Artificial intelligence approaches to network management: recent advances and a survey

With increased number of new services and users being added to the communication network, management of such networks becomes crucial to provide assured quality of service. Finding skilled managers is often a problem. To alleviate this problem and also to provide assistance to the available network managers, network management has to be automated. Many attempts have been made in this direction and it is a promising area of interest to researchers in both academia and industry. In this paper, a review of the management complexities in present day networks and artificial intelligence approaches to network management are presented.

[1]  Subrahmanyam Dravida,et al.  Fast restoration of ATM networks , 1994, IEEE J. Sel. Areas Commun..

[2]  Atsushi Hiramatsu,et al.  ATM communications network control by neural networks , 1990, IEEE Trans. Neural Networks.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Faouzi Kamoun,et al.  Neural networks for shortest path computation and routing in computer networks , 1993, IEEE Trans. Neural Networks.

[5]  Josef Pieprzyk,et al.  Intrusion Detection: A Survey , 1996 .

[6]  C. D. Gelatt,et al.  Optimization by Simulated Annealing , 1983, Science.

[7]  M. Sloman Network and distributed systems management , 1994 .

[8]  Geoffrey E. Hinton,et al.  Learning internal representations by error propagation , 1986 .

[9]  J. Gechter,et al.  Conceptual issues for ATM , 1989, IEEE Network.

[10]  Tie Liao,et al.  Network management: interoperability and information model , 1991, Comput. Commun..

[11]  R. Saracco,et al.  Modeling the user interface , 1993, IEEE Communications Magazine.

[12]  B. Clifford Neuman,et al.  Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.

[13]  S.E. Minzer,et al.  Broadband ISDN and asynchronous transfer mode (ATM) , 1989, IEEE Communications Magazine.

[14]  Eugene H. Spafford,et al.  A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .

[15]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[16]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[17]  Simon S. Lam,et al.  Authentification for Distributed Systems , 1992, Computer.

[18]  Dinesh Pai,et al.  Omnipoint -The Implementation Version of Telecommunication Management Networks? , 1994, Proceedings of NOMS '94 - IEEE Network Operations and Management Symposium.

[19]  Yun Peng,et al.  Diagnostic problem‐solving with causal chaining , 1987, Int. J. Intell. Syst..

[20]  Prem G Kumar,et al.  Fault diagnosis of telecommunication networks: Realistic abductive reasoning approach , 1995 .

[21]  S. Hayes Analyzing network performance management , 1993, IEEE Communications Magazine.

[22]  Jeffrey D. Case,et al.  Simple Network Management Protocol (SNMP) , 1990, RFC.

[23]  Keith McCloghrie,et al.  Structure of Management Information for version 2 of the Simple Network Management Protocol (SNMPv2) , 1993, RFC.

[24]  Kris Struyve,et al.  End-to-end survivable broadband networks , 1995 .

[25]  Robert Metcalfe,et al.  Ethernet: distributed packet switching for local computer networks , 1976, CACM.

[26]  Deborah Estrin,et al.  Pricing in computer networks: motivation, formulation, and example , 1993, TNET.

[27]  Christos H. Papadimitriou,et al.  Local Search for the Asymmetric Traveling Salesman Problem , 1980, Oper. Res..

[28]  B. Clifford Neuman,et al.  Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.

[29]  Dean Allemang,et al.  The Computational Complexity of Abduction , 1991, Artif. Intell..

[30]  H. Prade,et al.  Relational Approach To Fault Diagnosis BasedOn A Functional Model , 1970 .

[31]  P. Venkataram,et al.  Network performance tuning using reinforcement learning , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).

[32]  R.N. Cronk,et al.  Rule-based expert systems for network management and operations: an introduction , 1988, IEEE Network.

[33]  Lillian N. Cassel,et al.  Network management architectures and protocols: problems and approaches , 1989, IEEE J. Sel. Areas Commun..

[34]  N. B. Seitz Performance standards for packet-switched services , 1989, IEEE International Conference on Communications, World Prosperity Through Communications,.

[35]  Dhadesugoor R. Vaman,et al.  Reconfiguration for Service and Self-Healing in ATM Networks Based on Virtual Paths , 1997, Comput. Networks ISDN Syst..

[36]  Sidnie Feit,et al.  TCP/IP: Architecture, Protocols, and Implementation , 1993 .

[37]  Ken-ichi Sato,et al.  Virtual path restoration techniques based on centralized control functions , 1995 .

[38]  Jeffery P. Hansen The use of multi-dimensional parametric behavior of a CSMA/CD network for network diagnosis , 1992 .

[39]  A. S. Sethi,et al.  Bibliography on network management , 1989, CCRV.

[40]  Pallapa Venkataram,et al.  Network performance management using realistic abductive reasoning model , 1995, Integrated Network Management.

[41]  Simon Znaty,et al.  Annotated bibliography on network management , 1994, CCRV.

[42]  J. Gruber Performance and fault management functions for the maintenance of SONET/SDH and ATM transport networks , 1993, Proceedings of ICC '93 - IEEE International Conference on Communications.

