Random Fourier Approximation of the Kernel Function in Programmable Networks

被引:0
作者
Guo, Wei [1 ]
He, Yue [1 ]
Chen, Hexiong [1 ]
Hang, Feilu [1 ]
Zhang, Jun [2 ]
Shorman, Samer [3 ]
机构
[1] Yunnan Power Grid Co Ltd, Informat Ctr, Kunming 650000, Yunnan, Peoples R China
[2] Sichuan Wiscred Commun Co Ltd, Dept Tech Dev, Chengdu 610043, Peoples R China
[3] Appl Sci Univ, Coll Arts & Sci, Al Eker, Bahrain
关键词
random Fourier features; kernel function; programmable networks; SDN; P4; traffic forwarding policy making; DIFFERENTIAL-EQUATIONS; PERFORMANCE; SYSTEM; AREA;
D O I
10.2478/amns.2022.2.0172
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Random Fourier features represent one of the most influential and wide-spread techniques in machine learning to scale up kernel algorithms. As the methods based on random Fourier approximation of the kernel function can overcome the shortcomings of machine learning methods that require a large number of labeled sample, it is effective to be applied to the practical areas where samples are difficult to obtain. Network traffic forwarding policy making is one such practical application, and it is widely concerned in the programmable networks. With the advantages of kernel techniques and random Fourier features, this paper proposes an application of network traffic forwarding policy making method based on random Fourier approximation of kernel function in programmable networks to realize traffic forwarding policy making to improve the security of networks. The core of the method is to map traffic forwarding features to Hilbert high-dimensional space through random Fourier transfolin, and then uses the principle of maximum interval to detect adversarial samples. Compared with the traditional kernel function method, it improves the algorithm efficiency from square efficiency to linear efficiency. The AUC on the data set from real-world network reached 0.9984, showing that the method proposed can realize traffic forwarding policy making effectively to improve the security of programmable networks.
引用
收藏
页码:1831 / 1840
页数:9
相关论文
共 25 条
[1]   Solving Fredholm integro-differential equations using reproducing kernel Hilbert space method [J].
Abu Arqub, Omar ;
Al-Smadi, Mohammed ;
Shawagfeh, Nabil .
APPLIED MATHEMATICS AND COMPUTATION, 2013, 219 (17) :8938-8948
[2]   Machine learning for network application security: Empirical evaluation and optimization [J].
Aledhari, Mohammed ;
Razzak, Rehma ;
Parizi, Reza M. .
COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
[3]   THEORY OF REPRODUCING KERNELS [J].
ARONSZAJN, N .
TRANSACTIONS OF THE AMERICAN MATHEMATICAL SOCIETY, 1950, 68 (MAY) :337-404
[4]   The use of the area under the roc curve in the evaluation of machine learning algorithms [J].
Bradley, AP .
PATTERN RECOGNITION, 1997, 30 (07) :1145-1159
[5]   Major advancements in kernel function approximation [J].
Francis, Deena P. ;
Raimond, Kumudha .
ARTIFICIAL INTELLIGENCE REVIEW, 2021, 54 (02) :843-876
[6]   Measuring classifier performance: a coherent alternative to the area under the ROC curve [J].
Hand, David J. .
MACHINE LEARNING, 2009, 77 (01) :103-123
[7]   An Insight into Extreme Learning Machines: Random Neurons, Random Features and Kernels [J].
Huang, Guang-Bin .
COGNITIVE COMPUTATION, 2014, 6 (03) :376-390
[8]  
Karvonen T., 2021, MATH COMPUT
[9]   A network intrusion detection system based on a Hidden Naive Bayes multiclass classifier [J].
Koc, Levent ;
Mazzuchi, Thomas A. ;
Sarkani, Shahram .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (18) :13492-13500
[10]   Software-Defined Networking: A Comprehensive Survey [J].
Kreutz, Diego ;
Ramos, Fernando M. V. ;
Verissimo, Paulo Esteves ;
Rothenberg, Christian Esteve ;
Azodolmolky, Siamak ;
Uhlig, Steve .
PROCEEDINGS OF THE IEEE, 2015, 103 (01) :14-76