Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

In-Network Machine Learning Using Programmable Network Devices: A Survey

Published: 19 December 2023 Publication History

Abstract

Machine learning is widely used to solve networking challenges, ranging from traffic classification and anomaly detection to network configuration. However, machine learning also requires significant processing and often increases the load on both networks and servers. The introduction of in-network computing, enabled by programmable network devices, has allowed to run applications within the network, providing higher throughput and lower latency. Soon after, in-network machine learning solutions started to emerge, enabling machine learning functionality within the network itself. This survey introduces the concept of in-network machine learning and provides a comprehensive taxonomy. The survey provides an introduction to the technology and explains the different types of machine learning solutions built upon programmable network devices. It explores the different types of machine learning models implemented within the network, and discusses related challenges and solutions. In-network machine learning can significantly benefit cloud computing and next-generation networks, and this survey concludes with a discussion of future trends.

References

[1]
Barefoot Tofino.” Accessed: Nov. 2023. [Online]. Available: https://www.barefootnetworks.com/products/brief-tofino/
[2]
Spectrum SN4000 open Ethernet switches.” Accessed: Nov. 2023. [Online]. Available: https://www.nvidia.com/en-us/networking/ethernet-switching/spectrum-sn4000/
[3]
AMD Pensando infrastructure accelerators.” Accessed: Nov. 2023. [Online]. Available: https://www.amd.com/en/accelerators/pensando
[4]
NVIDIA blueField data processing units.” Accessed: Nov. 2023. [Online]. Available: https://www.nvidia.com/en-us/networking/products/data-processing-unit/
[5]
Broadcom stingray SmartNIC accelerates Baidu cloud services.” Accessed: Nov. 2023. [Online]. Available: https://www.broadcom.com/company/news/product-releases/53106
[6]
Netronome flow processor product brief.” Accessed: Nov. 2023. [Online]. Available: https://www.netronome.com/media/documents/PB_NFP-6000-7-20.pdf
[7]
S. Ibanez, G. Brebner, N. McKeown, and N. Zilbermann, “The P4→NetFPGA workflow for line-rate packet processing,” in Proc. ACM/SIGDA Int. Symp. Field Program. Gate Arrays, 2019, pp. 1–9.
[8]
P. Bosshartet al., “P4: Programming protocol-independent packet processors,” ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 3, pp. 87–95, 2014.
[9]
A. Sapio, I. Abdelaziz, A. Aldilaijan, M. Canini, and P. Kalnis, “Innetwork computation is a dumb idea whose time has come,” in Proc. 16th ACM Workshop Hot Topics Netw., 2017, pp. 150–156.
[10]
Y. Tokusashi, H. T. Dang, F. Pedone, R. Soulé, and N. Zilberman, “The case for in-network computing on demand,” in Proc. 14th EuroSys Conf., 2019, pp. 1–16.
[11]
A. W. Moore and D. Zuev, “Internet traffic classification using Bayesian analysis techniques,” in Proc. ACM SIGMETRICS Int. Conf. Meas. Model. Comput. Syst., 2005, pp. 50–60.
[12]
A. Dainotti, A. Pescape, and K. C. Claffy, “Issues and future directions in traffic classification,” IEEE Netw., vol. 26, no. 1, pp. 35–40, Jan./Feb. 2012.
[13]
D. K. Bhattacharyya and J. K. Kalita, Network Anomaly Detection: A Machine Learning Perspective. Boca Raton, FL, USA: CRC Press, 2013.
[14]
R. Doshi, N. Apthorpe, and N. Feamster, “Machine learning DDoS detection for consumer Internet of Things devices,” in Proc. IEEE Security Privacy Workshops (SPW), 2018, pp. 29–35.
[15]
D. Sanvito, G. Siracusano, and R. Bifulco, “Can the network be the AI accelerator?,” in Proc. Morning Workshop in Netw. Comput., 2018, pp. 20–25.
[16]
Z. Xiong and N. Zilberman, “Do switches dream of machine learning? Toward in-network classification,” in Proc. 18th ACM Workshop Hot Topics Netw., 2019, pp. 25–33.
[17]
X. Zhang, L. Cui, F. P. Tso, and W. Jia, “pHeavy: Predicting heavy flows in the programmable data plane,” IEEE Trans. Netw. Service Manag., vol. 18, no. 4, pp. 4353–4364, Dec. 2021.
[18]
T. C. Silva and L. Zhao, Machine Learning in Complex Networks, vol. 1. Cham, Switzerland: Springer, 2016.
[19]
R. Boutabaet al., “A comprehensive survey on machine learning for networking: Evolution, applications and research opportunities,” J. Internet Services Appl., vol. 9, no. 1, pp. 1–99, 2018.
[20]
M. Wang, Y. Cui, X. Wang, S. Xiao, and J. Jiang, “Machine learning for networking: Workflow, advances and opportunities,” IEEE Netw., vol. 32, no. 2, pp. 92–99, Mar./Apr. 2018.
[21]
F. Hauseret al., “A survey on data plane programming with P4: Fundamentals, advances, and applied research,” 2021, arXiv:2101.10632.
[22]
R. Bifulco and G. Rétvári, “A survey on the programmable data plane: Abstractions, architectures, and open problems,” in Proc. IEEE 19th Int. Conf. High Perform. Switching Routing (HPSR), 2018, pp. 1–7.
[23]
A. Y. Nikravesh, S. A. Ajila, C.-H. Lung, and W. Ding, “Mobile network traffic prediction using MLP, MLPWD, and SVM,” in Proc. IEEE Int. Congr. Big Data (BigData Congr.), 2016, pp. 402–409.
[24]
A. Eswaradass, X.-H. Sun, and M. Wu, “Network bandwidth predictor (NBP): A system for online network performance forecasting,” in Proc. 6th IEEE Int. Symp. Clust. Comput. Grid (CCGRID), vol. 1, 2006, p. 4.
[25]
S. Chabaaet al., “Identification and prediction of Internet traffic using artificial neural networks,” J. Intell. Learn. Syst. Appl., vol. 2, no. 3, p. 147, 2010.
[26]
Y. Zhu, G. Zhang, and J. Qiu, “Network traffic prediction based on particle swarm BP neural network,” J. Netw., vol. 8, no. 11, pp. 2685–2691, 2013.
[27]
Y. Li, H. Liu, W. Yang, D. Hu, and W. Xu, “Inter-data-center network traffic prediction with elephant flows,” in Proc. IEEE/IFIP Netw. Oper. Manag. Symp. (NOMS), 2016, pp. 206–213.
[28]
P. Poupartet al., “Online flow size prediction for improved network routing,” in Proc. IEEE 24th Int. Conf. Netw. Protocols (ICNP), 2016, pp. 1–6.
[29]
Z. Chen, J. Wen, and Y. Geng, “Predicting future traffic using hidden Markov models,” in Proc. IEEE 24th Int. Conf. Netw. Protocols (ICNP), 2016, pp. 1–6.
[30]
R. Alshammari and A. N. Zincir-Heywood, “Machine learning based encrypted traffic classification: Identifying SSH and Skype,” in Proc. IEEE Symp. Comput. Intell. Security Defense Appl., 2009, pp. 1–8.
[31]
A. Finamore, M. Mellia, M. Meo, and D. Rossi, “KISS: Stochastic packet inspection classifier for UDP traffic,” IEEE/ACM Trans. Netw., vol. 18, no. 5, pp. 1505–1515, Oct. 2010.
[32]
D. Schatzmann, W. Mühlbauer, T. Spyropoulos, and X. Dimitropoulos, “Digging into HTTPs: Flow-based classification of Webmail traffic,” in Proc. 10th ACM SIGCOMM Conf. Internet Meas., 2010, pp. 322–327.
