Enabling Self-Driving Networks with Machine Learning
ResumoThis work aims to enable self-driving networks by addressing the lack of trust that network operators have in Machine Learning (ML) models for networking problems. To achieve this, we propose a natural-language conversational interface (LUMI) and a new ML pipeline that uses techniques from the emerging field of eXplainable Artificial Intelligence (XAI) to scrutinize models. We also propose a new XAI method called TRUSTEE to extract explanations from any given black-box ML model in the form of decision trees of manageable sizes. Our results indicate that ML models used in networking problems need to be put under proper scrutiny and corrected to fulfill their tasks properly.
Arp et al. (2022). Dos and Dont’s of Machine Learning in Computer Security. In USENIX Security 22.
Bastani et al. (2018). Verifiable Reinforcement Learning via Policy Extraction. In NIPS’18.
Birkner et al. (2018). Net2Text: Query-Guided Summarization of Network Forwarding Behaviors. In USENIX NSDI ’18.
Boutaba et al. (2018). A Comprehensive Survey on Machine Learning for Networking: Evolution, Applications and Research Opportunities. JISA, 9(1).
Clemm, A., Ciavaglia, L., Granville, L. Z., and Tantsura, J. (2019). Intent-Based Networking Concepts and Definitions. Internet-draft, Internet Engineering Task Force.
D’Amour et al. (2020). Underspecification Presents Challenges for Credibility in Modern Machine Learning. In arXiv 2011.03395.
Feamster and Rexford (2018). Why (and How) Networks Should Run Themselves. In ACM ANRW ’18.
Holland et al. (2021). New Directions in Automated Traffic Analysis. In ACM CCS ’21.
Huawei (2019). Huawei Core Network Autonomous Driving Network White Paper.
Lipton (2018). The Mythos of Model Interpretability: In Machine Learning, the Concept of Interpretability is Both Important and Slippery. Queue, 16(3).
Liu (2021). The Practice of Network Verification in Alibaba’s Global WAN. https://bit.ly/3XNjfiw.
Mirsky et al. (2018). Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In NDSS‘18.
Shapley (2016). A Value for n-Person Games. Princeton U. Press.
Sharafaldin et al. (2018). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In ICISSP.