Yukhe Lavinia, Ramakrishnan Durairajan, R. Rejaie, W. Willinger
{"title":"Challenges in Using ML for Networking Research: How to Label If You Must","authors":"Yukhe Lavinia, Ramakrishnan Durairajan, R. Rejaie, W. Willinger","doi":"10.1145/3405671.3405812","DOIUrl":"https://doi.org/10.1145/3405671.3405812","url":null,"abstract":"Leveraging innovations in Machine Learning (ML) research is of great current interest to researchers across the sciences, including networking research. However, using ML for networking poses challenging new problems that have been responsible for slowing the pace of innovation and the adoption of ML in the networking domain. Among the main problems are a well-known lack of data in general and representative data in particular, an overall inability to label data at scale, unknown data quality due to differences in data collection strategies, and data privacy issues that are unique to network data. Motivated by these challenges, we describe the design of Emerge1, a novel framework to support efforts to dEmocratize the use of ML for nEtwoRkinG rEsearch. In particular, Emerge focuses on the problem of providing a low-cost, scalable, and high-quality methodology for labeling networking data. To illustrate the benefits of Emerge, we use publicly available network measurement datasets from Caida's Ark project and create and evaluate data labels for them in a programmable fashion.","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pitfalls of data-driven networking: A case study of latent causal confounders in video streaming","authors":"P. C. Sruthi, Sanjay G. Rao, Bruno Ribeiro","doi":"10.1145/3405671.3405815","DOIUrl":"https://doi.org/10.1145/3405671.3405815","url":null,"abstract":"This paper motivates the need to support counterfactual reasoning (i.e., answer \"what-if \" questions about events that did not occur) when collecting network data. We focus on video streaming - e.g., given logs of a video session, a video publisher may ask whether a user would continue to experience no rebuffering events if the lowest quality video choice were eliminated. We discuss potential pitfalls related to counterfactual reasoning, and argue that dynamic network state (e.g., bandwidth) serves as a confounding yet hidden (latent) feature that complicates such analyses. We illustrate the challenges, and present preliminary methods to address them using concrete examples. Our evaluations show that existing approaches, including randomized trials (collecting data from an algorithm that selects bitrates randomly), are by themselves inadequate for counterfactual reasoning related to video streaming, and must be supplemented by techniques that explicitly infer latent features.","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shihan Xiao, Haiyan Mao, Bo-Xi Wu, Wenjie Liu, Fenglin Li
{"title":"Neural Packet Routing","authors":"Shihan Xiao, Haiyan Mao, Bo-Xi Wu, Wenjie Liu, Fenglin Li","doi":"10.1145/3405671.3405813","DOIUrl":"https://doi.org/10.1145/3405671.3405813","url":null,"abstract":"Deep learning has shown great potential in automatically generating routing protocols for different optimization objectives. Although it may bring superior performance gains, there exists a fundamental obstacle to prevent existing network operators from deploying it into a real-world network, i.e., the uncertainty of statistical nature in deep learning can not provide the certainty of basic connectivity guarantee required in real-world routing. In this paper, we propose the first deep-learning-based distributed routing system (named NGR) that can achieve the connectivity guarantee while still attaining the routing optimality. NGR provides a novel packet routing framework based on the link reversal theory. Specially-designed neural network structures are further proposed to seamlessly incorporate into the framework. We apply NGR in the tasks of shortest-path routing and load balancing. The evaluation results validate that NGR can achieve 100% connectivity guarantee despite the uncertainty of deep learning and gain performance close to the optimal solution.","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133970291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deep Learning Approach for IP Hijack Detection Based on ASN Embedding","authors":"T. Shapira, Y. Shavitt","doi":"10.1145/3405671.3405814","DOIUrl":"https://doi.org/10.1145/3405671.3405814","url":null,"abstract":"IP hijack detection is an important security challenge. In this paper we introduce a novel approach for BGP hijack detection using deep learning. Similar to natural language processing (NLP) models, we show that by using BGP route announcements as sentences, we can embed each AS number (ASN) to a vector that represents its latent characteristics. In order to solve this supervised learning problem, we use these vectors as an input to a recurrent neural network and achieve an excellent result: an accuracy of 99.99% for BGP hijack detection with 0.00% false alarm. We test our method on 48 past hijack events between the years 2008 and 2018 and detect 32 of them, and in particular, all the events within two years from our training data.","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Tree Algorithm to Approach Collision-Free Transmission in Slotted ALOHA","authors":"Molly Zhang, L. D. Alfaro, J. Garcia-Luna-Aceves","doi":"10.1145/3405671.3405817","DOIUrl":"https://doi.org/10.1145/3405671.3405817","url":null,"abstract":"A new reinforcement-learning approach is introduced to improve the performance of the slotted ALOHA protocol. Nodes use known periodic schedules as base policies with which they can collaboratively learn how to transmit periodically in different time slots to limit packet collisions. The Adaptive Tree (AT) algorithm is introduced for this purpose, which results in AT-ALOHA. It is shown that nodes using AT-ALOHA quickly converge to transmission schedules that are virtually collision-free, and that the throughput of AT-ALOHA resembles that of TDMA, but without the need to define transmission frames with a given number of time slots. AT-ALOHA is shown to attain better throughput and fairness than slotted ALOHA with exponential back offs and ALOHA-Q (framed slotted ALOHA with Q learning).","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":"63 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129738915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bahnasy, Fenglin Li, Shihan Xiao, Xiangle Cheng
