LEADER 05918nam 2200481 450 001 9910556874403321 005 20231110224410.0 010 $a3-030-98978-X 035 $a(MiAaPQ)EBC6935529 035 $a(Au-PeEL)EBL6935529 035 $a(CKB)21418286700041 035 $a(PPN)261518194 035 $a(EXLCZ)9921418286700041 100 $a20221106d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aMachine learning for networking $e4th international conference, MLN 2021, virtual event, December 1-3, 2021 : proceedings /$fedited by E?ric Renault, Selma Boumerdassi, Paul Mu?hlethaler 210 1$aCham, Switzerland :$cSpringer,$d[2022] 210 4$d©2022 215 $a1 online resource (171 pages) 225 1 $aLecture Notes in Computer Science ;$vv.13175 311 08$aPrint version: Renault, Éric Machine Learning for Networking Cham : Springer International Publishing AG,c2022 9783030989774 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents -- Evaluation of Machine Learning Methods for Image Classification: A Case Study of Facility Surface Damage -- 1 Introduction -- 2 Research Methodology -- 2.1 Maximum Likelihood -- 2.2 Random Forest -- 2.3 Evaluation Index of Classification Model -- 3 Analytical Results -- 4 Conclusion -- References -- One-Dimensional Convolutional Neural Network for Detection and Mitigation of DDoS Attacks in SDN -- 1 Introduction -- 2 Related Work -- 3 One Dimensional Convolutional Neural Network (1D-CNN) -- 4 Proposed Approach -- 4.1 CICDDoS2019 Dataset -- 4.2 Dataset Manipulation -- 4.3 Proposed 1D-CNN Architecture -- 5 Evaluation and Analysis -- 5.1 1D-CNN Evaluation Criteria -- 5.2 Effectiveness for Applying 1D-CNN in SDN -- 6 Conclusion -- References -- Multi-Armed Bandit-Based Channel Hopping: Implementation on Embedded Devices -- 1 Introduction -- 2 Background -- 3 Further MAB Algorithms -- 4 SW-UCB and D-UCB Under Constraints -- 4.1 Relevant Fixed-Point Arithmetic -- 4.2 Implementation Shortcuts -- 4.3 Integration into IEEE 802.15.4 CSL -- 5 Evaluation -- 5.1 Monte Carlo Simulations -- 5.2 Real-World Packet Delivery Ratios -- 5.3 Overhead on CC2538 SoCs -- 6 Conclusions and Future Work -- References -- Cross Inference of Throughput Profiles Using Micro Kernel Network Method -- 1 Introduction -- 1.1 Profiles from Network Emulations -- 1.2 Contributions -- 2 TCP Throughput Profile -- 3 mKN-ML Method -- 4 Testbed and Emulation Measurements -- 4.1 Testbed Measurements -- 4.2 Mininet mKN Measurements -- 4.3 Multi-site Federation: Mininet Emulation -- 5 Estimated Profiles -- 5.1 mKN Generic RTT Set: Concave Target Profiles -- 5.2 VFSIE Measurements: Concave Target Profiles -- 5.3 Exploratory Scenario Profiles -- 6 Generalization Equations -- 7 Conclusions -- References. 327 $aMachine Learning Models for Malicious Traffic Detection in IoT Networks /IoT-23 Dataset/ -- 1 Introduction -- 2 Review of the Related Works -- 2.1 Traditional Methods for Network Traffic Analysis -- 2.2 Approaches to Detecting IoT Malicious Traffic Using Machine Learning -- 3 IoT 23 Dataset -- 3.1 Description of IoT-23 Dataset -- 3.2 Data Engineering -- 4 Preprocessing -- 5 Models -- 5.1 Decision Tree Classifier -- 5.2 Logistic Regression -- 5.3 Random Forest Classifier -- 5.4 XGBoost Classifier -- 5.5 Artificial Neural Networks -- 6 Results -- 7 Discussion -- 8 Conclusion -- References -- Application and Mitigation of the Evasion Attack against a Deep Learning Based IDS for IoT -- 1 Introduction -- 2 Related Work -- 2.1 Deep Learning IDS -- 2.2 Evasion Attack -- 2.3 Adversarial Attack Defense -- 3 Proposed Evasion Attack Strategy -- 3.1 Oracle Evasion Attack -- 3.2 Modified FGSM -- 4 Defense Strategy -- 4.1 Adversarial Example Training -- 4.2 Outlier Detection -- 5 Validation Results -- 6 Conclusions -- References -- DynamicDeepFlow: An Approach for Identifying Changes in Network Traffic Flow Using Unsupervised Clustering -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Building DynamicDeepFlow Neural Network -- 4.1 Input and Output Structures -- 4.2 Overall Architecture of DDF -- 4.3 Training Algorithm -- 5 Experimental Data and Implementation Details -- 5.1 Experimental Data -- 5.2 Experimental Setup -- 5.3 Implementation Details -- 6 Results -- 6.1 Anomalous Network Traffic Pattern Identification -- 6.2 Sensitivity to Number of Cluster -- 6.3 Visualization of VAE Features -- 7 Conclusion -- References -- Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events -- 1 Introduction -- 2 Related Work -- 3 AEN Graph Model Overview -- 4 Proposed Anomaly Detection Model -- 4.1 Measure of Anomalousness. 327 $a4.2 Features Model -- 5 Experimental Evaluation -- 5.1 Dataset -- 5.2 Performance Evaluation -- 6 Conclusion -- References -- Deep Reinforcement Learning for Cost-Effective Controller Placement in Software-Defined Multihop Wireless Networking -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 Experiments, Results and Analysis -- 5 Conclusion and Future Research -- References -- Distance Estimation Using LoRa and Neural Networks -- 1 Introduction -- 2 LoRa Technology -- 3 Related Work -- 4 Neural Network -- 5 Experimental Setup -- 6 Results and Analysis -- 7 Conclusion -- References -- Author Index. 410 0$aLecture Notes in Computer Science 606 $aMachine learning 615 0$aMachine learning. 676 $a004.6 702 $aBoumerdassi$b Selma 702 $aMu?hlethaler$b Paul 702 $aRenault$b Eric 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910556874403321 996 $aMachine learning for networking$91906176 997 $aUNINA