Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

General Research Article

Multi-Strategy Learning for Recognizing Network Symptoms

Author(s): Tarek S. Sobh*

Volume 15, Issue 2, 2022

Published on: 31 August, 2020

Page: [240 - 255] Pages: 16

DOI: 10.2174/2666255813999200831102030

Price: $65

Abstract

Background: Many network symptoms may occur due to different reasons in today's computer networks. The finding of a few kinds of these interesting symptoms is not direct. Therefore, an intelligent system is presented for extracting and recognizing that kind of network symptoms based on prior background knowledge.

Methods: Here, the main target is to build a network-monitoring tool that can discover network symptoms and provide reasonable interpretations for various operational patterns. These interpretations are discussed with the purpose of supporting network planners/administrators. It introduces Multi-Strategy Learning (MSL) that can recognize network symptoms. Repeated symptoms or sometimes a single event of heavy traffic networks may lead us to recognize various network patterns that may be expressed for discovering and solving network problems.

Results: To achieve this goal, an MSL system recognizes network symptoms. The first technique is done in an empirical manner. It focuses on selecting subsets of data traffic by using certain fields from a group of records related to database samples using queries. The data abstraction is accomplished, and various symptoms are extracted. A second technique is based on explanation-based learning. It produces a procedure that obtains operational rules. These rules may lead to network administrators solving some problems later. By using only one formal training example in the domain knowledge (network), we can learn and analyze in terms of this knowledge. In this work, to store and maintain network-monitoring traffic, network events, and the knowledge base for implementing the above techniques, Hadoop and a relational database are used.

Discussion: Using EBL only is not suitable, and it cannot take the same props as other types of available training data set as SBL can. EBL does not need only a complete domain theory but also needs consistent domain theory. This reduces the suitability of EBL as knowledge acquisition. For this reason, we used EBL to discover the pattern of network malfunction in case of a single example only to take a complete solution for this example.

Conclusion: Hence, the proposed system can discover abnormal patterns (symptoms) of the underlying network traffic. A real network using our MSL, as such, could recognize these abnormal patterns. The network administrator can adapt the current configuration according to advice and observations that come from that intelligent system in order to avoid the problems that may currently exist or it may happen in the near future. Finally, the proposed system is capable of extracting different symptoms (behaviors and operational patterns) and provides sensible advice in order to support networkplanning activity.

Keywords: Multi-strategy learning, explanation-based learning, pattern discovery, data abstraction, network management, software defined networking, wi-fi.