{"title":"DeepBGP","authors":"M. Bahnasy, Fenglin Li, Shihan Xiao, Xiangle Cheng","doi":"10.1145/3405671.3405816","DOIUrl":"https://doi.org/10.1145/3405671.3405816","url":null,"abstract":"Border Gateway Protocol (BGP) is the standard inter-domain routing protocol that is used to exchange reachability information among Wide Area Networks (WANs). BGP is a policy-based routing protocol that introduces a lot of flexibility. However, this flexibility increases the configuration complexity. In this research, we introduce DeepBGP as a neural network-based system that synthesizes network configuration given a high-level operator intent. We adopt Graph Neural Network (GNN) to represent network topology and generate partial network configuration. A validation unit is then used to calculate a reward based on which an Evolution Strategies (ES) optimizer updates neural network parameters. Since ES does not require backpropagation, they provide a significant reduction in calculation time. Further, the recent advances in deep learning with strong hardware acceleration and the parallelization capabilities offered by ES provide great potential in scaling the proposed solution to larger topologies. We demonstrate experimentally that DeepBGP can generate a network-wide configuration for both Huawei and Cisco devices while fulfilling operator requirements. We also show how Deep-BGP scales when the network size increases, and how hardware acceleration could improve the scalability of the system.","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124770883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the Workshop on Network Meets AI & ML","authors":"","doi":"10.1145/3405671","DOIUrl":"https://doi.org/10.1145/3405671","url":null,"abstract":"","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121553455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SmartEntry","authors":"Junjie Zhang, Zehua Guo, Minghao Ye, H. J. Chao","doi":"10.1145/3405671.3405809","DOIUrl":"https://doi.org/10.1145/3405671.3405809","url":null,"abstract":"Traffic Engineering (TE) has been used by Internet service providers to improve their network performance and provide better service quality to users. While flow-based TE is an alternative, destination-based TE is a more readily deployed solution. This is because destination-based forwarding is ubiquitously supported by today's routers. A challenge faced by state-of-the-art destination-based TE solutions is considerable time taken by a centralized controller to update traffic split ratios for each entry of the forwarding table of each router. This could impose a fundamental limitation on how responsively the network can react to dynamic changes of traffic demands. In this paper, we propose SmartEntry, a destination-based routing solution coupled with Reinforcement Learning (RL) to reduce the number of the forwarding entries that need to be updated to respond to dynamic change of traffic demands. SmartEntry forwards majority traffic on Equal-Cost Multi-Path (ECMP) and redistributes a small portion of traffic using our proposed RL algorithm. SmartEntry adopts Linear Programming (LP) to produce reward signals. This RL + LP combined approach turns out to be surprisingly effective. We evaluate SmartEntry by conducting extensive experiments on different network topologies with both real and synthesized traffic. The simulation results show that SmartEntry achieves near-optimal performance with a saving of 90% forwarding entry updates, and generalizes well to unseen traffic matrices.","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":" 48","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120832132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Guorui Xie, Qing Li, Yong Jiang, Tao Dai, Gengbiao Shen, Rui Li, R. Sinnott, Shutao Xia
{"title":"SAM: Self-Attention based Deep Learning Method for Online Traffic Classification","authors":"Guorui Xie, Qing Li, Yong Jiang, Tao Dai, Gengbiao Shen, Rui Li, R. Sinnott, Shutao Xia","doi":"10.1145/3405671.3405811","DOIUrl":"https://doi.org/10.1145/3405671.3405811","url":null,"abstract":"Network traffic classification categorizes traffic classes based on protocols (e.g., HTTP or DNS) or applications (e.g., Facebook or Gmail). Its accuracy is a key foundation of some network management tasks like Quality-of-Service (QoS) control, anomaly detection, etc. To further improve the accuracy of traffic classification, recent researches have introduced deep learning based methods. However, most of them utilize the privacy-concerned payload (user data). Besides, they generally do not consider the dependency of bytes in a packet, which we believe can be exploited for the more accurate classification. In this work, we treat the initial bytes of a network packet as a language and propose a novel Self-Attention based Method (SAM) for traffic classification. The average F1-scores of SAM on protocol and application classification are 98.62% and 98.93%. With the higher accuracy of SAM, better QoS and anomaly detection can be met.","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhen Zhang, Chaokun Chang, Haibin Lin, Yida Wang, R. Arora, Xin Jin
{"title":"Is Network the Bottleneck of Distributed Training?","authors":"Zhen Zhang, Chaokun Chang, Haibin Lin, Yida Wang, R. Arora, Xin Jin","doi":"10.1145/3405671.3405810","DOIUrl":"https://doi.org/10.1145/3405671.3405810","url":null,"abstract":"Recently there has been a surge of research on improving the communication efficiency of distributed training. However, little work has been done to systematically understand whether the network is the bottleneck and to what extent. In this paper, we take a first-principles approach to measure and analyze the network performance of distributed training. As expected, our measurement confirms that communication is the component that blocks distributed training from linear scale-out. However, contrary to the common belief, we find that the network is running at low utilization and that if the network can be fully utilized, distributed training can achieve a scaling factor of close to one. Moreover, while many recent proposals on gradient compression advocate over 100x compression ratio, we show that under full network utilization, there is no need for gradient compression in 100 Gbps network. On the other hand, a lower speed network like 10 Gbps requires only 2x-5x gradients compression ratio to achieve almost linear scale-out. Compared to application-level techniques like gradient compression, network-level optimizations do not require changes to applications and do not hurt the performance of trained models. As such, we advocate that the real challenge of distributed training is for the network community to develop high-performance network transport to fully utilize the network capacity and achieve linear scale-out.","PeriodicalId":254313,"journal":{"name":"Proceedings of the Workshop on Network Meets AI & ML","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125150141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}