[33]
P. Bermolen, M. Mellia, M. Meo, D. Rossi, and S. Valenti, “Abacus: Accurate behavioral classification of P2P-TV traffic,” Comput. Netw., vol. 55, no. 6, pp. 1394–1411, 2011.
[34]
A. Este, F. Gringoli, and L. Salgarelli, “Support vector machines for TCP traffic classification,” Comput. Netw., vol. 53, no. 14, pp. 2476–2490, 2009.
[35]
A. F. Esteveset al., “On-line detection of encrypted traffic generated by mesh-based peer-to-peer live streaming applications: The case of GoalBit,” in Proc. IEEE 10th Int. Symp. Netw. Comput. Appl., 2011, pp. 223–228.
[36]
P. Haffner, S. Sen, O. Spatscheck, and D. Wang, “ACAS: Automated construction of application signatures,” in Proc. ACM SIGCOMM Workshop Min. Netw. Data, 2005, pp. 197–202.
[37]
J. Zhang, C. Chen, Y. Xiang, W. Zhou, and Y. Xiang, “Internet traffic classification by aggregating correlated Naive Bayes predictions,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 5–15, 2012.
[38]
A. Dainotti, A. Pescapé, and C. Sansone, “Early classification of network traffic through multi-classification,” in Proc. Int. Workshop Traffic Monitor. Anal., 2011, pp. 122–135.
[39]
T. T. Nguyen, G. Armitage, P. Branch, and S. Zander, “Timely and continuous machine-learning-based classification for interactive IP traffic,” IEEE/ACM Trans. Netw., vol. 20, no. 6, pp. 1880–1894, Dec. 2012.
[40]
W. De Donato, A. Pescapé, and A. Dainotti, “Traffic identification engine: An open platform for traffic classification,” IEEE Netw., vol. 28, no. 2, pp. 56–64, Mar./Apr. 2014.
[41]
M. Roughan, S. Sen, O. Spatscheck, and N. Duffield, “Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification,” in Proc. 4th ACM SIGCOMM Conf. Internet Meas., 2004, pp. 135–148.
[42]
L. He, C. Xu, and Y. Luo, “VTC: Machine learning based traffic classification as a virtual network function,” in Proc. ACM Int. Workshop Security Softw. Defined Netw. Netw. Function Virtualization, 2016, pp. 53–56.
[43]
J. Zhang, X. Chen, Y. Xiang, W. Zhou, and J. Wu, “Robust network traffic classification,” IEEE/ACM Trans. Netw., vol. 23, no. 4, pp. 1257–1270, Aug. 2015.
[44]
Y. Liu, W. Li, and Y. Li, “Network traffic classification using K-means clustering,” in Proc. IEEE 2nd Int. Multi Symp. Comput. Sci. (IMSCCS), 2007, pp. 360–365.
[45]
J. Erman, A. Mahanti, M. Arlitt, and C. Williamson, “Identifying and discriminating between Web and peer-to-peer traffic in the network core,” in Proc. 16th Int. Conf. World Wide Web, 2007, pp. 883–892.
[46]
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, “Traffic classification on the fly,” ACM SIGCOMM Comput. Commun. Rev., vol. 36, no. 2, pp. 23–26, 2006.
[47]
J. Erman, A. Mahanti, M. Arlitt, I. Cohen, and C. Williamson, “Offline/realtime traffic classification using semi-supervised learning,” Perform. Eval., vol. 64, nos. 9–12, pp. 1194–1213, 2007.
[48]
W. Li and A. W. Moore, “A machine learning approach for efficient traffic classification,” in Proc. 15th Int. Symp. Model. Anal. Simulat. Comput. Telecommun. Syst., 2007, pp. 310–317.
[49]
Y. Jin, N. Duffield, J. Erman, P. Haffner, S. Sen, and Z.-L. Zhang, “A modular machine learning system for flow-level traffic classification in large networks,” ACM Trans. Knowl. Disc. Data, vol. 6, no. 1, pp. 1–34, 2012.
[50]
M. Elnawawy, A. Sagahyroon, and T. Shanableh, “FPGA-based network traffic classification using machine learning,” IEEE Access, vol. 8, pp. 175637–175650, 2020.
[51]
K. Hara and K. Shiomoto, “Intrusion detection system using semisupervised learning with adversarial auto-encoder,” in Proc. IEEE/IFIP Netw. Oper. Manag. Symp. (NOMS), 2020, pp. 1–8.
[52]
D. M. Casas-Velasco, O. M. C. Rendon, and N. L. da Fonseca, “DRSIR: A deep reinforcement learning approach for routing in softwaredefined networking,” IEEE Trans. Netw. Service Manag., vol. 19, no. 4, pp. 4807–4820, Dec. 2022.
[53]
D. M. Casas-Velasco, O. M. C. Rendon, and N. L. da Fonseca, “Intelligent routing based on reinforcement learning for softwaredefined networking,” IEEE Trans. Netw. Service Manag., vol. 18, no. 1, pp. 870–881, Mar. 2021.
[54]
A. Forster and A. L. Murphy, “FROMS: Feedback routing for Optimizing multiple sinks in WSN with reinforcement learning,” in Proc. 3rd Int. Conf. Intell. Sensors Sensor Netw. Inf., 2007, pp. 371–376.
[55]
R. Arroyo-Valles, R. Alaiz-Rodriguez, A. Guerrero-Curieses, and J. Cid-Sueiro, “Q-probabilistic routing in wireless sensor networks,” in Proc. IEEE 3rd Int. Conf. Intell. Sensors Sensor Netw. Inf., 2007, pp. 1–6.
[56]
T. Hu and Y. Fei, “QELAR: A machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks,” IEEE Trans. Mobile Comput., vol. 9, no. 6, pp. 796–809, Jun. 2010.
[57]
A. A. Bhorkar, M. Naghshvar, T. Javidi, and B. D. Rao, “Adaptive opportunistic routing for wireless ad hoc networks,” IEEE/ACM Trans. Netw., vol. 20, no. 1, pp. 243–256, Feb. 2012.
[58]
N. Fonseca and M. Crovella, “Bayesian packet loss detection for TCP,” in Proc. IEEE 24th Annu. Joint Conf. IEEE Comput. Commun. Soc., vol. 3, 2005, pp. 1826–1837.
[59]
I. El Khayat, P. Geurts, and G. Leduc, “Improving TCP in wireless networks with an adaptive machine-learnt classifier of packet loss causes,” in Proc. Int. Conf. Res. Netw., 2005, pp. 549–560.
[60]
I. El Khayat, P. Geurts, and G. Leduc, “Enhancement of TCP over wired/wireless networks with packet loss classifiers inferred by supervised learning,” Wireless Netw., vol. 16, no. 2, pp. 273–290, 2010.
[61]
P. Geurts, I. El Khayat, and G. Leduc, “A machine learning approach to improve congestion control over wireless computer networks,” in Proc. 4th IEEE Int. Conf. Data Min. (ICDM), 2004, pp. 383–386.
[62]
I. El Khayat, P. Geurts, and G. Leduc, “Machine-learnt versus analytical models of TCP throughput,” Comput. Netw., vol. 51, no. 10, pp. 2631–2644, 2007.
[63]
M. F. Zhani, H. Elbiaze, and F. Kamoun, “α_ SNFAQM: An active queue management mechanism using neurofuzzy prediction,” in Proc. 12th IEEE Symp. Comput. Commun., 2007, pp. 381–386.
[64]
S. Masoumzadeh, G. Taghizadeh, K. Meshgi, and S. Shiry, “Deep blue: A fuzzy Q-learning enhanced active queue management scheme,” in Proc. Int. Conf. Adapt. Intell. Syst., 2009, pp. 43–48.
[65]
H. Jiang, Y. Luo, Q. Zhang, M. Yin, and C. Wu, “TCP-GVEGAS with prediction and adaptation in multi-hop ad hoc networks,” Wireless Netw., vol. 23, no. 5, pp. 1535–1548, 2017.
