulation, and etc. With deep exploration, machine learning techniques would cast light on studies of autonomic networking, in that they could be well adapted to learn the various environments of networks and react to dynamic situations. This document firstly provides background information of machine learning briefly, then explores the potential of machine learning techniques for networks functions, such as network control, network management, and supplying network data for upper-layer applications. Author notice: this document is in the primary stage. It is an ongoing document for the proposed Network Machine Learning Research Group. For now, it is not clear whether it would be published or not. Jiang Expires April 17, 2016 [Page 2]

2. Terminology The terminology defined in this document. Machine Learning A computational mechanism that analyzes and learns from data input, either historic data or real-time feedback data, following designed model/pattern. It can be used to make predictions or decision, rather than following strictly static program instructions. 3. Brief Background of Machine Learning 3.1. Machine Learning Categories Machine learning mechanisms are typically classified into three broad categories, depending on the nature of the learning "signal" or "feedback" available: Supervised learning The machine learning mechanism is given labeled inputs and the correspondent desired outputs. The mechanism could learn a general rule that maps inputs to outputs by itself. Unsupervised learning The given input are not labeled. It leaves the machine learning mechanism itself to find structure in its input and output. Reinforcement learning The machine learning mechanism interacts with dynamic environments in which it performs a certain task and receives feedback from its action. Between supervised and unsupervised learning, there is semisupervised learning, in which input data are partially labeled. 3.2. Machine Learning Approaches There are a few basic machine learning approaches. They can be mixed together to complete complicated tasks. Classification With the training data that has been labeled into a number of classes, the machine learning mechanism could assign new unlabeled data into one or more these classes. An example is SPAM filtering, in which emails are classified into "spam" or "not spam" classes. Clustering Without labeled training data, the machine learning mechanism divides data into groups. It is the learning mechanism itself to decide the number or structure of output classes. Jiang Expires April 17, 2016 [Page 3]

Regression It estimates the relationships among variables. The outputs are continuous. Anomaly detection It detects specific data which do not conform to an expected pattern or other data in a data set. Density estimation The machine learning mechanism needs to identify the distribution of input data. Dimensionality reduction The machine learning mechanism could simplify inputs by mapping them into a lower-dimensional space. Decision tree learning The learning output is structured into a decision tree as a predictive model. Association rule learning The learning delivers potential relations between variables. Artificial neural networks also called "neural network". It is inspired by the structure and functions of biological neural networks. It is structured by a number of interconnected computational "neurons", each of which has independent deciding ability. The connections have numeric weights that can be tuned according to feedback and trends, making neural nets adaptive to inputs and capable of learning. Reinforcement learning It is inspired by behaviorist psychology. The mechanism take actions in an environment so as to maximize cumulative reward. Similarity and metric learning It learns from training data a similarity function that measures how similar or related two objects are. Representation learning Also called feature learning. It learns a feature - a transformation of raw data input to a representation that can be effectively exploited in machine learning tasks. This is not a full enumerated list of machine learning approaches. Other approaches may include support vector machines, bayesian networks, inductive logic programming, sparse dictionary learning, genetic algorithms, and etc. Editor notes: the basic algorithms that machine learning approaches use may be listed as a future work. It may be too detailed and too many to be included. Jiang Expires April 21, 2016 [Page 4]

3.3. Successful Applications Machine learning approaches have been successfully applied in many areas, such as human behavior analysis, image analysis, nature language recognition (including speech and handwriting processing), conversation simulation, medical diagnosis, structural health monitoring, stock market analysis, biological analysis and classifying, loan and insurance evaluation, game playing, and many other applications. As for network applications, such as search engines, SPAM filtering, adaptive website, Internet fraud detection, online advertising, etc., have all been greatly benefited from the machine learning mechanism. However, most of those successful stories are in the application layer of network perspective. 3.4. Precondition of Applying Machine Learning Approach Although it is different from big data or data mining, machine learning does also need data. However, machine learning can be applied with small set of data or dynamic feedback from environment. The quality of data decides the efficient and accuracy of machine learning. There is no generic machine learning mechanism that could suitable for all or most of use cases. For each use case, the developers need to design a specific analysis path, which may combine multiple approaches or algorithms together. The feature design and analysis path design are the key factor in the machine learning applications. To achieve autonomic decision or minimize the human intervention, there should be evaluation system for the results of machine learning mechanism. The evaluation system could be the measurement that the results of machine learning mechanism are executed. The evaluation system and machine learning mechanism could compose a close decision loop for autonomic decision. 3.5. Limitation of Machine Learning Mechanism So far, the machine learning mechanism does not perform very well for accurate result. In most successful cases, it is used as an assistant analysis tool. Its results are usually accepted in faulttolerant environment or with further human confirmation. Jiang Expires April 17, 2016 [Page 5]

4. Use Cases Study of Applying Machine Learning in Network The Network Machine Learning Research Group (NMLRG) provides a forum for researchers to explore the potential of machine learning techniques for networks. In particular, the NMLRG will work on potential approaches that apply machine learning techniques in network control, network management, and supplying network data for upper-layer applications. The initial focus of the NMLRG will be on higher-layer concepts where the machine learning mechanism could be applied in order to enhance the network establishing, controlling, managing, network applications and customer services. This includes mechanisms to acquire knowledge from the existing networks so that new networks can be established with minimum efforts; the potential to use machine learning mechanisms for routing control and optimization; using machine learning mechanisms in network management to predict future network status; using machine learning mechanisms to autonomic and dynamical network management; using machine learning mechanisms to analyze network faults and support recovery; learning network attacks and their behaviors, so that protection mechanisms could be selfadapted; unifying the data structure and the communication interface between network/network devices and customers, so that the upper-layer applications could easily obtain relevant network information, etc. The NMLRG is expected to identify and document requirements, to survey possible approaches, to provide specifications for proposed solutions, and to prove concepts with prototype implementations that can be tested in real-world environments. The more knowledge we have, the more intelligent we are. It is the same for networks and network management. Up to now, the only available network knowledge is usually the current network status inside a given device or relevant current status from other devices. However, historic knowledge is very helpful to make correct decisions, in particular to reduce network oscillation or to manage network resources over time. Transplantable knowledge from other networks can be helpful to initially set up a new network or new network devices. Knowledge of relationships between network events and network configuration may help a network to decide the best parameters according to real performance feedback. In addition to such historic knowledge, powerful data analytics of current network conditions may also be a valuable source of knowledge that can be exploited directly. The machine learning mechanism is the correspondent mechanism to learn and apply knowledge intelligently. Jiang Expires April 17, 2016 [Page 6]

5. Security Considerations This document is focused on applying machine learning in network, including of course applying machine learning in network security, on higher-layer concepts. Therefore, it does not itself create any new security issues. 6. IANA Considerations This memo includes no request to IANA. 7. Acknowledgements The author would like to acknowledge the valuable comments made by participants in the IRTF Network Machine Learning Research Group, particular thanks to Brian Carpenter, Shufan Ji and Bing Liu. This document was produced using the xml2rfc tool [RFC2629]. 8. Change log [RFC Editor: Please remove] draft-jiang-nmlrg-network-machine-learning-00: original version, 2015-10-19. 9. Informative References [RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629, DOI 10.17487/RFC2629, June 1999, <http://www.rfc-editor.org/info/rfc2629>. Author s Address Sheng Jiang Huawei Technologies Co., Ltd Q14, Huawei Campus, No.156 Beiqing Road Hai-Dian District, Beijing, 100095 P.R. China Email: jiangsheng@huawei.com Jiang Expires April 17, 2016 [Page 7]