SlideShare a Scribd company logo
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
2016 FEDERALFORUM
Presented by Produced by
Intelligent Networking in the
Modern Age: Brocade’s
Approach to Machine
Learning for
Networking
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
You might be surprised but what
is going to drive innovation in the
enterprise and in the public cloud
is machine learning.
Agenda
• What Is Machine Learning?
• What Is All the Machine Learning Excitement About?
• Brocade’s Approach to Machine Learning
• Overview of Our Demo: Open Network Insight
• Technical Explanations/Code
– http://www.1-4-5.net/~dmm/ml
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 3
First, What Is Machine Learning?
• Said another way, we want to discover the Data Generating Distribution that
underlies the data we observe. This is the function that we want
to learn.
• Moreover, we care about primarily about the generalization accuracy
of our model (function)
– Accuracy on examples we have not yet seen -- How can this be?
– As opposed the accuracy on the training set (note: overfitting)
The complexity in traditional computer programming is in
the code (programs that people write). In machine learning,
learning algorithms are in principle simple and the complexity
(structure) is in the data. Is there a way
that we can automatically learn that
structure? That is what is at the
heart of machine learning.
Andrew Ng
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 4
Data
Program
Output
Traditional Programming
Same Thing Said in Cartoon Form
Computer
Data
Output
Machine Learning
Computer
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 5
Ok, We Know That Machines Are Getting
Smarter, But Where Does Knowledge Come
From?
EXPERIENCEEVOLUTION
CULTURE MACHINES
Many orders
of magnitude
faster and larger
So how can machines
discover new
knowledge?
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 6
How Machines Can Discover
New Knowledge?
These correspond to the 5 major schools
of thought in machine learning
Systematically
reduce uncertainty.
• Bayesians
• Technology:
Bayesian Inference
Fill the gaps in
existing knowledge.
• Symbolists
• Technology:
Induction/Inverse
Deduction
Emulate the brain.
• Connectionists
• Technology:
Deep Neural Nets
Emulate evolution.
• Evolutionaries
• Technology: Genetic
Algorithms
Notice similarities
between old and new.
• Analogizers
• Technology: Kernel
Machines/Support
Vector Machines
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 7
Agenda
• What Is Machine Learning?
• What Is All the Machine Learning Excitement About?
• Brocade’s Approach to Machine Learning
• Overview of Our Demo: Open Network Insight
• Technical Explanations/Code
– http://www.1-4-5.net/~dmm/ml
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 8
What Is All the ML Excitement About?
ML applications you interact with everyday
Why this is relevant: Compute, Storage, Networking, Security, and
Energy (CSNSE) use cases will all use this technology
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 9
BTW, Think Object Recognition Is
Impressive?
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 10
Lip Reading?
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 11
Real-Time Language Translation
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 12
One More
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 13
So What Kinds of Network Use Cases Are
We Working On?
• Security/Anomaly Detection
• NFV orchestration and optimization
• New automation tools for DevOps
• Predicting and remediating problems in the mobile network
• Network control plane optimization
• Capture operator/analyst intuition
• ...
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 14
Example:
Using Flow Data for Anomaly Detection
Linear Decision Boundary
Generalization Graph
Radial Nested Block State Model
with Edge Bundling
General Anomaly
Detection Setting
DNS
Tunneling
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 15
Agenda
• What Is Machine Learning?
• What Is All the Machine Learning Excitement About?
• Brocade’s Approach to Machine Learning
• Overview of Our Demo: Open Network Insight
• Technical Explanations/Code
– http://www.1-4-5.net/~dmm/ml
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 16
Pushing the Boundaries: Brocade’s Approach
Bringing deep reinforcement learning to networking
Reinforcement learning meets Deep Learning
and Monte Carlo Tree Search
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 17
Static Architecture vs. Reinforcement
Architecture
• ML doesn’t have “agency”
• Hard-coded or open loop control
• Doesn’t learn control
• Assumes static underlying distribution
Static ML Architecture Reinforcement Learning Architecture
• Agent architecture
• Agent learns control/action selection
• Adapts to evolving environment
• Network gamification
Knowledge Human Decision
Intent
Language
Automatic Decision
Machine
Learning
SDN
Controller
Forwarding
Elements
Analytics
Platform
Reward
Observation
Environment
Action
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 18
Reinforcement Learning Example
Reinforcement Learning Setup Reinforcement Learning Example
• Rules of the game are unknown
• No supervisor, only a reward signal
• Feedback is delayed
• Agent’s actions affect the subsequent data
it receives
Agent State
Observation
Reward
Action
Environmental State
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 19
Drilling Down Just a Bit
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 20
Why Is AlphaGo Important/Relevant?