[66]
A. P. Silva, K. Obraczka, S. Burleigh, and C. M. Hirata, “Smart congestion control for delay-and disruption tolerant networks,” in Proc. 13th Annu. IEEE Int. Conf. Sens. Commun. Netw. (SECON), 2016, pp. 1–9.
[67]
D. Vassis, A. Kampouraki, P. Belsis, and C. Skourlas, “Admission control of video sessions over ad hoc networks using neural classifiers,” in Proc. IEEE Mil. Commun. Conf., 2014, pp. 1015–1020.
[68]
A. Hiramatsu, “ATM communications network control by neural network,” IEEE Trans. Neural Netw., vol. 1, no. 1, pp. 122–130, Mar. 1989.
[69]
N. Baldo, P. Dini, and J. Nin-Guerrero, “User-driven call admission control for VoIP over WLAN with a neural network based cognitive engine,” in Proc. IEEE 2nd Int. Workshop Cogn. Inf. Process., 2010, pp. 52–56.
[70]
N. Baldo and M. Zorzi, “Learning and adaptation in cognitive radios using neural networks,” in Proc. 5th IEEE Consum. Commun. Netw. Conf., 2008, pp. 998–1003.
[71]
B. Bojovic, N. Baldo, J. Nin-Guerrero, and P. Dini, “A supervised learning approach to cognitive access point selection,” in Proc. IEEE GLOBECOM Workshops (GC Wkshps), 2011, pp. 1100–1105.
[72]
D. Liu, Y. Zhang, and H. Zhang, “A self-learning call admission control scheme for CDMA cellular networks,” IEEE Trans. Neural Netw., vol. 16, no. 5, pp. 1219–1228, Sep. 2005.
[73]
B. Bojovi´c, G. Quer, N. Baldo, and R. R. Rao, “Bayesian and neural network schemes for call admission control in LTE systems,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), 2013, pp. 1246–1252.
[74]
G. Quer, N. Baldo, and M. Zorzi, “Cognitive call admission control for VoIP over IEEE 802.11 using Bayesian networks,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), 2011, pp. 1–6.
[75]
R. Shiet al., “MDP and machine learning-based cost-optimization of dynamic resource allocation for network function virtualization,” in Proc. IEEE Int. Conf. Services Comput., 2015, pp. 65–73.
[76]
A. Blenk, P. Kalmbach, P. Van Der Smagt, and W. Kellerer, “Boost online virtual network embedding: Using neural networks for admission control,” in Proc. 12th Int. Conf. Netw. Service Manag. (CNSM), 2016, pp. 10–18.
[77]
A. Adeel, H. Larijani, A. Javed, and A. Ahmadinia, “Critical analysis of learning algorithms in random neural network based cognitive engine for LTE systems,” in Proc. IEEE 81st Veh. Technol. Conf. (VTC Spring), 2015, pp. 1–5.
[78]
A. Testolinet al., “A machine learning approach to QoE-based video admission control and resource allocation in wireless systems,” in Proc. 13th Annu. Mediterr. Ad Hoc Netw. Workshop (MED-HOC-NET), 2014, pp. 31–38.
[79]
S. Mignanti, A. Di Giorgio, and V. Suraci, “A model based RL admission control algorithm for next generation networks,” in Proc. 8th Int. Conf. Netw., 2009, pp. 191–196.
[80]
H. Tong and T. X. Brown, “Adaptive call admission control under quality of service constraints: A reinforcement learning solution,” IEEE J. Sel. Areas Commun., vol. 18, no. 2, pp. 209–221, Feb. 2000.
[81]
J. Wang and Y. Qiu, “A new call admission control strategy for LTE femtocell networks,” in Proc. 2nd Int. Conf. Adv. Comput. Sci. Eng., 2013, pp. 334–338.
[82]
R. Mijumbi, J.-L. Gorricho, J. Serrat, M. Claeys, F. De Turck, and S. Latré, “Design and evaluation of learning algorithms for dynamic resource management in virtual networks,” in Proc. IEEE Netw. Oper. Manag. Symp. (NOMS), 2014, pp. 1–9.
[83]
Y. Wang, M. Martonosi, and L.-S. Peh, “Predicting link quality using supervised learning in wireless sensor networks,” ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 11, no. 3, pp. 71–83, 2007.
[84]
A. Pellegrini, P. Di Sanzo, and D. R. Avresky, “A machine learningbased framework for building application failure prediction models,” in Proc. IEEE Int. Parallel Distrib. Process. Symp. Workshop, 2015, pp. 1072–1081.
[85]
Z. Wanget al., “Failure prediction using machine learning and time series in optical network,” Opt. Exp., vol. 25, no. 16, pp. 18553–18565, 2017.
[86]
U. S. Hashmi, A. Darbandi, and A. Imran, “Enabling proactive selfhealing by data mining network failure logs,” in Proc. Int. Conf. Comput. Netw. Commun. (ICNC), 2017, pp. 511–517.
[87]
K. Qader, M. Adda, and M. Al-Kasassbeh, “Comparative analysis of clustering techniques in network traffic faults classification,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 5, no. 4, pp. 6551–6563, 2017.
[88]
E. Kiciman and A. Fox, “Detecting application-level failures in component-based Internet services,” IEEE Trans. Neural Netw., vol. 16, no. 5, pp. 1027–1041, Sep. 2005.
[89]
M. Chen, A. X. Zheng, J. Lloyd, M. I. Jordan, and E. Brewer, “Failure diagnosis using decision trees,” in Proc. Int. Conf. Auton. Comput., 2004, pp. 36–43.
[90]
A. Snow, P. Rastogi, and G. Weckman, “Assessing dependability of wireless networks using neural networks,” in Proc. IEEE Mil. Commun. Conf. (MILCOM), 2005, pp. 2809–2815.
[91]
J. S. Baras, M. Ball, S. Gupta, P. Viswanathan, and P. Shah, “Automated network fault management,” in Proc. IEEE MILCOM, vol. 3, 1997, pp. 1244–1250.
[92]
Y. Kumar, H. Farooq, and A. Imran, “Fault prediction and reliability analysis in a real cellular network,” in Proc. 13th Int. Wireless Commun. Mobile Comput. Conf. (IWCMC), 2017, pp. 1090–1095.
[93]
C. S. Hood and C. Ji, “Proactive network-fault detection [telecommunications],” IEEE Trans. Rel., vol. 46, no. 3, pp. 333–341, Sep. 1997.
[94]
P. Kogeda and J. I. Agbinya, “Prediction of faults in cellular networks using Bayesian network model,” in Proc. Int. Conf. Wireless Broadband Ultra Wideband Commun., 2006, p. 12.
[95]
M. Ruizet al., “Service-triggered failure identification/localization through monitoring of multiple parameters,” in Proc. 42nd Eur. Conf. Opt. Commun. (ECOC), 2016, pp. 1–3.
[96]
R. M. Khanaferet al., “Automated diagnosis for UMTS networks using Bayesian network approach,” IEEE Trans. Veh. Technol., vol. 57, no. 4, pp. 2451–2461, Jul. 2008.
[97]
A. I. Moustapha and R. R. Selmic, “Wireless sensor network modeling using modified recurrent neural networks: Application to fault detection,” IEEE Trans. Instrum. Meas., vol. 57, no. 5, pp. 981–988, May 2008.
[98]
M. S. Mushtaq, B. Augustin, and A. Mellouk, “Empirical study based on machine learning approach to assess the QoS/QoE correlation,” in Proc. 17th Eur. Conf. Netw. Opt. Commun., 2012, pp. 1–7.
[99]
P. Charonyktakis, M. Plakia, I. Tsamardinos, and M. Papadopouli, “On user-centric modular QoE prediction for VoIP based on machinelearning algorithms,” IEEE Trans. Mobile Comput., vol. 15, no. 6, pp. 1443–1456, Jun. 2016.
