SlideShare una empresa de Scribd logo
1 de 31
APPLICABILITY OF MACHINE
LEARNING AND COGNITIVE
COMPUTING IN COMPUTER
NETWORKS
Chetan Kumar S
INDUSTRY EXPERTS SPEAK
• You might be surprised but what is going to drive
innovation in the enterprise and public cloud is machine
learning
--- Bill Coughran, Sequoia Capital
• Machine Learning is the way we are going to automate
your automation
--- Chris Wright, RedHat CTO
WHAT IS MACHINE LEARNING
• The complexity in traditional computer programming is in the
code (programs that people write). In machine learning, learning
algorithms are in principle simple and the complexity (structure) is
in the data. Is there a way that we can automatically learn that
structure? That is what is at the heart of machine learning.
-- Andrew Ng
WHAT IS MACHINE LEARNING
Traditional
Programming
Machine
Learning
Data
Program
Output
Data
Output/Events/Nill
Program
MACHINE LEARNING TASKS
• Supervised learning is regarded as a machine learning task of inferring a function
from labelled training data.
• Unsupervised learning: This is regarded as the machine learning task of inferring a
function to describe hidden structures from unlabelled data.
• Reinforcement learning is an area of machine learning that is linked to how software
agents take actions in the environment so as to maximise some notion of
cumulative reward.
Here is Machine Learning
MACHINE LEARNING USECASES
• Security/Anomaly Detection
• Site Reliability Engineering
• Predicting and remediating problems IOT and enterprise networks
• Intent based Networking
• NFV orchestration and optimization
• New automation tools for DevOps
• Network control plane optimization
• Network Gamification
Secure Networks
Reliable Networks
Simple Networks
Optimized Networks
USECASE NETWORK OPERATION
KNOWLEDGE PLANE FOR
NETWORKS
• Defined by Clark D and others, in 2003
• Subsequently re-defined by Albert Mestres et. al.,
Clark, D., et al. ”A knowledge plane for the internet,” Proceedings of the 2003
conference on Applications, technologies, architectures, and protocols for computer
communications. ACM, 2003
Albert Mestres., et al. “Knowledge-Defined Networking”, CoRR, 2016.
COMPONENTS OF KDN
• The PROBLEM: Networks are distributed and each node has partial view of network
• What made this happen ? From 2003 to 20017 ?
• Streaming telemetry from network devices, NetFlow, IPFIX among others
• Network data analytics platforms
• Centralized controller architecture for network, defined via SDN or it variants
KNOWLEDGE BASED NETWORK
DATA PLANE
CONTROL PLANE
KNOWLEDGE PLANE
MANAGEMENTPLANE
KnowledgeDefinedNetwork
OperationalLoop
Courtesy:AlbertMestres.,etal.
OVERLAY NETWORK POLICIES
BUILDING OPTIMIZED NETWORK
• Big enterprise typically setup a overlay networks, using some encapsulation
technique
• Underlay networks are owned by service providers
• Now if there are multiple links connecting to underlay network, how to make best
choice ?
OVERLAY NETWORKS
Underlay Network
HOW TO OPTIMIZE
• How can we detect which link the overlay network can take
• Can system learn the underlay network delay/reliability characteristics ?
• If one can predict the network parameters for underlay (which is not owned by
overlay), right policies can be applied
• Can perform many actions like, which link best for video services, database services
etc.
NETWORK CONFIG ERRORS
CONFIG AUDITS
• A system that can learn the network configuration
• Apply best practice to the configs
• Can audit configs
• For example, if the system can learn what is encrypted traffic, can do security audit
• Can recognize configs that caused misbehavior in network
CONFIG ERRORS
Users in green VLAN, cash registers in blue VLAN
Wrong config, cash register in wrong VLAN
CONFIG ERRORS
• More common in IOT and converged networks, due to shear numbers
• Can learn the traffic and identify the device
• Can alert wrong config
• Can correct the wrong config
• Helps in troubleshooting
USECASE NETWORK ANOMALY DETECTION
NETWORK ANOMALY DETECTION
• A network anomaly is a sudden and short-lived deviation from the normal operation
of the network
• Anomaly caused due to an attack on network, malware flowing in network or pure
accident such as failure
• An intruder attacks the network
• Malware replicating in the network
• Interface down and traffic surges on backup link
• Bug that causes device to crash!
• Quick detection is needed to initiate a timely response,
CISCO ETA
• ETA (Encrypted Traffic Analytics)
• Detect malware based on traffic pattern, rather than traffic content
• “Signature based” malware detection fails if malware is encrypted
• Need to identify the traffic pattern for a malware, now just look out for such a traffic
in your network
CISCO ETA
Switch/router records
traffic flows
A cognitive Agent performs
malware detection
CISCO SLN
• SLN is fundamentally a hyper-distributed analytics platform ...
• Putting together analytics and networking ...
• Goldmine of untouched data on networking gear (sensing)
• Network learns and computes models on premise (analytics)
• The Network adapts, modifies its behavior (control)
• SLN for Security: attacks are incredibly sophisticated and targeted, exfiltration of
data being a major concern, requiring a next-generation approach => Stealthwatch
Learning Networks
CISCO SLN
FEW RESOURCES
OPEN SOURCE FRAMEWORK
• open source frame work from google https://www.tensorflow.org
• From facebook http://torch.ch
• Open source libraries
• http://scikit-learn.org/stable
• http://spark.apache.org/mllib/
• More on http://opensourceforu.com/2017/01/best-open-source-machine-learning-
frameworks/
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networks