• Security: Agent can learn dynamic/evolving behavior of adversary
• DevOPs: Agent can learn workflow automation
(e.g., Openstack Mistral/StackStorm)
• NFV: Agent can learn dynamic behavior of VNFs
• General: Deep learning can capture human intuition
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 21
Brocade’s Approach to Machine Learning
Bringing rigor to ML for Networking
Clustering
• Categorical and continuous (e.g., LDA, K-means, …)
• Anomaly detection
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 22
Brocade’s Approach to Machine Learning
Bringing rigor to ML for Networking
Clustering
• Categorical and continuous (e.g., LDA, K-means, …)
• Anomaly detection
Deep Neural Networks
• Understand sequences such as network flows
• Capture expert intuition
• Recurrent/memory nets (LSTMs, NTMs, ...)
• Time series/long range dependencies
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 23
Brocade’s Approach to Machine Learning
Bringing rigor to ML for Networking
Clustering
• Categorical and continuous (e.g., LDA, K-means, …)
• Anomaly detection
Deep Neural Networks
• Understand sequences such as network flows
• Capture expert intuition
• Recurrent/memory nets (LSTMs, NTMs, ...)
• Time series/long range dependencies
Reinforcement Learning
• Give Machine Learning agency
– Learn feedback control of actions
• Non-stationary distributions
• Deep neural networks (value/policy networks)
• Understand/react in adversarial environments
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 24
Brocade’s Approach to Machine Learning
Bringing rigor to ML for Networking
Clustering
• Categorical and continuous (e.g., LDA, K-means, …)
• Anomaly detection
Deep Neural Networks
• Understand sequences such as network flows
• Capture expert intuition
• Recurrent/memory nets (LSTMs, NTMs, ...)
• Time series/long range dependencies
Reinforcement Learning
• Give Machine Learning agency
– Learn feedback control of actions
• Non-stationary distributions
• Deep neural networks (value/policy networks)
• Understand/react in adversarial environments
Standardized (and public) data sets
• Required to evaluate techniques
• Move the field forward
– e.g. MNIST , ImageNet, …
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 25
Agenda
• What Is Machine Learning?
• What Is All the Machine Learning Excitement About?
• Brocade’s Approach to Machine Learning
• Overview of Our Demo: Open Network Insight
• Technical Explanations/Code
– http://www.1-4-5.net/~dmm/ml
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 26
Brocade Machine Learning Partnerships
Intel Security/Cloudera
• Open Network Insight
– http://open-network-insight.org/
– https://github.com/Open-Network-Insight
• Anomaly Detection for Network Data
• Goal: Leverage flow and other packet data to help enterprises
and service providers gain insight into events in their compute
environments and identify potential security threats
– In particular, DNS PCAP and netflow data
• Uses Topic Modeling is used to cluster categorical data
– A low probability flow in a cluster (topic) is an anomaly
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 27
BTW, What Exactly Is Anomaly Detection?