[100]
E. Demirbilek and J.-C. Grégoire, “Machine learning–based parametric audiovisual quality prediction models for real-time communications,” ACM Trans. Multimedia Comput. Commun. Appl., vol. 13, no. 2, pp. 1–25, 2017.
[101]
V. A. Machadoet al., “A new proposal to provide estimation of QoS and QoE over WiMAX networks: An approach based on computational intelligence and discrete-event simulation,” in Proc. IEEE 3rd Latin– Amer. Conf. Commun., 2011, pp. 1–6.
[102]
M. Claeys, S. Latré, J. Famaey, T. Wu, W. Van Leekwijck, and F. De Turck, “Design of a Q-learning-based client quality selection algorithm for HTTP adaptive video streaming,” in Proc. Adapt. Learn. Agents Workshop (AAMAS (ALA), 2013, pp. 30–37.
[103]
M. Claeys, S. Latre, J. Famaey, and F. De Turck, “Design and evaluation of a self-learning HTTP adaptive video streaming client,” IEEE Commun. Lett., vol. 18, no. 4, pp. 716–719, Apr. 2014.
[104]
M. Panda, A. Abraham, and M. R. Patra, “A hybrid intelligent approach for network intrusion detection,” Procedia Eng., vol. 30, pp. 1–9, 2012.
[105]
S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas, “Modeling intrusion detection system using hybrid intelligent systems,” J. Netw. Comput. Appl., vol. 30, no. 1, pp. 114–132, 2007.
[106]
D. S. Kim, H.-N. Nguyen, and J. S. Park, “Genetic algorithm to improve SVM based network intrusion detection system,” in Proc. 19th Int. Conf. Adv. Inf. Netw. Appl. (AINA), vol. 2, 2005, pp. 155–158.
[107]
S. Mukkamala, G. Janoski, and A. Sung, “Intrusion detection using neural networks and support vector machines,” in Proc. Int. Joint Conf. Neural Netw. (IJCNN), vol. 2, 2002, pp. 1702–1707.
[108]
N. B. Amor, S. Benferhat, and Z. Elouedi, “Naive Bayes vs decision trees in intrusion detection systems,” in Proc. ACM Symp. Appl. Comput., 2004, pp. 420–424.
[109]
Y. Li and L. Guo, “An active learning based TCM-KNN algorithm for supervised network intrusion detection,” Comput. Security, vol. 26, nos. 7–8, pp. 459–467, 2007.
[110]
A. P. Muniyandi, R. Rajeswari, and R. Rajaram, “Network anomaly detection by cascading K-means clustering and C4.5 decision tree algorithm,” Procedia Eng., vol. 30, pp. 174–182, 2012.
[111]
Z.-S. Pan, S.-C. Chen, G.-B. Hu, and D.-Q. Zhang, “Hybrid neural network and C4.5 for misuse detection,” in Proc. Int. Conf. Mach. Learn. Cybern., vol. 4, 2003, pp. 2463–2467.
[112]
W. Hu, W. Hu, and S. Maybank, “AdaBoost-based algorithm for network intrusion detection,” IEEE Trans. Syst. Man, Cybern. B, Cybern., vol. 38, no. 2, pp. 577–583, Apr. 2008.
[113]
J. Zhang and M. Zulkernine, “Anomaly based network intrusion detection with unsupervised outlier detection,” in Proc. IEEE Int. Conf. Commun., vol. 5, 2006, pp. 2388–2393.
[114]
B. Pfahringer, “Winning the KDD99 classification cup: Bagged boosting,” ACM SIGKDD Explor. Newslett., vol. 1, no. 2, pp. 65–66, 2000.
[115]
S. Chebrolu, A. Abraham, and J. P. Thomas, “Feature deduction and ensemble design of intrusion detection systems,” Comput. Security, vol. 24, no. 4, pp. 295–307, 2005.
[116]
J. Cannady, “Artificial neural networks for misuse detection,” in Proc. Nat. Inf. Syst. Security Conf. (NISSC), 1998, pp. 443–456.
[117]
M. Moradi and M. Zulkernine, “A neural network based system for intrusion detection and classification of attacks,” in Proc. IEEE Int. Conf. Adv. Intell. Syst. Theory Appl., 2004, pp. 15–18.
[118]
J. Kim, J. Kim, H. L. T. Thu, and H. Kim, “Long short term memory recurrent neural network classifier for intrusion detection,” in Proc. Int. Conf. Platform Technol. Service (PlatCon), 2016, pp. 1–5.
[119]
A. Servin and D. Kudenko, “Multi-agent reinforcement learning for intrusion detection: A case study and evaluation,” in Proc. German Conf. Multiagent Syst. Technol., 2008, pp. 159–170.
[120]
M. Sánchez-Fernández, M. de Prado-Cumplido, J. Arenas-García, and F. Pérez-Cruz, “SVM Multiregression for nonlinear channel estimation in multiple–input multiple–output systems,” IEEE Trans. Signal Process., vol. 52, no. 8, pp. 2298–2307, Aug. 2004.
[121]
P. Haffner, G. Tur, and J. H. Wright, “Optimizing SVMs for complex call classification,” in Proc. IEEE Int. Conf. Acoust. Speech Signal Process. (ICASSP), vol. 1, 2003, p. 1.
[122]
Y. Zhang, J. Wen, G. Yang, Z. He, and X. Luo, “Air-to-air path loss prediction based on machine learning methods in urban environments,” Wireless Commun. Mobile Comput., vol. 2018, Jun. 2018, Art. no.
[123]
D. F. F. Baptista, R. Ferrari, and R. Attux, “Channel equalization based on decision trees,” J. Commun. Inf. Syst., vol. 35, no. 1, pp. 150–161, 2020.
[124]
S. Luan, Y. Gao, W. Chen, N. Yu, and Z. Zhang, “Automatic modulation classification: Decision tree based on error entropy and global-local feature-coupling network under mixed noise and fading channels,” IEEE Wireless Commun. Lett., vol. 11, no. 8, pp. 1703–1707, Aug. 2022.
[125]
Y. Wu, Y. Wang, J. Huang, C.-X. Wang, and C. Huang, “A weighted random forest based positioning algorithm for 6G indoor communications,” in Proc. IEEE 96th Veh. Technol. Conf. (VTC-Fall), 2022, pp. 1–6.
[126]
T. O’Shea, K. Karra, and T. C. Clancy, “Learning approximate neural estimators for wireless channel state information,” in Proc. IEEE 27th Int. Workshop Mach. Learn. Signal Process. (MLSP), 2017, pp. 1–7.
[127]
J. Huanget al., “A big data enabled channel model for 5G wireless communication systems,” IEEE Trans. Big Data, vol. 6, no. 2, pp. 211–222, Jun. 2020.
[128]
H. He, C.-K. Wen, S. Jin, and G. Y. Li, “Deep learning-based channel estimation for beamspace mmWave massive MIMO systems,” IEEE Wireless Commun. Lett., vol. 7, no. 5, pp. 852–855, Oct. 2018.
[129]
T. O’shea and J. Hoydis, “An introduction to deep learning for the physical layer,” IEEE Trans. Cogn. Commun. Netw., vol. 3, no. 4, pp. 563–575, Dec. 2017.
[130]
G. Kechriotis, E. Zervas, and E. S. Manolakos, “Using recurrent neural networks for adaptive communication channel equalization,” IEEE Trans. Neural Netw., vol. 5, no. 2, pp. 267–278, Mar. 1994.
[131]
D.-C. Park and T.-K. J. Jeong, “Complex-bilinear recurrent neural network for equalization of a digital satellite channel,” IEEE Trans. Neural Netw., vol. 13, no. 3, pp. 711–725, Jul. 2002.
[132]
M. Ghavamzadehet al., “Bayesian reinforcement learning: A survey,” Found. Trends Mach. Learn., vol. 8, nos. 5–6, pp. 359–483, 2015.