Más contenido relacionado

La actualidad más candente

12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain TechnologyAhmed Banafa
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
Blockchain Technology In IOT
Blockchain Technology In IOTBlockchain Technology In IOT
Blockchain Technology In IOTStacey Roberts
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
IoT and Blockchains - enhancing security and privacy
IoT and Blockchains - enhancing security and privacyIoT and Blockchains - enhancing security and privacy
IoT and Blockchains - enhancing security and privacyPaul Fremantle
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoTPaul Fremantle
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBiagio Botticelli
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesPistoia Alliance
 
IoT, Fog Computing and the Blockchain
IoT, Fog Computing and the BlockchainIoT, Fog Computing and the Blockchain
IoT, Fog Computing and the Blockchainkumar641
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU Ahmed Banafa
 
Thing Monk 2017 - Blockchain Secured IOT
Thing Monk 2017 - Blockchain Secured IOTThing Monk 2017 - Blockchain Secured IOT
Thing Monk 2017 - Blockchain Secured IOTJoseph Pindar
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsGordon Haff
 
Blockchains and the IoT
Blockchains and the IoTBlockchains and the IoT
Blockchains and the IoTMongoDB
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 

La actualidad más candente (20)

12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain Technology
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
Blockchain Technology In IOT
Blockchain Technology In IOTBlockchain Technology In IOT
Blockchain Technology In IOT
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
IoT and Blockchains - enhancing security and privacy
IoT and Blockchains - enhancing security and privacyIoT and Blockchains - enhancing security and privacy
IoT and Blockchains - enhancing security and privacy
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
IoT, Fog Computing and the Blockchain
IoT, Fog Computing and the BlockchainIoT, Fog Computing and the Blockchain
IoT, Fog Computing and the Blockchain
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
Thing Monk 2017 - Blockchain Secured IOT
Thing Monk 2017 - Blockchain Secured IOTThing Monk 2017 - Blockchain Secured IOT
Thing Monk 2017 - Blockchain Secured IOT
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
Blockchains and the IoT
Blockchains and the IoTBlockchains and the IoT
Blockchains and the IoT
 
BaaS for IoT
BaaS for IoTBaaS for IoT
BaaS for IoT
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 

Similar a Applicability of Machine learning in computer networks

Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2John Rooksby
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxtalkaton
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdftalkaton
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...James Crawshaw
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptxMilanap1
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolIssar Kapadia
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkDellNMS
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 

Similar a Applicability of Machine learning in computer networks (20)

Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
 
Edge Computing TS.pptx
Edge Computing TS.pptxEdge Computing TS.pptx
Edge Computing TS.pptx
 
Design of network
Design of networkDesign of network
Design of network
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
Fog computing
Fog computingFog computing
Fog computing
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
2.pdf
2.pdf2.pdf
2.pdf
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 
42 grid computing
42 grid computing42 grid computing
42 grid computing
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
cloud computing
cloud computingcloud computing
cloud computing
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 

Más de Chetan Kumar S

Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveChetan Kumar S
 
Human Machine Interface for Enterprise Applications
Human Machine Interface for Enterprise ApplicationsHuman Machine Interface for Enterprise Applications
Human Machine Interface for Enterprise ApplicationsChetan Kumar S
 
How to start your IOT journey
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journeyChetan Kumar S
 
Computational Intelligence and Applications
Computational Intelligence and ApplicationsComputational Intelligence and Applications
Computational Intelligence and ApplicationsChetan Kumar S
 
blockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challangesblockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and ChallangesChetan Kumar S
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsChetan Kumar S
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication ServicesChetan Kumar S
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 

Más de Chetan Kumar S (9)

Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Human Machine Interface for Enterprise Applications
Human Machine Interface for Enterprise ApplicationsHuman Machine Interface for Enterprise Applications
Human Machine Interface for Enterprise Applications
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
How to start your IOT journey
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journey
 
Computational Intelligence and Applications
Computational Intelligence and ApplicationsComputational Intelligence and Applications
Computational Intelligence and Applications
 
blockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challangesblockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challanges
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platforms
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Applicability of Machine learning in computer networks