• It is clear that one of the major challenges we face as a civilization is dealing
with deluge of data that are being collected from our networks
– While at the same time we are “knowledge starved”
– Can’t find the needles in an exponentially growing haystack
– Anomaly Detection is one piece of the puzzle
– Machine Learning is a fundamental part of the answer
• Key Assumption for Anomaly Detection
– Anomalous events occur relatively infrequently (alternatively: most events normal)
– Second order assumption: Common events follow a Gaussian distribution
(likely to be wrong)
• What is obvious: When anomalous events do occur, their consequences can be
quite serious and often have substantial negative impact on our businesses,
security, …
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 28
Open Network Insight Components
Anomaly detection for network data
http://open-network-insight.org/
Network
Flows
(nfcapd)
DNS
(pcap)
Parallel
Ingest
Framework
Machine
Learning
Operational
Analytics
• Sensors feed ONI
• Filters billions
to thousands
• Baseline not
required
• Unsupervised, no
rules required
• Open Source
Decoders
• Creates CSV &
compressed data
in HDFS
• Returns small number
of credible threats from
machine learning
• Visualization, Noise
Filter, Attack Heuristics
Open Network Insight uses machine learning as a filter to detect
anomalies and to characterize the unique behavior of network traffic
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 29
Brocade Data Fabric and Open
Network Insight
Demo deployment
GRAPHIC COURTESY VARMA BHUPATIRAJU
Data Fabric
ONI Ingest
Data Fabric
Consumer
ONI ML
ONI OA
Cloudera Enterprise Data Hub (EDH)
Kafka
Brocade Data Fabric and Open Network Insight Deployment
Network
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 30
Don’t Miss Our Demo
Brocade Data Fabric Enabling Real Time
Data Ingestion by Open Network Insight
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 31
© 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Thank you

More Related Content

PPTX
Analytical Driven Security - Chip Copper
PPTX
DevOps Evolutions - Mike Bushong
PPTX
Brocade Executive Leadership Presentation - Lloyd Carney
PPTX
The Data Center of the Future: The New IP - Phil O'Reilly
PPTX
The Evolving Role of the Network Engineer - Jon Hudson
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PPTX
Cisco Security DNA
PDF
What is SASE
Analytical Driven Security - Chip Copper
DevOps Evolutions - Mike Bushong
Brocade Executive Leadership Presentation - Lloyd Carney
The Data Center of the Future: The New IP - Phil O'Reilly
The Evolving Role of the Network Engineer - Jon Hudson
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Cisco Security DNA
What is SASE

What's hot (20)

PPTX
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
PDF
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
PDF
Clues for Solving Cloud-Based App Performance
PPTX
Accelerate your digital transformation
PDF
(SACON) Vandana Verma - Living In A World of Zero Trust
PPT
Palo Alto Networks Soc Ent Okt2009
PDF
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
PDF
Cisco Meraki Overview
PPTX
Moving from appliances to cloud security with phoenix children's hospital
PPTX
Migration to microsoft_azure_with_zscaler
PPSX
Zero-Trust SASE DevSecOps
PDF
How secure are chat and webconf tools
PPTX
Top 5 predictions webinar
PPTX
Zscaler mondi webinar
PDF
Introduction to Cloud Security
PDF
Debunking the Myths of SSL VPN Security
PPTX
O365 quick with fast user experience
PPTX
NEXTGEN Cyber Security 2021
PPTX
State of the Internet: Mirai, IOT and History of Botnets
PPTX
Ma story then_now_webcast_10_17_18
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Clues for Solving Cloud-Based App Performance
Accelerate your digital transformation
(SACON) Vandana Verma - Living In A World of Zero Trust
Palo Alto Networks Soc Ent Okt2009
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
Cisco Meraki Overview
Moving from appliances to cloud security with phoenix children's hospital
Migration to microsoft_azure_with_zscaler
Zero-Trust SASE DevSecOps
How secure are chat and webconf tools
Top 5 predictions webinar
Zscaler mondi webinar
Introduction to Cloud Security
Debunking the Myths of SSL VPN Security
O365 quick with fast user experience
NEXTGEN Cyber Security 2021
State of the Internet: Mirai, IOT and History of Botnets
Ma story then_now_webcast_10_17_18
Ad

Similar to Combining Man & Machine: A Glimpse into the Future - David Meyer (20)

PPTX
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
PPTX
Machine learning
PPTX
machine learning introduction notes foRr
PPTX
Lab 7.pptx
PDF
Principles of Artificial Intelligence & Machine Learning
PDF
Machine Learning: Need of Machine Learning, Its Challenges and its Applications
PPTX
network layer service models forwarding versus routing how a router works rou...