[133]
S. M. Aldossari and K.-C. Chen, “Machine learning for wireless communication channel modeling: An overview,” Wireless Pers. Commun., vol. 106, no. 1, pp. 41–70, 2019.
[134]
“Cisco annual Internet report (2018–2023) white paper.,” Accessed: Mar. 26, 2021. [Online]. Available: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/Annu.-internet-Rep./whitepaper-c11-741490
[135]
The intelligent use of big data on an industrial scale.” Accessed: Jan. 2024. [Online]. Available: https://www.the-next-tech.com/development/the-intelligent-use-of-big-data-on-an-industrial-scale/
[136]
R. Meulen. “Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016.” 2017. [Online]. Available: https://www.information-age.com/gartner-8-4-billion-iot-2017-4225/
[137]
P. Domingos and M. Pazzani, “On the optimality of the simple Bayesian classifier under zero-one loss,” Mach. Learn., vol. 29, no. 2, pp. 103–130, 1997.
[138]
J. N. Morgan and J. A. Sonquist, “Problems in the analysis of survey data, and a proposal,” J. Amer. Stat. Assoc., vol. 58, no. 302, pp. 415–434, 1963.
[139]
C. Cortes and V. Vapnik, “Support-vector networks,” Mach. Learn., vol. 20, no. 3, pp. 273–297, 1995.
[140]
K. Bennett and A. Demiriz, “Semi-supervised support vector machines,” in Proc. Adv. Neural Inf. Process. Syst., vol. 11, 1998, pp. 368–374.
[141]
E. Fix and J. L. Hodges, “Discriminatory analysis. nonparametric discrimination: Consistency properties,” Int. Stat. Rev. Revue Internationale de Statistique, vol. 57, no. 3, pp. 238–247, 1989.
[142]
M. A. Kramer, “Nonlinear principal component analysis using autoassociative neural networks,” AIChE J., vol. 37, no. 2, pp. 233–243, 1991.
[143]
C. J. C. H. Watkins, Learning From Delayed Rewards, King’s College, Cambridge, MA, USA, 1989.
[144]
G. A. Rummery and M. Niranjan, On-Line Q-Learning Using Connectionist Systems, vol. 37. Cambridge, MA, USA: Cambridge Univ. Press, 1994.
[145]
M. A. Alsheikh, S. Lin, D. Niyato, and H.-P. Tan, “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,” IEEE Commun. Surveys Tuts., vol. 16, no. 4, pp. 1996–2018, 4th Quart., 2014.
[146]
P. V. Klaine, M. A. Imran, O. Onireti, and R. D. Souza, “A survey of machine learning techniques applied to self-organizing cellular networks,” IEEE Commun. Surveys Tuts., vol. 19, no. 4, pp. 2392–2431, 4th Quart., 2017.
[147]
A. Aljuhani, “Machine learning approaches for combating distributed denial of service attacks in modern networking environments,” IEEE Access, vol. 9, pp. 42236–42264, 2021.
[148]
N. McKeown, “Software-defined networking,” in Proc. 28th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), vol. 17, 2009, pp. 30–32.
[149]
N. Feamster, J. Rexford, and E. Zegura, “The road to SDN: An intellectual history of programmable networks,” SIGCOMM Comput. Commun. Rev., vol. 44, no. 2, pp. 87–98, Apr. 2014.
[150]
N. Zilberman, P. M. Watts, C. Rotsos, and A. W. Moore, “Reconfigurable network systems and software-defined networking,” Proc. IEEE, vol. 103, no. 7, pp. 1102–1124, Jul. 2015.
[151]
P. Bosshartet al., “Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN,” ACM SIGCOMM Comput. Commun. Rev., vol. 43, no. 4, pp. 99–110, 2013.
[152]
N. McKeown. “PISA: Protocol independent switch architecture.” 2015. [Online]. Available: https://opennetworking.org/wp-content/uploads/2020/12/p4-ws-2017-p4-architectures.pdf
[153]
P4_16 portable switch architecture (PSA).” 2018. [Online]. Available: https://opennetworking.org/p4/
[154]
P4 portable NIC architecture (PNA).” Accessed: May 2021. [Online]. Available: https://p4.org/p4-spec/docs/PNA.html
[155]
Version 1.0 switch architecture model.” Accessed: Nov. 2023. [Online]. Available: https://github.com/p4lang/p4c/blob/main/p4include/v1model.p4
[156]
Open Tofino.” Accessed: Nov. 2023. [Online]. Available: https://github.com/barefootnetworks/Open-Tofino
[157]
S. Choleet al., “dRMT: Disaggregated programmable switching,” in Proc. Conf. ACM Special Interest Group Data Commun., 2017, pp. 1–14.
[158]
p4c.” Accessed: Nov. 2023. [Online]. Available: https://github.com/p4lang/p4c
[159]
The reference P4 software switch.” Accessed: Nov. 2023. [Online]. Available: https://github.com/p4lang/behavioral-model
[160]
T. P. Morgan. “Spectrum-4 Ethernet leaps to 800G with NVIDIA circuits.” 2022. [Online]. Available: https://www.nextplatform.com/2022/04/01/spectrum-4-ethernet-leaps-to-800-gb-sec-with-nvidia-circuits/
[161]
C. Zhenget al., “Automating in-network machine learning,” 2022, arXiv:2205.08824.
[162]
R. B. Basat, S. Ramanathan, Y. Li, G. Antichi, M. Yu, and M. Mitzenmacher, “PINT: Probabilistic in-band network telemetry,” in Proc. Annu. Conf. ACM Special Interest Group Data Commun. Appl. Technol. Archit. Protocols Comput. Commun., 2020, pp. 662–680.
[163]
P. Wintermeyer, M. Apostolaki, A. Dietmüller, and L. Vanbever, “P2GO: P4 profile-guided optimizations,” in Proc. 19th ACM Workshop Hot Topics Netw., 2020, pp. 146–152.
[164]
Y. Zhouet al., “Flow event telemetry on programmable data plane,” in Proc. Annu. Conf. ACM Special Interest Group Data Commun. Appl. Technol. Archit. Protocols Comput. Commun., 2020, pp. 76–89.
[165]
H. Wanget al., “P4FPGA: A rapid prototyping framework for P4,” in Proc. Symp. SDN Res., 2017, pp. 122–135.
[166]
N. Zilberman, Y. Audzevich, G. Covington, and A. W. Moore, “NetFPGA SUME: Toward 100 Gbps as research commodity,” IEEE Micro, vol. 34, no. 5, pp. 32–41, Sep. 2014.
[167]
G. Brebner. “Expanding the P4 universe.” Accessed: Nov. 2023. [Online]. Available: https://opennetworking.org/wpcontent/uploads/2022/05/Expanding-the-P4-universe.pdf
[168]
P. Vörös, D. Horpácsi, R. Kitlei, D. Leskó, M. Tejfel, and S. Laki, “T4P4S: A target-independent compiler for protocol-independent packet processors,” in Proc. IEEE 19th Int. Conf. High Perform. Switch. Routing (HPSR), 2018, pp. 1–8.
[169]
B. Pfaffet al., “The design and implementation of open vSwitch,” in Proc. 12th USENIX Symp. Netw. Syst. Design Implement. (NSDI), 2015, pp. 117–130.
[170]
S. Laki, R. Stoyanov, D. Kis, R. Soulé, P. Vörös, and N. Zilberman, “P4Pi: P4 on raspberry Pi for networking education,” ACM SIGCOMM Comput. Commun. Rev., vol. 51, no. 3, pp. 17–21, 2021.
[171]
P4runtime.” Accessed: Nov. 2023. [Online]. Available: https://p4.org/p4-spec/p4runtime/main/P4Runtime-Spec.html
[172]
Y. Tokusashi, H. Matsutani, and N. Zilberman, “LaKe: The power of in-network computing,” in Proc. Int. Conf. Reconfig. Comput. (FPGAs ReConFig), 2018, pp. 1–8.
