|Title:||Machine Learning Methods for Communication Networks Characterization of Requirements and Analysis of Selected Use Cases||Language:||English||Authors:||Bachl, Maximilian||Qualification level:||Doctoral||Advisor:||Zseby, Tanja||Assisting Advisor:||Fabini, Joachim||Issue Date:||2021||Number of Pages:||188||Qualification level:||Doctoral||Abstract:||
With machine learning and especially deep learning rising to prevalence in many domains such as computer vision and natural language processing, machine learning methods are also increasingly investigated for computer networks. This work shows that while machine learning has great potential in some areas of computer networking, the challenges are very different than those found in other domains for which learning methods such as deep learning are commonly adopted.Specifically, I show that particularities of machine learning for networking are:• the need that a machine learning solution interacts well with existing deployed technology such as other network protocols and legacy solutions.• the different nature and smaller quantity of features compared to, for example, computer vision.• the common occurrence of attacks since many networks are open to the outside world.• the requirement of fast processing.These characteristics are elaborated on by developing and analyzing machine learning approaches for• Congestion control: I use reinforcement learning to learn a competitive congestion control policy and develop a mechanism which can improve fairness between different flows in the Internet.• Active queue management: I use reinforcement learning and also classic approaches to develop queue managers which inspect traffic and smartly choose the optimal buffer size for a particular flow.• Intrusion detection: I develop methods to quantify adversarial threats and mitigate them and a method which lowers resource consumption by learning to focus more on network traffic which seems interesting.Overall, I show that machine learning solutions offer promising performance improvements over static human-developed solutions when the above particularities are considered.
|Keywords:||Machine Learning; Deep Learning; Networking; Intrusion Detection; Congestion Control||URI:||https://doi.org/10.34726/hss.2021.84423
|DOI:||10.34726/hss.2021.84423||Library ID:||AC16255285||Organisation:||E389 - Institute of Telecommunications||Publication Type:||Thesis
|Appears in Collections:||Thesis|
Files in this item:
checked on Jul 31, 2021
checked on Jul 31, 2021
Items in reposiTUm are protected by copyright, with all rights reserved, unless otherwise indicated.