[43]  D. O'Mahony Security considerations in a network management environment , 1994, IEEE Network.

[44]  J. Reggia,et al.  Abductive Inference Models for Diagnostic Problem-Solving , 1990, Symbolic Computation.

[45]  Chia-Jiu Wang,et al.  The use of artificial neural networks for optimal message routing , 1995 .

[46]  James L. McClelland,et al.  Parallel distributed processing: explorations in the microstructure of cognition, vol. 1: foundations , 1986 .

[47]  S. Muftic,et al.  Security Architecture for Open Distributed Systems , 1993 .

[48]  V. Jagannathan,et al.  Blackboard Architectures and Applications , 1989 .

[49]  Ahmed Patel Security management for OSI networks , 1994, Comput. Commun..

[50]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[51]  H.E. Rauch,et al.  Neural networks for routing communication traffic , 1988, IEEE Control Systems Magazine.

[52]  V. Gullapalli,et al.  Acquiring robot skills via reinforcement learning , 1994, IEEE Control Systems.

[53]  Martin De Prycker Evolution from ISDN to BISDN: a logical step towards ATM , 1989, Comput. Commun..

[54]  Christopher S. Cooper High-speed networks: the emergence of technologies for multiservice support , 1991, Comput. Commun..

[55]  H. P Nii,et al.  Blackboard Systems , 1986 .

[56]  Yoshiaki Nemoto,et al.  An SNMP-based Expert Network Management System , 1991 .

[57]  Martin de Prycker,et al.  Asynchronous transfer mode (2nd ed.): solution for broadband ISDN , 1993 .

[58]  David B. Rose,et al.  SNA Network Management Directions , 1988, IBM Syst. J..

[59]  Richard A. Kemmerer,et al.  State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..

[60]  Frank Feather,et al.  Fault detection in an Ethernet network using anomaly signature matching , 1993, SIGCOMM 1993.

[61]  P Venkataram,et al.  Probabilistic Extension to Realistic Abductive Reasoning Model , 1996 .

[62]  Lawrence Bernstein,et al.  Expert systems in network management-the second revolution , 1988, IEEE J. Sel. Areas Commun..

[63]  Chris Sluman A Tutorial on OSI Management , 1989, Comput. Networks.

[64]  Jean-Yves Le Boudec,et al.  The Asynchronous Transfer Mode: A Tutorial , 1992, Comput. Networks ISDN Syst..

[65]  Jeffrey C. Mogul,et al.  Measured capacity of an Ethernet: myths and reality , 1988, CCRV.

[66]  Jeffrey K. MacKie-Mason,et al.  Some FAQs about Usage-Based Pricing , 1995, Comput. Networks ISDN Syst..

[67]  Lawrence J. Fogel,et al.  Artificial Intelligence through Simulated Evolution , 1966 .

[68]  G Prem Kumar Integrated Network Management Using Extended Blackboard Architecture , 1996 .

[69]  A. Bouloutas,et al.  Clustering schemes for network management , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.

[70]  Narsingh Deo,et al.  Graph Theory with Applications to Engineering and Computer Science , 1975, Networks.

[71]  Lotfi A. Zadeh,et al.  Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..

[72]  Mohammad S. Obaidat,et al.  A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[73]  Harry E. Pople,et al.  Session 6 Theorem Proving and Logic: I I ON THE MECHANIZATION OF ABDUCTIVE LOGIC , 2006 .

[74]  Derek McAuley,et al.  Experiences of building an ATM switch for the local area , 1994, SIGCOMM 1994.

[75]  Nirwan Ansari,et al.  Neural Networks in Telecommunications , 1994, Springer US.

[76]  Richard P. Lippmann,et al.  An introduction to computing with neural nets , 1987 .

[77]  A. A. Covo,et al.  AI-assisted telecommunications network management , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[78]  F W Simonds A MINERAL SURVEY IN TEXAS. , 1901, Science.

[79]  J.D. Day,et al.  The OSI reference model , 1983 .

[80]  P. Chemouil,et al.  Application of fuzzy control to adaptive traffic routing in telephone network , 1994 .

[81]  A. Rau-Chaplin,et al.  DAD: a real-time expert system for monitoring of data packet networks , 1988, IEEE Network.

[82]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[83]  Vijay Varadharajan,et al.  An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[84]  David B. Fogel,et al.  Evolving artificial intelligence , 1992 .

[85]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[86]  R.R. Voruganti A global network management framework for the '90s , 1994, IEEE Communications Magazine.

[87]  Carl E. Landwehr,et al.  On Access Checking in Capability-Based Systems , 1987, IEEE Trans. Software Eng..

[88]  Glenn Mansfield Keeni,et al.  X.500 Directory Monitoring MIB , 1994, RFC.

[89]  Robert Weihmayer,et al.  Cooperative distributed problem solving for communication network management , 1990, Comput. Commun..

[90]  Anthony S. Acampora Broadband ISDN and Asynchronous Transfer Mode , 1994 .

[91]  Jonathan L. Wang,et al.  Integrated methodology for supporting packet network performance management and planning , 1990, Comput. Commun..

