Proceedings of the 18th ACM Workshop on Hot Topics in Networks 2019
DOI: 10.1145/3365609.3365862
|View full text |Cite
|
Sign up to set email alerts
|

Robustifying Network Protocols with Adversarial Examples

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 17 publications
1
10
0
Order By: Relevance
“…(Our environment generator and a full list of parameters are documented in §A.2.) In recent papers, both trace-driven (e.g., [19,31]) and synthetic environments (e.g., [24,30]) are used to train RL-based network algorithms. We will explain in §4.2 how our technique applies to both types of environments.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…(Our environment generator and a full list of parameters are documented in §A.2.) In recent papers, both trace-driven (e.g., [19,31]) and synthetic environments (e.g., [24,30]) are used to train RL-based network algorithms. We will explain in §4.2 how our technique applies to both types of environments.…”
Section: Motivationmentioning
confidence: 99%
“…• First, they use innate properties of each environment (e.g., shorter network or workload traces [33] and smoother network conditions [19] are supposedly easier), but these innate properties fail to indicate whether the current RL model can be improved in an environment.…”
Section: Introductionmentioning
confidence: 99%
“…Our work builds on top of this work, and we perform an in-depth analysis of two different controllers. [10] focuses on robustness properties for Pensieve and proposes a new training procedure to enhance the robustness of the network controller. Finally, our work on finding decision boundaries is based on the reachability analysis work by [31] as we perform an enumeration of feasible RELU assignments.…”
Section: Related Workmentioning
confidence: 99%
“…However, a challenge in applying ML in networking applications is that a NN is like a black box: it takes an input and produces an output, but does not offer any insight into why that output was chosen over other possible choices. This causes a lack of assurances and trust about system behavior, which could respond in unexpected or incorrect ways [9], [34], and overall hinders the adoption of learning-based solutions.…”
Section: Introductionmentioning
confidence: 99%
“…Against these challenges, the need for fast, inexpensive, and realistic evaluation (using ML or statistical models [10,12]) of network protocols is only growing; more so with the emerging interest in using ML, including reinforcement learning, to learn or tune protocols [18,21,25,32,40].…”
Section: Related Workmentioning
confidence: 99%