Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Жанр: Отраслевые издания
isbn: 9781119675518
isbn:
The application of AI/ML techniques have been slower in configuration management tasks. However, as discussed earlier, with the introduction of NFV and SDN technologies, this is changing [58–60]. Initiatives such as Intent Based Networking [61] and Zero Touch Networking [62] widespread usage of AI/ML has been seen in wireless networks. Other example tasks in configuration management employing ML are service configuration management network load balancing and routing [63–68].
In summary, AI/ML techniques have been applied to several tasks of network and service management in greater numbers over the last decade [69]. However, there are still challenges that need to be resolved for the successful usage of such techniques in production environments. One of the challenges is obtaining high quality data for training and evaluating ML techniques for network and service management functions. Even though network/service data is plenty and diverse in real world, most of the time it is difficult to obtain such data with ground truth. In return, this not only poses challenges for evaluating AI/ML techniques but also faces privacy and trust issues. Another challenge is that in today's networks/services data are generated nonstop in high volume and velocity. They include stationary as well as non‐stationary behaviors superimposed. They evolve continuously as new protocols and technologies are introduced over time. All of these reflect in the data in one shape or form, as gradual drifts in user/system behaviors, or as sudden shifts maybe because of a malfunctioning device or a denial of service attack on a particular network or service. This means that AI/ML techniques require to take these dynamics and changes into account, learn under the aforementioned conditions in order to ensure successful deployment. Yet, another challenge is the need of human experts (from network engineers to security analysts to network/service managers) to understand and trust to AI/ML based system and tools. This requires transparent AI/ML techniques for expert involvement and trust. This is of utmost importance for the widespread and successful deployment of AI/ML techniques in network and service management.
Finally, these challenges also create opportunities in the form of a need for transparent, robust, and dependable AI/ML based techniques for network and service management. To this end, we have already started to see the applications of stream learning, adversarial learning, and transfer learning to the network and service management solutions. Furthermore, research in transparent, secure, and robust AI/ML techniques have gained a big momentum in the ML community. Given the scale and dynamics of today's networks/services, we envision that the application of AI/ML techniques will become more and more ubiquitous and central for operations and management of the future services and networks. In the following Chapters –, we will introduce the current state and the new trends of the AI/ML applications in network and service management.
Bibliography
1 1 D'Alconzo, A., Drago, I., Morichetta, A. et al. (2019). A survey on big data for network traffic monitoring and analysis. IEEE Transactions on Network and Service Management 16 (3): 800–813.
2 2 Diao, Y. and Shwartz, L. (2017). Building automated data driven systems for it service management. Journal of Network and Systems Management 25 (4): 848–883.
3 3 Alshammari, R. and Zincir‐Heywood, N. (2015). How robust can a machine learning approach be for classifying encrypted VoIP? Journal of Network and Systems Management 23 (4): 830–869.
4 4 Boden, M.A. (2016). AI Its Nature and Future. Oxford University Press. ISBN 9780198777984.
5 5 Bernstein, L. and Yuhas, C.M. (1988). Expert systems in network management‐the second revolution. IEEE Journal on Selected Areas in Communications 6 (5): 784–787.
6 6 Tran, H.M. and Schönwälder, J. (2015). Discaria: distributed case‐based reasoning system for fault management. IEEE Transactions on Network and Service Management 12 (4): 540–553.
7 7 Fallon, L. and OSullivan, D. (2014). The Aesop approach for semantic‐based end‐user service optimization. IEEE Transactions on Network and Service Management 11 (2): 220–234.
8 8 Alpaydin, E. (2020). Introduction to Machine Learning, vol. 4. MIT Press. ISBN 9780262043793.
9 9 Buczak, A.L. and Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communication Surveys and Tutorials 18 (2): 1153–1176. https://doi.org/10.1109/COMST.2015.2494502.
10 10 Wang, M., Cui, Y., Wang, X. et al. (2017). Machine learning for networking: workflow, advances and opportunities. IEEE Network 32 (2): 92–99.
11 11 Calyam, P., Dhanapalan, M., Sridharan, M. et al. (2014). Topology‐aware correlated network anomaly event detection and diagnosis. Journal of Network and Systems Management 22 (2): 208–234.
12 12 Bhuyan, M.H., Bhattacharyya, D.K., and Kalita, J.K. (2014). Network anomaly detection: methods, systems and tools. IEEE Communications Surveys and Tutorials 16 (1): 303–336. https://doi.org/10.1109/SURV.2013.052213.00046. URL
13 13 Le, D.C. and Zincir‐Heywood, N. (2018). Big data in network anomaly detection. In: Encyclopedia of Big Data Technologies (ed. S. Sakr and A. Zomaya), 1–9. Cham: Springer International Publishing. ISBN 978‐3‐319‐63962‐8. https://doi.org/10.1007/978‐3‐319‐63962‐8_161‐1.
14 14 Nawrocki, P. and Sniezynski, B. (2018). Adaptive service management in mobile cloud computing by means of supervised and reinforcement learning. Journal of Network and Systems Management 26 (1): 1–22.
15 15 Bachl, M., Zseby, T., and Fabini, J. (2019). Rax: deep reinforcement learning for congestion control. ICC 2019‐2019 IEEE International Conference on Communications (ICC), IEEE, pp. 1–6.
16 16 Amiri, R., Almasi, M.A., Andrews, J.G., and Mehrpouyan, H. (2019). Reinforcement learning for self organization and power control of two‐tier heterogeneous networks. IEEE Transactions on Wireless Communications 18 (8): 3933–3947.
17 17 Boutaba, R., Salahuddin, M.A., Limam, N. et al. (2018). A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. Journal of Internet Services and Applications 9 (1): https://doi.org/10.1186/s13174‐018‐0087‐2.
18 18 Syu, Y., Wang, C., and Fanjiang, Y. (2019). Modeling and forecasting of time‐aware dynamic QoS attributes for cloud services. IEEE Transactions on Network and Service Management 16 (1): 56–71.
19 19 Dalmazo, B.L., Vilela, J.P., and Curado, M. (2017). Performance analysis of network traffic predictors in the cloud. Journal of Network and Systems Management 25 (2): 290–320. https://doi.org/10.1007/s10922‐016‐9392‐x.
20 20 Hardegen, C., Pfülb, B., Rieger, S., and Gepperth, A. (2020). Predicting network flow characteristics using deep learning and real‐world network traffic. IEEE Transactions on Network and Service Management 17 (4): 2662–2676.
21 21 Chen, Z., Wen, J., and Geng, Y. (2016). Predicting future traffic using Hidden Markov models. 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, pp. 1–6.
22 22 Zhang, Y. and Zhou, Y. (2018). Distributed coordination control of traffic network flow using adaptive genetic algorithm based on cloud computing. Journal of Network and Computer Applications 119: 110–120.
23 23 Diao, Y. and Shwartz, L. (2015). Modeling service variability in complex service delivery operations. In: 11th International Conference on Network and Service Management, CNSM 2015, Barcelona, Spain (9–13 November 2015) (ed. M. СКАЧАТЬ