[173]
V. Bahl. “Unlocking the potential of in-network computing for telecommunication workloads.” Accessed: Nov. 2023. [Online]. Available: https://azure.microsoft.com/en-us/blog/unlocking-thepotential-of-in-network-computing-for-telecommunication-workloads/
[174]
D. Kimet al., “TEA: Enabling state-intensive network functions on programmable switches,” in Proc. ACM SIGCOMM Conf., 2020, pp. 90–106.
[175]
X. Jinet al., “NetCache: Balancing key-value stores with fast innetwork caching,” in Proc. 26th Symp. Oper. Syst. Principle, 2017, pp. 121–136.
[176]
H. T. Danget al., “P4xos: Consensus as a network service,” IEEE/ACM Trans. Netw., vol. 28, no. 4, pp. 1726–1738, Aug. 2020.
[177]
X. Jinet al., “NetChain: Scale-free sub-RTT coordination,” in Proc. 15th {USENIX} Symp. Netw. Syst. Design Implement. (NSDI), 2018, pp. 35–49.
[178]
M. Liuet al., “Learning based adaptive network immune mechanism to defense eavesdropping attacks,” IEEE Access, vol. 7, pp. 182814–182826, 2019.
[179]
J. Bai, M. Zhang, G. Li, C. Liu, M. Xu, and H. Hu, “FastFE: Accelerating ML-based traffic analysis with programmable switches,” in Proc. Workshop Secure Program. Netw. Infrastruct., 2020, pp. 1–7.
[180]
D. Barradas, N. Santos, L. Rodrigues, S. Signorello, F. M. Ramos, and A. Madeira, “FlowLens: Enabling efficient flow classification for MLbased network security applications,” in Proc. 27th Netw. Distrib. Syst. Secur. Symp., Feb. 2021.
[181]
Q. Li, J. Zhang, T. Pan, T. Huang, and Y. Liu, “Data-driven routing optimization based on programmable data plane,” in Proc. IEEE 29th Int. Conf. Comput. Commun. Netw. (ICCCN), 2020, pp. 1–9.
[182]
Y. Mi and A. Wang, “ML-pushback: Machine learning based pushback defense against DDoS,” in Proc. 15th Int. Conf. Emerg. Netw. Exp. Technol., 2019, pp. 80–81.
[183]
Y. Li, I.-J. Liu, Y. Yuan, D. Chen, A. Schwing, and J. Huang, “Accelerating distributed reinforcement learning with in-switch computing,” in Proc. ACM/IEEE 46th Annu. Int. Symp. Comput. Architect. (ISCA), 2019, pp. 279–291.
[184]
F. Yang, Z. Wang, X. Ma, G. Yuan, and X. An, “SwitchAgg: A further step towards in-network computing,” in Proc. IEEE Int. Conf. Parallel Distrib. Process. Appl. Big Data Cloud Comput. Sustain. Comput. Commun. Soc. Comput. Netw. (ISPA/BDCloud/SocialCom/SustainCom), 2019, pp. 36–45.
[185]
A. Sapioet al., “Scaling distributed machine learning with in-network aggregation,” 2019, arXiv:1903.06701.
[186]
C. Laoet al., “ATP: In-network aggregation for multi-tenant learning,” in Proc. USENIX NSDI, 2021, pp. 741–761.
[187]
F. Musumeci, A. C. Fidanci, F. Paolucci, F. Cugini, and M. Tornatore, “Machine-learning-enabled DDoS attacks detection in P4 programmable networks,” J. Netw. Syst. Manag., vol. 30, pp. 1–27, Nov. 2022.
[188]
C. Zhenget al., “IIsy: Practical in-network classification,” 2022, arXiv:2205.08243.
[189]
C. Zhenget al., “DINC: Toward distributed in-network computing,” in Proc. ACM CoNEXT, 2023, pp. 1–25.
[190]
T. Swamy, A. Zulfiqar, L. Nardi, M. Shahbaz, and K. Olukotun, “Homunculus: Auto-generating efficient data-plane ML pipelines for datacenter networks,” in Proc. 28th ACM Int. Conf. Architect. Support Program. Lang. Oper. Syst., vol. 3, 2023, pp. 329–342.
[191]
G. Siracusano and R. Bifulco, “In-network neural networks,” 2018, arXiv:1801.05731.
[192]
G. Siracusano, D. Sanvito, S. Galea, and R. Bifulco, “Deep learning inference on commodity network interface cards,” in Proc. Workshop Syst. ML Open Source Softw. (NeurIPS), 2018, pp. 1–8.
[193]
C. Busse-Grawitz, R. Meier, A. Dietmüller, T. Bühler, and L. Vanbever, “pForest: In-network inference with random forests,” 2019, arXiv:1909.05680.
[194]
J.-H. Lee and K. Singh, “SwitchTree: In-network computing and traffic Analyses with random forests,” Neural Comput. Appl., to be published.
[195]
T. Swamy, A. Rucker, M. Shahbaz, and K. Olukotun, “Taurus: An intelligent data plane,” 2020, arXiv:2002.08987.
[196]
T. Swamy, A. Rucker, M. Shahbaz, I. Gaur, and K. Olukotun, “Taurus: A data plane architecture for per-packet ML,” in Proc. 27th ACM Int. Conf. Archit. Support Program. Lang. Oper. Syst., 2022, pp. 1099–1114.
[197]
Q. Qin, K. Poularakis, K. K. Leung, and L. Tassiulas, “Line-speed and scalable intrusion detection at the network edge via federated learning,” in Proc. IEEE IFIP Netw. Conf. (Netw.), 2020, pp. 352–360.
[198]
G. Siracusanoet al., “Running neural networks on the NIC,” 2020, arXiv:2009.02353.
[199]
G. Siracusanoet al., “Re-architecting traffic analysis with neural network interface cards,” in Proc. 19th USENIX Symp. Netw. Syst. Design Implement. (NSDI), 2022, pp. 513–533.
[200]
B. L. Coelho, “Detecting DoS attacks utilizing random forests in programmable data planes,” in Proc. EuroP, 2020, pp. 1–7.
[201]
C. Zheng and N. Zilberman, “Planter: Seeding trees within switches,” in Proc. SIGCOMM Poster Demo Sessions, 2021, pp. 12–14.
[202]
B. M. Xavier, R. S. Guimarães, G. Comarela, and M. Martinello, “Programmable switches for in-networking classification,” in Proc. IEEE INFOCOM Conf. Comput. Commun., 2021, pp. 1–10.
[203]
Z. Zhonget al., “IOI: In-network optical inference,” in Proc. ACM SIGCOMM 2021 Workshop Opt. Syst., Aug. 2021, pp. 18–22.
[204]
R. Friedman, O. Goaz, and O. Rottenstreich, “Clustreams: Data plane clustering,” in Proc. ACM SIGCOMM Symp. SDN Res. (SOSR), 2021, pp. 1–23.
[205]
H. Siddique. “Towards in-network image classification for latency-critical IoT applications.” 2021. [Online]. Available: https://dalspace.library.dal.ca/handle/10222/81072
[206]
H. Siddique, M. Neves, C. Kuzniar, and I. Haque, “Towards networkaccelerated ML-based distributed computer vision systems,” in Proc. IEEE ICPADS, 2021, pp. 1–9.
[207]
K. A. Simpson and D. P. Pezaros, “Online RL in the programmable dataplane with OPaL,” in Proc. 17th Int. Conf. Emerg. Netw. Exp. Technol. (CoNEXT), 2021, pp. 471–472.
[208]
K. A. Simpson and D. P. Pezaros, “Revisiting the classics: Online RL in the programmable dataplane,” in Proc. IEEE NOMS, 2022, pp. 1–10.