[92]  D.S. Bauer,et al.  NIDX-an expert system for real-time network intrusion detection , 1988, [1988] Proceedings. Computer Networking Symposium.

[93]  Frank Edward Feather,et al.  Fault detection in an Ethernet network via anomaly detectors , 1992 .

[94]  Billy E. Gillett,et al.  Introduction to Operations Research: A Computer-Oriented Algorithmic Approach , 1976 .

[95]  James A. Reggia,et al.  A formal model of diagnostic inference. I. Problem formulation and decomposition , 1985, Inf. Sci..

[96]  J. Isberg Charging in cordless telecommunication systems , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.

[97]  H. T. Mouftah,et al.  Survey of ATM Switch Architectures , 1995, Comput. Networks ISDN Syst..

[98]  B Ravindran,et al.  A tutorial survey of reinforcement learning , 1994 .

[99]  A. Hiramatsu,et al.  Training techniques for neural network applications in ATM , 1995, IEEE Commun. Mag..

[100]  Marvin A. Sirbu,et al.  NetBill: an Internet commerce system optimized for network-delivered services , 1995, IEEE Wirel. Commun..

[101]  Bruce W. Irish,et al.  MAPCON: an expert system for configuration of MAP networks , 1988, IEEE J. Sel. Areas Commun..

[102]  G. Prem Kumar,et al.  Optimal Network Partitioning for Fault-Tolerant Network Management Using Evolutionary Programming , 1994, Inf. Process. Lett..

[103]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[104]  John S. Baras,et al.  MANDATE: MAnaging Networks Using DAtabase TEchnology , 1993, IEEE J. Sel. Areas Commun..

[105]  Salvatore J. Stolfo,et al.  ACE: An Expert System for Telephone Cable Maintenance , 1983, IJCAI.

[106]  Yung Bok Kim,et al.  Real-time packet network analysis for ISO/OSI performance management , 1990, [Proceedings] GLOBECOM '90: IEEE Global Telecommunications Conference and Exhibition.

[107]  Atsushi Hiramatsu ATM traffic Control Using Neural Networks , 1994 .

[108]  G. Prem Kumar,et al.  Network restoration using recurrent neural networks , 1998 .

[109]  Gene A. Tagliarini,et al.  Optimization Using Neural Networks , 1991, IEEE Trans. Computers.

[110]  W. D. Grover,et al.  The selfhealing network : A fast distributed restoration technique for networks using digital crossconnect machines , 1987 .

[111]  Jeffrey K. MacKie-Mason,et al.  Pricing Congestible Network Resources (Invited Paper) , 1995, IEEE J. Sel. Areas Commun..

[112]  Georg Trausmuth,et al.  Hierarchical Network Management: A Concept and Its Prototype in SNMPv2 , 1996, Comput. Networks ISDN Syst..

[113]  Amar Gupta,et al.  Principles of Expert Systems , 1988 .

[114]  L. F. Pau,et al.  Survey of expert systems for fault detection, test generation and maintenance , 1986 .

[115]  G. Prem Kumar,et al.  Security management architecture for access control to network resources , 1997 .

[116]  James Malcolm,et al.  IKBS in network management , 1990, Comput. Commun..

[117]  B. L. Hitson Knowledge-based monitoring and control: an approach to understanding behavior of TCP/IP network protocols , 1988, SIGCOMM 1988.

[118]  T.E. Marques A symptom-driven expert system for isolating and correcting network faults , 1988, IEEE Communications Magazine.

[119]  Didier Dubois,et al.  Possibilistic Abduction , 1992, IPMU.

[120]  Bassam Hussien,et al.  An application of fuzzy algorithms in a computer access security system , 1989, Pattern Recognit. Lett..

[121]  L. Raman CMISE functions and services , 1993, IEEE Communications Magazine.

[122]  Keith McCloghrie,et al.  Structure and identification of management information for TCP/IP-based internets , 1988, RFC.

[123]  C. V. Ramamoorthy,et al.  CLUSTERING TECHNIQUES FOR LARGE DISTRIBUTED SYSTEMS. , 1986 .

[124]  I. Tokizawa,et al.  Self-healing virtual path architecture in ATM networks , 1995 .

[125]  Lawrence. Davis,et al.  Handbook Of Genetic Algorithms , 1990 .

[126]  Georg Gottlob,et al.  The complexity of logic-based abduction , 1993, JACM.

[127]  Alexander Gersht,et al.  Real-Time Management of Telephone Operating Company Networks: Issues and Approaches , 1993, IEEE J. Sel. Areas Commun..

[128]  S.C.A. Thomopoulos,et al.  Neural network implementation of the shortest path algorithm for traffic routing in communication networks , 1989, International 1989 Joint Conference on Neural Networks.

[129]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[130]  Stephen A. Sherman,et al.  Secure network access using multiple applications of AT&T's smart card , 1994, AT&T Technical Journal.

[131]  Akira Hayashi,et al.  Study of fault‐location expert systems for paired cables , 1991 .

[132]  F. Halsall,et al.  Protocol analyser for the monitoring and analysis of OSI networks , 1990, Comput. Commun..