  • 1. APPLICABILITY OF MACHINE LEARNING AND COGNITIVE COMPUTING IN COMPUTER NETWORKS Chetan Kumar S
  • 2. INDUSTRY EXPERTS SPEAK • You might be surprised but what is going to drive innovation in the enterprise and public cloud is machine learning --- Bill Coughran, Sequoia Capital • Machine Learning is the way we are going to automate your automation --- Chris Wright, RedHat CTO
  • 3. WHAT IS MACHINE LEARNING • The complexity in traditional computer programming is in the code (programs that people write). In machine learning, learning algorithms are in principle simple and the complexity (structure) is in the data. Is there a way that we can automatically learn that structure? That is what is at the heart of machine learning. -- Andrew Ng
  • 4. WHAT IS MACHINE LEARNING Traditional Programming Machine Learning Data Program Output Data Output/Events/Nill Program
  • 5. MACHINE LEARNING TASKS • Supervised learning is regarded as a machine learning task of inferring a function from labelled training data. • Unsupervised learning: This is regarded as the machine learning task of inferring a function to describe hidden structures from unlabelled data. • Reinforcement learning is an area of machine learning that is linked to how software agents take actions in the environment so as to maximise some notion of cumulative reward.
  • 6. Here is Machine Learning
  • 7. MACHINE LEARNING USECASES • Security/Anomaly Detection • Site Reliability Engineering • Predicting and remediating problems IOT and enterprise networks • Intent based Networking • NFV orchestration and optimization • New automation tools for DevOps • Network control plane optimization • Network Gamification Secure Networks Reliable Networks Simple Networks Optimized Networks
  • 9. KNOWLEDGE PLANE FOR NETWORKS • Defined by Clark D and others, in 2003 • Subsequently re-defined by Albert Mestres et. al., Clark, D., et al. ”A knowledge plane for the internet,” Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2003 Albert Mestres., et al. “Knowledge-Defined Networking”, CoRR, 2016.
  • 10. COMPONENTS OF KDN • The PROBLEM: Networks are distributed and each node has partial view of network • What made this happen ? From 2003 to 20017 ? • Streaming telemetry from network devices, NetFlow, IPFIX among others • Network data analytics platforms • Centralized controller architecture for network, defined via SDN or it variants
  • 11. KNOWLEDGE BASED NETWORK DATA PLANE CONTROL PLANE KNOWLEDGE PLANE MANAGEMENTPLANE
  • 14. BUILDING OPTIMIZED NETWORK • Big enterprise typically setup a overlay networks, using some encapsulation technique • Underlay networks are owned by service providers • Now if there are multiple links connecting to underlay network, how to make best choice ?
  • 16. HOW TO OPTIMIZE • How can we detect which link the overlay network can take • Can system learn the underlay network delay/reliability characteristics ? • If one can predict the network parameters for underlay (which is not owned by overlay), right policies can be applied • Can perform many actions like, which link best for video services, database services etc.
  • 18. CONFIG AUDITS • A system that can learn the network configuration • Apply best practice to the configs • Can audit configs • For example, if the system can learn what is encrypted traffic, can do security audit • Can recognize configs that caused misbehavior in network
  • 19. CONFIG ERRORS Users in green VLAN, cash registers in blue VLAN Wrong config, cash register in wrong VLAN
  • 20. CONFIG ERRORS • More common in IOT and converged networks, due to shear numbers • Can learn the traffic and identify the device • Can alert wrong config • Can correct the wrong config • Helps in troubleshooting
  • 22. NETWORK ANOMALY DETECTION • A network anomaly is a sudden and short-lived deviation from the normal operation of the network • Anomaly caused due to an attack on network, malware flowing in network or pure accident such as failure • An intruder attacks the network • Malware replicating in the network • Interface down and traffic surges on backup link • Bug that causes device to crash! • Quick detection is needed to initiate a timely response,
  • 23.
  • 24. CISCO ETA • ETA (Encrypted Traffic Analytics) • Detect malware based on traffic pattern, rather than traffic content • “Signature based” malware detection fails if malware is encrypted • Need to identify the traffic pattern for a malware, now just look out for such a traffic in your network
  • 25. CISCO ETA Switch/router records traffic flows A cognitive Agent performs malware detection
  • 26. CISCO SLN • SLN is fundamentally a hyper-distributed analytics platform ... • Putting together analytics and networking ... • Goldmine of untouched data on networking gear (sensing) • Network learns and computes models on premise (analytics) • The Network adapts, modifies its behavior (control) • SLN for Security: attacks are incredibly sophisticated and targeted, exfiltration of data being a major concern, requiring a next-generation approach => Stealthwatch Learning Networks
  • 29. OPEN SOURCE FRAMEWORK • open source frame work from google https://www.tensorflow.org • From facebook http://torch.ch • Open source libraries • http://scikit-learn.org/stable • http://spark.apache.org/mllib/ • More on http://opensourceforu.com/2017/01/best-open-source-machine-learning- frameworks/