Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One

Machine learning techniques are finding many applications in computer systems, including many tasks that require decision making: network optimization, quality of service assurance, and security. We believe machine learning systems are here to stay, and to materialize on their potential we advocate a fresh look at various key issues that need further attention, including security as a requirement and system complexity, and how machine learning systems affect them. We also discuss reproducibility as a key requirement for sustainable machine learning systems, and leads to pursuing it.

[1]  Aziz Mohaisen,et al.  Crime Scene Reconstruction: Online Gold Farming Network Analysis , 2017, IEEE Transactions on Information Forensics and Security.

[2]  Wan Choi,et al.  ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[3]  Leonardo Babun,et al.  Verifying Internet of Things Safety and Security in Physical Spaces , 2019, IEEE Security & Privacy.

[4]  DIMITRIOS PIERRAKOS,et al.  User Modeling and User-Adapted Interaction , 1994, User Modeling and User-Adapted Interaction.

[5]  Geoffrey I. Webb,et al.  # 2001 Kluwer Academic Publishers. Printed in the Netherlands. Machine Learning for User Modeling , 1999 .

[6]  Patrick D. McDaniel,et al.  Adversarial Examples for Malware Detection , 2017, ESORICS.

[7]  Mehdi Bennis,et al.  Toward Low-Latency and Ultra-Reliable Virtual Reality , 2018, IEEE Network.

[8]  Matthew Lease,et al.  On Quality Control and Machine Learning in Crowdsourcing , 2011, Human Computation.

[9]  Murat Yuksel,et al.  Training network administrators in a game-like environment , 2015, J. Netw. Comput. Appl..

[10]  Atul Prakash,et al.  Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[11]  Aziz Mohaisen,et al.  Capturing DDoS Attack Dynamics Behind the Scenes , 2015, DIMVA.

[12]  Michael I. Jordan,et al.  Machine learning: Trends, perspectives, and prospects , 2015, Science.

[13]  Aziz Mohaisen,et al.  Android Malware Detection Using Complex-Flows , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[14]  Amit Kumar Sikder,et al.  A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices , 2019, IEEE Transactions on Mobile Computing.

[15]  Raheem A. Beyah,et al.  SOTA: Secure Over-the-Air Programming of IoT Devices , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).

[16]  David Slater,et al.  Malicious Behavior Detection using Windows Audit Logs , 2015, AISec@CCS.

[17]  Jiliang Zhang,et al.  ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples , 2018, 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS).

[18]  Joongheon Kim,et al.  Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT , 2019, Trans. Emerg. Telecommun. Technol..

[19]  Aziz Mohaisen,et al.  XLF: A Cross-layer Framework to Secure the Internet of Things (IoT) , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[20]  Aziz Mohaisen,et al.  An Adversary-Centric Behavior Modeling of DDoS Attacks , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[21]  Aziz Mohaisen,et al.  COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection , 2019, ArXiv.

[22]  Engin Ipek,et al.  Dynamic Multicore Resource Management: A Machine Learning Approach , 2009, IEEE Micro.

[23]  Aziz Mohaisen,et al.  Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach , 2019, IEEE Internet of Things Journal.

[24]  Dawn Song,et al.  Robust Physical-World Attacks on Deep Learning Models , 2017, 1707.08945.

[25]  Zheng Zhang,et al.  MXNet: A Flexible and Efficient Machine Learning Library for Heterogeneous Distributed Systems , 2015, ArXiv.

[26]  Murat Yuksel,et al.  Large-Scale Network Parameter Configuration Using an On-Line Simulation Framework , 2008, IEEE/ACM Transactions on Networking.

[27]  Aziz Mohaisen,et al.  A Survey on Deep Packet Inspection for Intrusion Detection Systems , 2008, ArXiv.

[28]  Yi Lu Murphey,et al.  Intelligent Vehicle Power Control Based on Machine Learning of Optimal Control Parameters and Prediction of Road Type and Traffic Congestion , 2009, IEEE Transactions on Vehicular Technology.

[29]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[30]  Aziz Mohaisen,et al.  Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks , 2019, 2019 IEEE Conference on Dependable and Secure Computing (DSC).

[31]  Aziz Mohaisen,et al.  Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).