Goto

Collaborating Authors

 tcp stream


A Reinforcement Learning Approach to Optimize Available Network Bandwidth Utilization

Jamil, Hasibul, Rodrigues, Elvis, Goldverg, Jacob, Kosar, Tevfik

arXiv.org Artificial Intelligence

Efficient data transfers over high-speed, long-distance shared networks require proper utilization of available network bandwidth. Using parallel TCP streams enables an application to utilize network parallelism and can improve transfer throughput; however, finding the optimum number of parallel TCP streams is challenging due to nondeterministic background traffic sharing the same network. Additionally, the non-stationary, multi-objectiveness, and partially-observable nature of network signals in the host systems add extra complexity in finding the current network condition. In this work, we present a novel approach to finding the optimum number of parallel TCP streams using deep reinforcement learning (RL). We devise a learning-based algorithm capable of generalizing different network conditions and utilizing the available network bandwidth intelligently. Contrary to rule-based heuristics that do not generalize well in unknown network scenarios, our RL-based solution can dynamically discover and adapt the parallel TCP stream numbers to maximize the network bandwidth utilization without congesting the network and ensure fairness among contending transfers. We extensively evaluated our RL-based algorithm's performance, comparing it with several state-of-the-art online optimization algorithms. The results show that our RL-based algorithm can find near-optimal solutions 40% faster while achieving up to 15% higher throughput. We also show that, unlike a greedy algorithm, our devised RL-based algorithm can avoid network congestion and fairly share the available network resources among contending transfers.


Intelligent Deception and #CyberSecurity @CloudExpo #AI #ML #DL #Analytics

#artificialintelligence

The pace of attacks shows no sign of slowing, and organizations understand that 100 percent prevention of attacks is not possible. Traditional prevention and detection techniques are falling short, and security professionals are scrambling for new paradigms that can more effectively detect attacks and mitigate the growing levels of damage. In this climate of confusion, deception-based solutions offer a viable and proven way to stop attackers in their tracks. Because instead of sitting back and waiting to be the victim, detection technologies let organizations be proactive and take the attack to the attacker. We've compiled a list of top five reasons why more security teams are opting for deception: Yet next-generation firewalls, DLPs and antivirus solutions all rely on signatures and reputation to accomplish (or not accomplish) their task.