PPTX
SEMINAR 1 gift college bbrs one tiVB.pptx
PPTX
SEMINAR 1 VB.pptxgyvycvhvhvyvyvyyhhyvyfvv
PDF
Machine Learning Basic in Computer Science.pdf
DOCX
machine learning.docx
PPTX
Machine learning applications nurturing growth of various business domains
PPTX
Introduction to Machine Learning.pptx
PPT
ML-Topic1A.ppteeweqeqeqeqeqeqwewqqwwqeeqeqw
PPT
Machine Learning basics with simple .ppt
PPTX
AI hype or reality
PPTX
Machine learning
PPTX
Introduction_to_MAchine_Learning_Advance.pptx
PPTX
It's Machine Learning Basics -- For You!
PDF
Machine learning
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
Machine learning
machine learning introduction notes foRr
Lab 7.pptx
Principles of Artificial Intelligence & Machine Learning
Machine Learning: Need of Machine Learning, Its Challenges and its Applications
network layer service models forwarding versus routing how a router works rou...
SEMINAR 1 gift college bbrs one tiVB.pptx
SEMINAR 1 VB.pptxgyvycvhvhvyvyvyyhhyvyfvv
Machine Learning Basic in Computer Science.pdf
machine learning.docx
Machine learning applications nurturing growth of various business domains
Introduction to Machine Learning.pptx
ML-Topic1A.ppteeweqeqeqeqeqeqwewqqwwqeeqeqw
Machine Learning basics with simple .ppt
AI hype or reality
Machine learning
Introduction_to_MAchine_Learning_Advance.pptx
It's Machine Learning Basics -- For You!
Machine learning
Ad

More from scoopnewsgroup (20)

PDF
2020: What's on Deck for the PMA
PDF
Modernization Requires Choice
PDF
Smarter Access is the Bridge to Security Modernization
PDF
How Zero Trust Makes the Mission Simple & Secure
PDF
Building a Zero Trust Architecture
PDF
History of Data-Centric Transformation
PDF
IC Fireside Chat
PDF
The Edge to AI
PDF
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PDF
Moving Beyond Zero Trust
PDF
Keeping the Workforce of the Future Empowered, Engaged & Happy
PDF
Opening Remarks
PDF
It All Starts with Linux
PDF
Leadership in the Digital Age
PDF
Digital Transformation for Government
PDF
DevSecOps: The DoD Software Factory
PDF
Enhancing your Cyber Skills through a Cyber Range
PDF
Lessons Learned from Fire Escapes for Cybersecurity
PDF
2019 FedScoop Public Sector innovation Summit
2020: What's on Deck for the PMA
Modernization Requires Choice
Smarter Access is the Bridge to Security Modernization
How Zero Trust Makes the Mission Simple & Secure
Building a Zero Trust Architecture
History of Data-Centric Transformation
IC Fireside Chat
The Edge to AI
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Moving Beyond Zero Trust
Keeping the Workforce of the Future Empowered, Engaged & Happy
Opening Remarks
It All Starts with Linux
Leadership in the Digital Age
Digital Transformation for Government
DevSecOps: The DoD Software Factory
Enhancing your Cyber Skills through a Cyber Range
Lessons Learned from Fire Escapes for Cybersecurity
2019 FedScoop Public Sector innovation Summit

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Combining Man & Machine: A Glimpse into the Future - David Meyer

  • 1. © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 2016 FEDERALFORUM Presented by Produced by Intelligent Networking in the Modern Age: Brocade’s Approach to Machine Learning for Networking
  • 2. © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION You might be surprised but what is going to drive innovation in the enterprise and in the public cloud is machine learning.