[209]
C. Zheng, B. Rienecker, and N. Zilberman, “QCMP: Load balancing via in-network reinforcement learning,” in Proc. 2nd ACM SIGCOMM Workshop Future Internet Routing Address., 2023, p. 12.
[210]
F. Paolucci, L. De Marinis, P. Castoldi, and F. Cugini, “Demonstration of P4 neural network switch,” in Proc. Opt. Fiber Commun. Conf. Exhibit. (OFC), 2021, pp. 1–3.
[211]
K. Friday, E. Kfoury, E. Bou-Harb, and J. Crichigno, “INC: In-network classification of Botnet propagation at line rate,” in Proc. Eur. Symp. Res. Comput. Security, 2022, pp. 551–569.
[212]
X. Hong, C. Zheng, S. Zohren, and N. Zilberman, “LINNET: Limit order books within switches,” in Proc. SIGCOMM Poster Demo Sessions, 2022, pp. 37–39.
[213]
X. Hong, C. Zheng, S. Zohren, and N. Zilberman, “LOBIN: In-network machine learning for limit order books,” in Proc. IEEE 24th Int. Conf. High Perform. Switch. Routing (HPSR), 2023, pp. 159–166.
[214]
M. Zang, C. Zheng, R. Stoyanov, L. Dittmann, and N. Zilberman, “P4Pir: In-network analysis for smart IoT gateways,” in Proc. SIGCOMM Poster Demo Sessions, 2022, pp. 46–48.
[215]
M. Zang, C. Zheng, L. Dittmann, and N. Zilberman, “Towards continuous threat defense: In-network traffic analysis for IoT gateways,” IEEE Internet Things J., early access.
[216]
M. Zang, C. Zheng, L. Dittmann, and N. Zilberman, “Advanced threat defense with in-network traffic analysis for IoT gateways,” in Proc. MobiUK, 2023, p. 15.
[217]
M. Zang, C. Zheng, T. Koziak, N. Zilberman, and L. Dittmann, “Federated learning-based in-network traffic analysis on IoT edge,” in Proc. Security IoT Netw. Devices 6G (Sec4IoT), 2023, p. 23.
[218]
B. M. Xavier, R. S. Guimarães, G. Comarela, and M. Martinello, “MAP4: A pragmatic framework for in-network machine learning traffic classification,” IEEE Trans. Netw. Service Manag., vol. 19, no. 4, pp. 4176–4188, Dec. 2022.
[219]
G. Xie, Q. Li, Y. Dong, G. Duan, Y. Jiang, and J. Duan, “MOUSIKA: Enable general in-network intelligence in programmable switches by knowledge distillation,” in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2022, pp. 1938–1947.
[220]
G. Xieet al., “Empowering in-network classification in programmable switches by binary decision tree and knowledge distillation,” IEEE/ACM Trans. Netw., early access, Jun. 21, 2023. 10.1109/TNET.2023.3287091.
[221]
A. T.-J. Akemet al., “FlowRest: Practical flow-level inference in programmable switches with random forests,” in Proc. IEEE Int. Conf. Comput. Commun., 2023, pp. 1–9.
[222]
A. Ganesan and K. Sarac, “Attack detection and mitigation using intelligent data planes in SDNs,” in Proc. IEEE Global Commun. Conf. (GLOBECOM), 2022, pp. 1–6.
[223]
N. Moustafa. “The UNSW-NB15 dataset.” 2015. Accessed: Nov. 2023. [Online]. Available: https://research.unsw.edu.au/projects/unsw-nb15-dataset
[224]
M. Courbariaux, Y. Bengio, and J.-P. David, “BinaryConnect: Training deep neural networks with binary weights during propagations,” in Proc. Adv. Neural Inf. Process. Syst., 2015, pp. 3123–3131.
[225]
M. Courbariaux, I. Hubara, D. Soudry, R. El-Yaniv, and Y. Bengio, “Binarized neural networks: Training deep neural networks with weights and activations constrained to +1 or −1,” 2016, arXiv:1602.02830.
[226]
M. Rastegari, V. Ordonez, J. Redmon, and A. Farhadi, “XNOR-Net: ImageNet classification using binary convolutional neural networks,” in Proc. Eur. Conf. Comput. Vis., 2016, pp. 525–542.
[227]
M. Hamid. “Tile-coding: An efficient sparse-coding method for real-valued data.” Accessed: Nov. 2023. [Online]. Available: https://github.com/criteo-research/tf-tile/blob/master/doc/Tile-Coding-An-Efficient-Sparse-Coding-Method-for-Real-Valued-Data.md
[228]
H. Samet, “The quadtree and related hierarchical data structures,” ACM Comput. Surveys, vol. 16, no. 2, pp. 187–260, 1984.
[229]
K. Das and R. N. Behera, “A survey on machine learning: Concept, algorithms and applications,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 5, no. 2, pp. 1301–1309, 2017.
[230]
Y.-W. Chang, C.-J. Hsieh, K.-W. Chang, M. Ringgaard, and C.-J. Lin, “Training and testing low-degree polynomial data mappings via linear SVM,” J. Mach. Learn. Res., vol. 11, no. 4, pp. 1471–1490, 2010.
[231]
A. Patle and D. S. Chouhan, “SVM kernel functions for classification,” in Proc. Int. Conf. Adv. Technol. Eng. (ICATE), 2013, pp. 1–9.
[232]
S. Suthaharan, “Support vector machine,” in Machine Learning Models and Algorithms for Big Data Classification. New York, NY, USA: Springer, 2016, pp. 207–235.
[233]
Â. C. Lapolli, J. A. Marques, and L. P. Gaspary, “Offloading realtime DDoS attack detection to programmable data planes,” in Proc. IFIP/IEEE Symp. Integr. Netw. Service Manag. (IM), 2019, pp. 19–27.
[234]
S.-C. Wang, “Artificial neural network,” in Interdisciplinary Computing in Java Programming. New York, NY, USA: Springer, 2003, pp. 81–100.
[235]
M. Anthony, P. L. Bartlett, and P. L. Bartlett, Neural Network Learning: Theoretical Foundations, vol. 9. Cambridge, U.K.: Cambridge Univ. Press, 1999.
[236]
H. Qin, R. Gong, X. Liu, X. Bai, J. Song, and N. Sebe, “Binary neural networks: A survey,” Pattern Recognit., vol. 105, Sep. 2020, Art. no.
[237]
Y. LeCunet al., “Convolutional networks for images, speech, and timeseries,” Handbook of Brain Theory Neural Networks, vol. 3361. New York, NY, USA: ACM Press, 1995.
[238]
E. Fix, Discriminatory Analysis: Nonparametric Discrimination, Consistency Properties. Wright-Patterson AFB, OH, USA: USAF School Aviation Med., 1985.
[239]
N. S. Altman, “An introduction to kernel and nearest—Neighbor nonparametric regression,” Amer. Stat., vol. 46, no. 3, pp. 175–185, 1992.
[240]
A. J. Myles, R. N. Feudale, Y. Liu, N. A. Woody, and S. D. Brown, “An introduction to decision tree modeling,” J. Chemometrics Soc., vol. 18, no. 6, pp. 275–285, 2004.
[241]
S. R. Safavian and D. Landgrebe, “A survey of decision tree classifier methodology,” IEEE Trans. Syst., Man, Cybern., vol. 21, no. 3, pp. 660–674, May–Jun. 1991.
[242]
D. Opitz and R. Maclin, “Popular ensemble methods: An empirical study,” J. Artif. Intell. Res., vol. 11, pp. 169–198, Dec. 1999.
[243]
T.-H. Lee, A. Ullah, and R. Wang, “Bootstrap aggregating and random forest,” in Macroeconomic Forecasting in the Era of Big Data. Cham, Switzerland: Springer, 2020, pp. 389–429.