Graphical Abstract

[1]
J.L. Marzo, P. Vila, L. Fa’brega, and D. Massaguer, "A distributed simulator for network resource management investigation", Comput. Commun., vol. 26, pp. 1782-1791, 2003.
[http://dx.doi.org/10.1016/S0140-3664(03)00051-3]
[2]
S. Wang, C. Li, H. Lin, and K. Shih, "A passive self-configuration MAC protocol for supporting network management in IEEE 802.11-based multi-hop mobile ad hoc networks", J. Netw. Comput. Appl., vol. 56, pp. 149-157, 2015.
[http://dx.doi.org/10.1016/j.jnca.2015.05.019]
[3]
J. Bendriss, I.G. Yahia, P. Chemouil, and D. Zeghlache, "AI for SLA management in programmable networks", In: Proceedings of the 13th International Conference Design Of Reliable Communication Networks, 2017, pp. 1-8.
[4]
D. Brauckhoff, K. Salamatian, and M. May, "Applying PCA for traffic anomaly detection: Problems and solutions", In: IEEE INFOCOM 2009 - The 28th Conference on Computer Communications, 2009, pp. 2866-2870.
[http://dx.doi.org/10.1109/INFCOM.2009.5062248]
[5]
D. Harutyunyan, R. Riggio, S. Kuklinski, and T. Ahmed, "CU placement over a reconfigurable wireless fronthaul in 5G networks with functional splits", Int. J. Netw. Manage., vol. 30, no. 1, pp. 2086-2086, 2020.
[6]
R. Sterritt, "Discovering rules for fault management, engineering of computer based system", In: Proceedings of the 8th Annual IEEE International Conference and Workshop, 2001, pp. 190-196.
[7]
M. Al-Kasassbeh, and M. Adda, "Analysis of mobile agents in network fault management", J. Netw. Comput. Appl., vol. 31, no. 4, pp. 699-711, 2008.
[http://dx.doi.org/10.1016/j.jnca.2007.11.005]
[8]
N. Baldo, L. Giupponi, and J. Mangues-Bafalluy, "Big data empowered self organized networks", In: Proceeding of the 20th European Wireless Conference, 2014, pp. 1-8.
[9]
K. Cho, S. Ahn, and J. Chung, "A study on the classified model and the agent collaboration model for network configuration fault management", Knowl. Base. Syst., vol. 16, pp. 177-190, 2003.
[http://dx.doi.org/10.1016/S0950-7051(03)00012-1]
[10]
D. Brower, R. Purvy, A. Daniel, M. Sinykin, and J. Smith, Relational Database Management System {(RDBMS)} Management Information Base {(MIB)} using {SMIv2., Internet Engineering Task Force, 1994, p. 1697.
[11]
J. Case, and A. Rijsinghani, Management Information Base., Internet Engineering Task Force, 1993.
[12]
S. Waldbusser, Remote Network Monitoring Information Base., Internet Engineering Task Force, 1995.
[13]
A. Bradai, A. Benslimane, and K.D. Singh, "Dynamic anchor points selection for mobility management in software defined networks", J. Netw. Comput. Appl., vol. 57, pp. 1-11, 2015.
[http://dx.doi.org/10.1016/j.jnca.2015.06.018]
[14]
M. Dhawan, R. Poddar, and K. Mahajan, "SPHINX: Detecting security attacks in software-defined networks", NDSS, vol. 15, pp. 8-11, 2015.
[http://dx.doi.org/10.14722/ndss.2015.23064]
[15]
A. An, "Learning classification rules from data", Comput. Math. Appl., vol. 45, no. 4-5, pp. 737-748, 2003.
[16]
L. Huang, X.L. Nguyen, M. Garofalakis, M.I. Jordan, A. Joseph, and N. Taft, "In-network PCA and anomaly detection", Adv. Neural Inf. Process. Syst., pp. 617-624, 2007.
[17]
T.S. Sobh, A. Elgohary, and M. Zaki, "Performance improvements on the network security protocols", Int. J. Netw. Secur., vol. 6, no. 1, pp. 103-115, 2008.
[18]
M. Zorzi, A. Zanella, and A. Testolin, "Cognition-based networks: A new perspective on network optimization using learning and distributed intelligence", IEEE Access, vol. 3, pp. 1512-1530, 2015.
[19]
P.B. Brazdil, Multistrategy Learning. Encyclopedia of the Sciences of Learning., Springer: Boston, MA, 2012.
[http://dx.doi.org/10.1007/978-1-4419-1428-6_1788]
[20]
R. Dhar, "Behavioral decision research: Theory and applications", Adv. Consum. Res., vol. 20, p. 195, 1993.
[21]