  • 3. Agenda • What Is Machine Learning? • What Is All the Machine Learning Excitement About? • Brocade’s Approach to Machine Learning • Overview of Our Demo: Open Network Insight • Technical Explanations/Code – http://www.1-4-5.net/~dmm/ml © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 3
  • 4. First, What Is Machine Learning? • Said another way, we want to discover the Data Generating Distribution that underlies the data we observe. This is the function that we want to learn. • Moreover, we care about primarily about the generalization accuracy of our model (function) – Accuracy on examples we have not yet seen -- How can this be? – As opposed the accuracy on the training set (note: overfitting) The complexity in traditional computer programming is in the code (programs that people write). In machine learning, learning algorithms are in principle simple and the complexity (structure) is in the data. Is there a way that we can automatically learn that structure? That is what is at the heart of machine learning. Andrew Ng © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 4
  • 5. Data Program Output Traditional Programming Same Thing Said in Cartoon Form Computer Data Output Machine Learning Computer © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 5
  • 6. Ok, We Know That Machines Are Getting Smarter, But Where Does Knowledge Come From? EXPERIENCEEVOLUTION CULTURE MACHINES Many orders of magnitude faster and larger So how can machines discover new knowledge? © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 6
  • 7. How Machines Can Discover New Knowledge? These correspond to the 5 major schools of thought in machine learning Systematically reduce uncertainty. • Bayesians • Technology: Bayesian Inference Fill the gaps in existing knowledge. • Symbolists • Technology: Induction/Inverse Deduction Emulate the brain. • Connectionists • Technology: Deep Neural Nets Emulate evolution. • Evolutionaries • Technology: Genetic Algorithms Notice similarities between old and new. • Analogizers • Technology: Kernel Machines/Support Vector Machines © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 7
  • 8. Agenda • What Is Machine Learning? • What Is All the Machine Learning Excitement About? • Brocade’s Approach to Machine Learning • Overview of Our Demo: Open Network Insight • Technical Explanations/Code – http://www.1-4-5.net/~dmm/ml © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 8
  • 9. What Is All the ML Excitement About? ML applications you interact with everyday Why this is relevant: Compute, Storage, Networking, Security, and Energy (CSNSE) use cases will all use this technology © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 9
  • 10. BTW, Think Object Recognition Is Impressive? © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 10
  • 11. Lip Reading? © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 11
  • 12. Real-Time Language Translation © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 12
  • 13. One More © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 13
  • 14. So What Kinds of Network Use Cases Are We Working On? • Security/Anomaly Detection • NFV orchestration and optimization • New automation tools for DevOps • Predicting and remediating problems in the mobile network • Network control plane optimization • Capture operator/analyst intuition • ... © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 14
  • 15. Example: Using Flow Data for Anomaly Detection Linear Decision Boundary Generalization Graph Radial Nested Block State Model with Edge Bundling General Anomaly Detection Setting DNS Tunneling © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 15
  • 16. Agenda • What Is Machine Learning? • What Is All the Machine Learning Excitement About? • Brocade’s Approach to Machine Learning • Overview of Our Demo: Open Network Insight • Technical Explanations/Code – http://www.1-4-5.net/~dmm/ml © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 16
  • 17. Pushing the Boundaries: Brocade’s Approach Bringing deep reinforcement learning to networking Reinforcement learning meets Deep Learning and Monte Carlo Tree Search © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 17
  • 18. Static Architecture vs. Reinforcement Architecture • ML doesn’t have “agency” • Hard-coded or open loop control • Doesn’t learn control • Assumes static underlying distribution Static ML Architecture Reinforcement Learning Architecture • Agent architecture • Agent learns control/action selection • Adapts to evolving environment • Network gamification Knowledge Human Decision Intent Language Automatic Decision Machine Learning SDN Controller Forwarding Elements Analytics Platform Reward Observation Environment Action © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 18
  • 19. Reinforcement Learning Example Reinforcement Learning Setup Reinforcement Learning Example • Rules of the game are unknown • No supervisor, only a reward signal • Feedback is delayed • Agent’s actions affect the subsequent data it receives Agent State Observation Reward Action Environmental State © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 19
  • 20. Drilling Down Just a Bit © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 20
