Otwarty dostęp

Application of Artificial Intelligence and Machine Learning in Software Defined Networks


Zacytuj

A. A. Gebremariam, M. Usman, P. Du, A. Nakao, and F. Granelli, “Towards E2E Slicing in 5G: A Spectrum Slicing Testbed and Its Extension to the Packet Core,” in 2017 IEEE Globecom Workshops (GC Wkshps), Dec 2017, pp. 1–6. Search in Google Scholar

T. T. Nguyen and G. Armitage, “A survey of techniques for internet traffic classification using machine learning,” IEEE Communications Surveys & Tutorials, vol. 10, no. 4, pp. 56–76, 2008. Search in Google Scholar

A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2016. Search in Google Scholar

R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” in Security and Privacy (SP), 2010 IEEE Symposium on. IEEE, 2010, pp. 305–316. Search in Google Scholar

A. Imran, A. Zoha, and A. Abu-Dayya, “Challenges in 5g: how to empower son with big data for enabling 5g,” IEEE network, vol. 28, no. 6, pp. 27–33, 2014. Search in Google Scholar

X. Guibao, M. Yubo, L. Jialiang, “INCLUSION OF ARTIFICIAL INTELLIGENCE IN COMMUNICATION NETWORKS AND SERVICES,” ITU Journal: ICT Discoveries, Special Issue, no. 1, pp. 1–6, Oct. 13 2017. Search in Google Scholar

T. Otani, H. Toube, T. Kimura, and M. Furutani, “APPLICATION OF AI TO MOBILE NETWORK OPERATION,” ITU Journal: ICT Discoveries, Special Issue, no. 1, pp. 1–7, Oct. 13 2017. Search in Google Scholar

J. Moysen, L. Giupponi, and J. Mangues-Bafalluy, “On the potential of ensemble regression techniques for future mobile network planning,” in Computers and Communication (ISCC), 2016 IEEE Symposium on. IEEE, 2016, pp. 477–483. Search in Google Scholar

M. Jessica and G. Lorenza and M.-B. Josep, “A machine learning enabled network planning tool,” in Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016 IEEE 27th Annual International Symposium on. IEEE, 2016, pp. 1–7. Search in Google Scholar

Julian A., Mathias S., Lia A. and Hans D. S., “An AI-driven Malfunction Detection Concept for NFV Instances in 5G,” CoRR, vol. abs/1804.05796, pp. 1–5, 2018. Search in Google Scholar

KDDI Research and Development Laboratories, Inc. (2016, Feb. 22) World’s first successful AI-assisted automated network operation system PoC towards 5G. [Online]. Available: http://www.kddi-research.jp/english/newsrelease/2016/022201.html Search in Google Scholar

S. Cherrared, S. Imadali, E. Fabre, and G. Go¨ssler, “LUMEN: A global fault management framework for network virtualization environments,” in 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN). IEEE, 2018. Search in Google Scholar

M. G. Pe´rez, G. M. Pe´rez, P. G. Giardina, G. Bernini, P. Neves, J. M. Alcaraz-Calero, Q. Wang, and K. Koutsopoulos, “Self-Organizing Capabilities in 5G Networks: NFV & SDN Coordination in a Complex Use Case,” 2018. Search in Google Scholar

A. Mestres, A. Rodriguez-Natal, J. Carner, P. Barlet-Ros, E. Alarco´n, M. Sole´, V. Munte´s-Mulero, D. Meyer, S. Barkai, M. J. Hibbett et al., “Knowledge-defined networking,” ACM SIGCOMM Computer Communication Review, vol. 47, no. 3, pp. 2–10, 2017. Search in Google Scholar

I. G. B. Yahia, J. Bendriss, A. Samba, and P. Dooze, “CogNitive 5G networks: Comprehensive operator use cases with machine learning for management operations,” in Innovations in Clouds, Internet and Networks (ICIN), 2017 20th Conference on. IEEE, 2017, pp. 252–259. Search in Google Scholar

Z. Zhao, E. Schiller, E. Kalogeiton, T. Braun, B. Stiller, M. T. Garip, J. Joy, M. Gerla, N. Akhtar, and I. Matta, “Autonomic Communications in Software-Driven Networks,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2431–2445, 2017. Search in Google Scholar

J. Moysen and L. Giupponi, “From 4G to 5G: Self-organized Network Management meets Machine Learning,” Computer Communications, 2018. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0140366418300380 Search in Google Scholar

A. Mestres Sugran˜es, “Knowledge-defined networking: a machine learning based approach for network and traffic modeling,” 2017. Search in Google Scholar

J. Vergara-Reyes, M. C. Martinez-Ordonez, A. Ordonez, and O. M. C. Rendon, “IP traffic classification in NFV: A benchmarking of supervised Machine Learning algorithms,” in Communications and Computing (COLCOM), 2017 IEEE Colombian Conference on. IEEE, 2017, pp. 1–6. Search in Google Scholar

L. He, C. Xu, and Y. Luo, “VTC: Machine learning based traffic classification as a virtual network function,” in Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. ACM, 2016, pp. 53–56. Search in Google Scholar

M. Zorzi, A. Zanella, A. Testolin, M. D. F. De Grazia, and M. Zorzi, “Cognition-based networks: A new perspective on network optimization using learning and distributed intelligence,” IEEE Access, vol. 3, pp. 1512–1530, 2015. Search in Google Scholar

J. Bendriss, I. G. B. Yahia, P. Chemouil, and D. Zeghlache, “AI for SLA management in programmable networks,” in DRCN 2017-Design of Reliable Communication Networks; 13th International Conference; Proceedings of. VDE, 2017, pp. 1–8. Search in Google Scholar

A. Chowdhary, S. Pisharody, A. Alshamrani, and D. Huang, “Dynamic game based security framework in sdn-enabled cloud networking environments,” in Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. ACM, 2017, pp. 53–58. Search in Google Scholar

M. V. De Assis, A. H. Hamamoto, T. Abrao, and M. L. Proenc¸a, “A game theoretical based system using holt-winters and genetic algorithm with fuzzy logic for DoS/DDoS mitigation on SDN networks,” IEEE Access, vol. 5, pp. 9485–9496, 2017. Search in Google Scholar

R. Colbaugh and K. Glass, “Predictability oriented defense against adaptive adversaries.” In Proceedings of IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, Korea, pp. 2721–2727, Oct. 14-17 2012. Search in Google Scholar

J. Pan and Z. Yang, “Cybersecurity Challenges and Opportunities in the New Edge Computing+ IoT World,” in Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. ACM, 2018, pp. 29–32. Search in Google Scholar

G. Gardikis, K. Tzoulas, K. Tripolitis, A. Bartzas, S. Costicoglou, A. Lioy, B. Gaston, C. Fernandez, C. Davila, A. Litke et al., “SHIELD: A novel NFV-based cybersecurity framework,” in Network Softwarization (NetSoft), 2017 IEEE Conference on. IEEE, 2017, pp. 1–6. Search in Google Scholar

(2018, Aug. 26). [Online]. Available: https://www.nsnam.org/ Search in Google Scholar

(2018, Aug. 26). [Online]. Available: http://www.openairinterface.org/ Search in Google Scholar

(2018, Aug. 26). [Online]. Available: http://mininet.org/ Search in Google Scholar