Y. Kudoh, M. Haraguchi, and Y. Okubo, "Data abstractions for decision tree induction", Theor. Comput. Sci., vol. 292, no. 2, pp. 387-416, 2003.
[http://dx.doi.org/10.1016/S0304-3975(02)00178-0]
[22]
Plan Learn, Planning to Learn Workshop, 2010. Available at: http://www.ifi.uzh.ch/ddis/planlearn10.html [Accessed: 15-Sep-2021].
[23]
R. Wirth, M. Borth, and J. Hipp, "When distribution is part of the semantics: A new problem class for distributed knowledge discovery", In: Proceedings of the PKDD Workshop on Ubiquitous Data Mining for Mobile and Distributed Environments, 2001, pp. 56-64.
[24]
R. Steinert, Probabilistic Fault Management In Networked Systems. Doctoral Thesis, Stockholm, Sweden, 2014.
[25]
A. Bashar, G. Parr, S. McClean, B. Scotney, and D. Nauck, "BARD: A novel application of bayesian reasoning for proactive network management", In: 10th PostGraduate Conference on Telecoms, Networking and Broadcasting, Liverpool, 2009.
[26]
D. Ganesan, B. Greenstein, D. Perelyubskiy, D. Estrin, and J. Heidemann, "An evaluation of multi-resolution storage for sensor networks", In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003, pp. 89-102.
[http://dx.doi.org/10.1145/958491.958502]
[27]
A. Dudnikova, P. Dini, L. Giupponi, and D. Panno, "Multiple criteria plus fuzzy logic switch off method for dense heterogeneous networks", In: Proceedings of the 20th IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2015.
[28]
A. Elgohary, T.S. Sobh, and M. Zaki, "Design of an enhancement for SSL/TLS protocols", Comput. Secur., vol. 25, no. 4, pp. 297-306, 2006.
[http://dx.doi.org/10.1016/j.cose.2006.02.007]
[29]
D. Kreutz, F. Ramos, P. Verssimo, C. Rothenberg, S. Azodolmolky, and S. Uhlig, "Software-defined networking: A comprehensive survey", In: Proceeding Institute of Electrical and Electronics Engineers, vol. 103. 2015, no. 1, pp. 14-76.
[http://dx.doi.org/10.1109/JPROC.2014.2371999]
[30]
A.E. Hassanien, and M. Elhoseny, “Cybersecurity and Secure Information Systems”, Challenges and Solutions in Smart Environments., Springer: International Publishing, 2019.
[31]
S. Ayoubi, N. Limam, M. Salahuddin, N. Shahriar, R. Boutaba, F. Estrada-Solano, and O. Caicedo, "Machine learning for cognitive network management", IEEE Commun. Mag., vol. 56, no. 1, pp. 158-165, 2018.
[http://dx.doi.org/10.1109/MCOM.2018.1700560]
[32]
C.M. Burns, J. Kuo, and S. Ng, "Ecological interface design: A new approach for visualizing network management", Comput. Netw., vol. 43, pp. 369-388, 2003.
[http://dx.doi.org/10.1016/S1389-1286(03)00287-1]
[33]
J. Hyun, N. Tu, J. Yoo, and J. Hong, "Real time and fine ograined network monitoring using in band network telemetry", Int. J. Netw. Manage., vol. 29, no. 6, pp. 2080-2080, 2019.
[http://dx.doi.org/10.1002/nem.2080]
[34]
E. Marchiori, J. Moore, and J. Rajapakse, "Evolutionary computation, machine learning and data mining in bioinformatics", In: Proceedings of the 5th European Conference, EvoBIO, 2007.
[http://dx.doi.org/10.1007/978-3-540-71783-6]
[35]
G. Awada, "Multiple strategies approach and EFL reading comprehension of learners with dyslexia: Teachers’ perceptions", Int. J. Instr., vol. 11, no. 3, pp. 463-476, 2018.
[http://dx.doi.org/10.12973/iji.2018.11332a]
[36]
R.S. Michalski, and P. Myofsciences, "Inferential theory of learning: Developing foundations for multistrategy learning", Mach. Learn., pp. 3-61, 1993.
[37]
P.A. Flach, and A.C. Kakas, "The cycle of abductive and inductive knowledge development", In: Proceeding of the Machine Intelligence, vol. 17. 2000, pp. 17-24.
[38]
R. Michalski, and G. Tecuci, "Using introspective reasoning to select learning strategies", In: Proceeding of the First International Workshop on Multistrategy Learning, 1991, pp. 217-230.
[39]
P. Brazdil, C. Giraud-Carrier, C. Soares, and R. Vilalta, Metalearning: Applications to Data Mining., Springer: Heidelberg, 2009.