[244]
R. E. Schapire, “A brief introduction to boosting,” in Proc. IJCAI, vol. 99, 1999, pp. 1401–1406.
[245]
T. Chen and C. Guestrin, “XGBoost: A scalable tree boosting system,” in Proc. 22nd ACM SIGKDD Int. Conf. Knowl. Disc. Data Min., 2016, pp. 785–794.
[246]
F. Bayes, “An essay towards solving a problem in the doctrine of chances,” Biometrika, vol. 45, nos. 3–4, pp. 296–315, 1958.
[247]
J. A. Hartigan and M. A. Wong, “Algorithm AS 136: A K-means clustering algorithm,” J. Roy. Stat. Soc. C (Appl. Stat.), vol. 28, no. 1, pp. 100–108, 1979.
[248]
S. Wold, K. Esbensen, and P. Geladi, “Principal component analysis,” Chemometrics Intell. Lab. Syst., vol. 2, nos. 1–3, pp. 37–52, 1987.
[249]
T. Kohonen, “The self-organizing map,” Proc. IEEE, vol. 78, no. 9, pp. 1464–1480, Sep. 1990.
[250]
A. Ng, “Sparse autoencoder,” CS294A Lecture Notes, Stanford Univ., Stanford, CA, USA, 2011.
[251]
F. T. Liu, K. M. Ting, and Z.-H. Zhou, “Isolation forest,” in Proc. 8th IEEE Int. Conf. Data Min., 2008, pp. 413–422.
[252]
X. Zhu and A. B. Goldberg, “Introduction to semi-supervised learning,” Synth. Lectures Artif. Intell. Mach. Learn., vol. 3, no. 1, pp. 1–130, 2009.
[253]
L. P. Kaelbling, M. L. Littman, and A. W. Moore, “Reinforcement learning: A survey,” J. Artif. Intell. Res., vol. 4, pp. 237–285, May 1996.
[254]
V. Mnihet al., “Playing Atari with deep reinforcement learning,” 2013, arXiv:1312.5602.
[255]
J. Liu, F. Gao, and X. Luo, “Survey of deep reinforcement learning based on value function and policy gradient,” Chin. J. Comput., vol. 42, no. 6, pp. 1406–1438, 2019.
[256]
C. J. Watkins and P. Dayan, “Q-learning,” Mach. Learn., vol. 8, nos. 3–4, pp. 279–292, 1992.
[257]
APS networks 100GbE barefoot Tofino-based network switch.” Accessed: Nov. 2023. [Online]. Available: https://www.opencompute.org/products/85/aps-networks-100gbe-barefoot-tofino-based-networkswitch
[258]
[259]
M. Rifaiet al., “Too many SDN rules? Compress them with MINNIE,” in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), 2015, pp. 1–7.
[260]
M. Kobayashi, T. Murase, and A. Kuriyama, “A longest prefix match search engine for multi-gigabit IP processing,” in Proc. IEEE Int. Conf. Commun. Glob. (ICC), vol. 3, 2000, pp. 1360–1364.
[261]
V. Rios and G. Varghese, “MashUp: Scaling TCAM-based IP lookup to larger databases by tiling trees,” 2022, arXiv:2204.09813.
[262]
K. Kannan and S. Banerjee, “Compact TCAM: Flow entry compaction in TCAM for power aware SDN,” in Proc. Int. Conf. Distrib. Comput. Netw., 2013, pp. 439–444.
[263]
F. Yu, R. H. Katz, and T. V. Lakshman, “Gigabit rate packet patternmatching using TCAM,” in Proc. 12th IEEE Int. Conf. Netw. Protocols (ICNP), 2004, pp. 174–183.
[264]
A. Bremler-Barr and D. Hendler, “Space-efficient TCAM-based classification using gray coding,” IEEE Trans. Comput., vol. 61, no. 1, pp. 18–30, May 2010.
[265]
M. Drumond, T. Lin, M. Jaggi, and B. Falsafi, “Training DNNs with hybrid block floating point,” 2018, arXiv:1804.01526.
[266]
U. Kösteret al., “FlexPoint: An adaptive numerical format for efficient training of deep neural networks,” 2017, arXiv:1711.02213.
[267]
J. Bernstein, Y.-X. Wang, K. Azizzadenesheli, and A. Anandkumar, “SignSGD: Compressed optimisation for non-convex problems,” in Proc. Int. Conf. Mach. Learn., 2018, pp. 560–569.
[268]
Y. Lin, S. Han, H. Mao, Y. Wang, and W. J. Dally, “Deep gradient compression: Reducing the communication bandwidth for distributed training,” 2017, arXiv:1712.01887.
[269]
F. Seide, H. Fu, J. Droppo, G. Li, and D. Yu, “1-bit stochastic gradient descent and its application to data-parallel distributed training of speech DNNs,” in Proc. 15th Annu. Conf. Int. Speech Commun. Assoc., 2014, pp. 1–9.
[270]
W. Wenet al., “TernGrad: Ternary gradients to reduce communication in distributed deep learning,” 2017, arXiv:1705.07878.
[271]
S. Zhou, Y. Wu, Z. Ni, X. Zhou, H. Wen, and Y. Zou, “DoReFa-net: Training low bitwidth convolutional neural networks with low bitwidth gradients,” 2016, arXiv:1606.06160.
[272]
J. Von Neumann, “First draft of a report on the EDVAC,” in Proc. IEEE Annu. History Comput., vol. 15, 1993, pp. 27–75.
[273]
J. N. Mitchell, “Computer multiplication and division using binary logarithms,” IRE Trans. Electron. Comput., vol. EC-11, no. 4, pp. 512–517, Aug. 1962.
[274]
G. Cormode, “Count-min sketch,” in Encyclopedia of Database Systems. New York, NY, USA, Springer, 2009, pp. 511–516.
[275]
J. Xinget al., “Runtime programmable switches,” in Proc. 19th USENIX Symp. Netw. Syst. Design Implement. (NSDI), 2022, pp. 651–665.
[276]
N. Sultanaet al., “FlightPlan: Dataplane disaggregation and placement for P4 programs,” in Proc. 18th USENIX Symp. Netw. Syst. Design Implement. (NSDI), 2021, pp. 571–592.
[277]
V. J. Reddiet al., “MLPerf inference benchmark,” in Proc. ACM/IEEE 47th Annu. Int. Symp. Comput. Archit. (ISCA), 2020, pp. 446–459.

Cited By

View all
  • (2024)Federated In-Network Machine Learning for Privacy-Preserving IoT Traffic AnalysisACM Transactions on Internet Technology10.1145/369635424:4(1-24)Online publication date: 18-Nov-2024
  • (2024)XNetIoT: An Extreme Quantized Neural Network Architecture for IoT Environment Using P4IEEE Transactions on Network and Service Management10.1109/TNSM.2024.342331721:5(5756-5767)Online publication date: 1-Oct-2024
  • (2024)A Machine Learning-Based Toolbox for P4 Programmable Data-PlanesIEEE Transactions on Network and Service Management10.1109/TNSM.2024.340207421:4(4450-4465)Online publication date: 1-Aug-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Communications Surveys & Tutorials
IEEE Communications Surveys & Tutorials  Volume 26, Issue 2
Secondquarter 2024
731 pages

Publisher

IEEE Press

Publication History

Published: 19 December 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Federated In-Network Machine Learning for Privacy-Preserving IoT Traffic AnalysisACM Transactions on Internet Technology10.1145/369635424:4(1-24)Online publication date: 18-Nov-2024
  • (2024)XNetIoT: An Extreme Quantized Neural Network Architecture for IoT Environment Using P4IEEE Transactions on Network and Service Management10.1109/TNSM.2024.342331721:5(5756-5767)Online publication date: 1-Oct-2024
  • (2024)A Machine Learning-Based Toolbox for P4 Programmable Data-PlanesIEEE Transactions on Network and Service Management10.1109/TNSM.2024.340207421:4(4450-4465)Online publication date: 1-Aug-2024

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media