Scheduling a network attack to train a machine learning model
First Claim
Patent Images
1. A method, comprising:
- evaluating, by a device, a set of training data for a machine learning model to identify a missing feature subset in a feature space of the set of training data;
identifying, by the device, a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset at the machine learning model;
selecting, by the device from among the plurality of network nodes, one or more attack nodes based on the identified missing feature subset and on a traffic matrix associated with the plurality of network nodes, wherin the selected one or more attack nodes are based at least in part on a score of the identified missing feature subset, and the score is a value inversely proportional to a density of observations at a given point;
in response to selecting the one or more attack nodes, generating, by the device an attack routine to be sent to the selected one or more attack nodes that will generate the missing feature subset in the feature space of the set of training data;
in response to identifying the missing feature subset and selecting the one or more attack nodes that will cause the learning machine to generate the missing feature subset, transmitting, by the device, the attack routing to the one or more attack nodes;
instructing, by the device, the one or more attack nodes initiate the attack and generate the missing feature subset in the feature space of the set of training data upon receiving the attack routine; and
receiving, at the device from the one or more attack nodes, an indication that the attack has completed.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a device evaluates a set of training data for a machine learning model to identify a missing feature subset in a feature space of the set of training data. The device identifies a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset. One or more attack nodes are selected from among the plurality of network nodes. An attack routine is provided to the one or more attack nodes to cause the one or more attack nodes to initiate the attack. An indication that the attack has completed is then received from the one or more attack nodes.
-
Citations
20 Claims
-
1. A method, comprising:
-
evaluating, by a device, a set of training data for a machine learning model to identify a missing feature subset in a feature space of the set of training data; identifying, by the device, a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset at the machine learning model; selecting, by the device from among the plurality of network nodes, one or more attack nodes based on the identified missing feature subset and on a traffic matrix associated with the plurality of network nodes, wherin the selected one or more attack nodes are based at least in part on a score of the identified missing feature subset, and the score is a value inversely proportional to a density of observations at a given point; in response to selecting the one or more attack nodes, generating, by the device an attack routine to be sent to the selected one or more attack nodes that will generate the missing feature subset in the feature space of the set of training data; in response to identifying the missing feature subset and selecting the one or more attack nodes that will cause the learning machine to generate the missing feature subset, transmitting, by the device, the attack routing to the one or more attack nodes; instructing, by the device, the one or more attack nodes initiate the attack and generate the missing feature subset in the feature space of the set of training data upon receiving the attack routine; and receiving, at the device from the one or more attack nodes, an indication that the attack has completed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus, comprising:
-
one or more network interfaces to communicate in a computer network; a processor coupled to the network interfaces and configured to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to; evaluate a set of training data for a machine learning model to identify a missing a feature subset in a feature space of the set of training data; identify a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset; select, from among the plurality of network nodes, one or more attack nodes based on the identified missing feature subset and on a traffic matrix associated with the plurality of network nodes, wherein the selected one or more attack nodes are based at least in part on a score of the identified missing feature subset, and the score is a value inversely proportional to a density of observations at a given point; in response to selecting the one or more attack nodes, generate an attack routine to be sent to the selected one or more attack nodes that will generate the missing feature subset in the feature space of the set of training data; in response to identification of the missing feature subset and selection of the one or more attack nodes that will cause the learning machine to generate the missing feature subset, transmit the attack routing to the one or more attack nodes; instruct the one or more attack nodes to initiate the attack and generate the missing feature subset in the feature space of the set of training data upon receiving the attack routine from the apparatus; and receive, from the one or more attack nodes, an indication that the attack has completed. - View Dependent Claims (17, 18, 19)
-
-
20. A tangible, non-transitory, computer-readable media having software encoded thereon, the software when executed by a processor operable to:
-
evaluate a set of training data for a machine learning model to identify a missing feature subset in a feature space of the set of training data; identify a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset; select, from among the plurality of network nodes, one or more attack nodes based on the identified missing feature subset and on a traffic matrix associated with the plurality of network nodes, wherein the selected one or more attack nodes are based at least in part on a score of the identified missing feature subset, and the score is a value inversely proportional to a density of observations at a given point; in response to selecting the one or more attack nodes, generate an attack routine to be sent to the selected one or more attack nodes that will generate the missing feature subset in the feature space of the set of training data; in response to identification of the missing feature subset and selection of the one or more attack nodes that will cause the learning machine to generate the missing feature subset in the feature space of the set of training data; in response to identification of the missing feature subset and selection of the one or more attack nodes that will cause the learning machine to generate the missing feature subset, transmit the attack routine to the one or more attack nodes; instruct the one or more attack nodes to initiate the attack and generate the missing feature subset in the feature space of the set of training data upon receiving the attack routine; and receive, from the one or more attack nodes, and indication that the attack has completed.
-
Specification