[http://dx.doi.org/10.1007/978-3-540-73263-1]
[40]
M. Miozzo, L. Giupponi, M. Rossi, and P. Dini, "Distributed Q-learning for energy harvesting heterogeneous networks", In: IEEE International Conference on Communication Workshop, 2015, pp. 2006-2011.
[http://dx.doi.org/10.1109/ICCW.2015.7247475]
[41]
M. Nagule, Network Protocol handbook., McGraw-Hill: New York, 1994.
[42]
J.F. Scariot, and B. Martinet, "NetSEC: Metrology-based application for network security", Future Gener. Comput. Syst., vol. 19, no. 2, pp. 303-311, 2003.
[http://dx.doi.org/10.1016/S0167-739X(02)00155-3]
[43]
S. Hong, L. Xu, H. Wang, and G. Gu, "Poisoning network visibility in software-defined networks: New attacks and countermeasures", In: NDSS, vol. 15. 2015, pp. 8-11.
[http://dx.doi.org/10.14722/ndss.2015.23283]
[44]
O. Aliu, A. Imran, M. Imran, and B. Evans, "A survey of self organisation in future cellular networks", IEEE Comm. Surv. and Tutor., vol. 15, no. 1, pp. 336-361, 2013.
[45]
M.V. Mahoney, and P.K. Chan, "Learning rules for anomaly detection of hostile network traffic", In: 3rd IEEE International Conference on Data Mining, 2003, pp. 601-604.
[http://dx.doi.org/10.1109/ICDM.2003.1250987]
[46]
R. Caruana, and A. Niculescu-Mizil, "An empirical comparison of supervised learning algorithms", In: Proceeding of the 23rd International Conference on Machine Learning, 2006, pp. 161-168.
[http://dx.doi.org/10.1145/1143844.1143865]
[47]
L. Rokach, "Ensemble-based classifiers", Artif. Intell. Rev., vol. 33, no. 1-2, pp. 1-39, 2010.
[http://dx.doi.org/10.1007/s10462-009-9124-7]
[48]
L. Rokach, and O. Maimon, Data mining with decision trees: Theory and Applications., World Scientific, 2007.
[49]
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions", ACM SIGCOMM Computer Communication Review, vol. 35, no. 4, pp. 217-228, 2005.
[http://dx.doi.org/10.1145/1090191.1080118]
[50]
M. Zaki, H. Harb, and T.S. Sobh, "A learning database system to observe malfunctions and to support network planning", J. Syst. Softw., vol. 58, no. 1, pp. 33-46, 2001.
[http://dx.doi.org/10.1016/S0164-1212(01)00026-7]
[51]
M. Zaki, and T.S. Sobh, "NCDS: Data mining for discovering interesting network characteristics", Inf. Softw. Technol., vol. 47, no. 3, pp. 189-198, 2005.
[http://dx.doi.org/10.1016/j.infsof.2004.08.002]
[52]
L. Monostori, Intelligent techniques for managing complexity, changes and uncertainties in manufacturingIFAC Proceedings Volume, vol. 34. 2001, no. 17, pp. 9-20.
[http://dx.doi.org/10.1016/S1474-6670(17)33249-4]
[53]
L. Monostori, "AI and machine learning techniques for managing complexity, changes and uncertainties in manufacturing", Eng. Appl. Artif. Intell., vol. 16, no. 4, pp. 277-291, 2003.
[http://dx.doi.org/10.1016/S0952-1976(03)00078-2]
[54]
M. Brodie, "Iterated phantom induction: A knowledge-based approach to learning control", J. Mach. Learn., pp. 45-76, 2001.
[55]
S.A. Goldman, S.S. Kwek, and S.D. Scott, "Learning from examples with unspecified attribute values", J. Inf. Comput., vol. 180, no. 2, pp. 82-100, 2003.
[http://dx.doi.org/10.1016/S0890-5401(02)00030-5]
[56]
T. Mitchell, Machine Learning., McGraw-Hill, 1997.
[57]
T. Mitchell, and R. Keller, "Explanation-based generalization: A unifying view", In: Readings in Cognitive Science., Elsevier, 1988, pp. 382-398.
[58]
J.W. Sheppard, "Explanation-based learning with diagnostic models", IEEE Systems Readiness Technology Conference, pp. 159-166, 1992.
[http://dx.doi.org/10.1109/AUTEST.1992.270118]
[59]
M. Borth, Learning from multiple bayesian networks for revision and refinement of expert systems., Advances in Artificial Intelligence, Springer Berlin Heidelberg, 2002, pp. 82-96.
[http://dx.doi.org/10.1007/3-540-45751-8_6]

Rights & Permissions Print Cite
© 2025 Bentham Science Publishers | Privacy Policy