  • 21. Why Is AlphaGo Important/Relevant? • Security: Agent can learn dynamic/evolving behavior of adversary • DevOPs: Agent can learn workflow automation (e.g., Openstack Mistral/StackStorm) • NFV: Agent can learn dynamic behavior of VNFs • General: Deep learning can capture human intuition © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 21
  • 22. Brocade’s Approach to Machine Learning Bringing rigor to ML for Networking Clustering • Categorical and continuous (e.g., LDA, K-means, …) • Anomaly detection © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 22
  • 23. Brocade’s Approach to Machine Learning Bringing rigor to ML for Networking Clustering • Categorical and continuous (e.g., LDA, K-means, …) • Anomaly detection Deep Neural Networks • Understand sequences such as network flows • Capture expert intuition • Recurrent/memory nets (LSTMs, NTMs, ...) • Time series/long range dependencies © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 23
  • 24. Brocade’s Approach to Machine Learning Bringing rigor to ML for Networking Clustering • Categorical and continuous (e.g., LDA, K-means, …) • Anomaly detection Deep Neural Networks • Understand sequences such as network flows • Capture expert intuition • Recurrent/memory nets (LSTMs, NTMs, ...) • Time series/long range dependencies Reinforcement Learning • Give Machine Learning agency – Learn feedback control of actions • Non-stationary distributions • Deep neural networks (value/policy networks) • Understand/react in adversarial environments © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 24
  • 25. Brocade’s Approach to Machine Learning Bringing rigor to ML for Networking Clustering • Categorical and continuous (e.g., LDA, K-means, …) • Anomaly detection Deep Neural Networks • Understand sequences such as network flows • Capture expert intuition • Recurrent/memory nets (LSTMs, NTMs, ...) • Time series/long range dependencies Reinforcement Learning • Give Machine Learning agency – Learn feedback control of actions • Non-stationary distributions • Deep neural networks (value/policy networks) • Understand/react in adversarial environments Standardized (and public) data sets • Required to evaluate techniques • Move the field forward – e.g. MNIST , ImageNet, … © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 25
  • 26. Agenda • What Is Machine Learning? • What Is All the Machine Learning Excitement About? • Brocade’s Approach to Machine Learning • Overview of Our Demo: Open Network Insight • Technical Explanations/Code – http://www.1-4-5.net/~dmm/ml © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 26
  • 27. Brocade Machine Learning Partnerships Intel Security/Cloudera • Open Network Insight – http://open-network-insight.org/ – https://github.com/Open-Network-Insight • Anomaly Detection for Network Data • Goal: Leverage flow and other packet data to help enterprises and service providers gain insight into events in their compute environments and identify potential security threats – In particular, DNS PCAP and netflow data • Uses Topic Modeling is used to cluster categorical data – A low probability flow in a cluster (topic) is an anomaly © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 27
  • 28. BTW, What Exactly Is Anomaly Detection? • It is clear that one of the major challenges we face as a civilization is dealing with deluge of data that are being collected from our networks – While at the same time we are “knowledge starved” – Can’t find the needles in an exponentially growing haystack – Anomaly Detection is one piece of the puzzle – Machine Learning is a fundamental part of the answer • Key Assumption for Anomaly Detection – Anomalous events occur relatively infrequently (alternatively: most events normal) – Second order assumption: Common events follow a Gaussian distribution (likely to be wrong) • What is obvious: When anomalous events do occur, their consequences can be quite serious and often have substantial negative impact on our businesses, security, … © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 28
  • 29. Open Network Insight Components Anomaly detection for network data http://open-network-insight.org/ Network Flows (nfcapd) DNS (pcap) Parallel Ingest Framework Machine Learning Operational Analytics • Sensors feed ONI • Filters billions to thousands • Baseline not required • Unsupervised, no rules required • Open Source Decoders • Creates CSV & compressed data in HDFS • Returns small number of credible threats from machine learning • Visualization, Noise Filter, Attack Heuristics Open Network Insight uses machine learning as a filter to detect anomalies and to characterize the unique behavior of network traffic © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 29
  • 30. Brocade Data Fabric and Open Network Insight Demo deployment GRAPHIC COURTESY VARMA BHUPATIRAJU Data Fabric ONI Ingest Data Fabric Consumer ONI ML ONI OA Cloudera Enterprise Data Hub (EDH) Kafka Brocade Data Fabric and Open Network Insight Deployment Network © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 30
  • 31. Don’t Miss Our Demo Brocade Data Fabric Enabling Real Time Data Ingestion by Open Network Insight © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 31
  • 32. © 2016 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Thank you