SCHEDULING A NETWORK ATTACK TO TRAIN A MACHINE LEARNING MODEL
First Claim
Patent Images
1. A method, comprising:
- evaluating, by a device, a set of training data for a machine learning model to identify a missing feature subset in a feature space of the set of training data;
identifying, by the device, a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset;
selecting, from among the plurality of network nodes, one or more attack nodes;
providing an attack routine to the one or more attack nodes to cause the one or more attack nodes to initiate the attack; and
receiving, from the one or more attack nodes, an indication that the attack has completed.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a device evaluates a set of training data for a machine learning model to identify a missing feature subset in a feature space of the set of training data. The device identifies a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset. One or more attack nodes are selected from among the plurality of network nodes. An attack routine is provided to the one or more attack nodes to cause the one or more attack nodes to initiate the attack. An indication that the attack has completed is then received from the one or more attack nodes.
39 Citations
20 Claims
-
1. A method, comprising:
-
evaluating, by a device, a set of training data for a machine learning model to identify a missing feature subset in a feature space of the set of training data; identifying, by the device, a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset; selecting, from among the plurality of network nodes, one or more attack nodes; providing an attack routine to the one or more attack nodes to cause the one or more attack nodes to initiate the attack; and receiving, from the one or more attack nodes, an indication that the attack has completed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus, comprising:
-
one or more network interfaces to communicate in a computer network; a processor coupled to the network interfaces and configured to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to; evaluate a set of training data for a machine learning model to identify a missing feature subset in a feature space of the set of training data; identify a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset; select, from among the plurality of network nodes, one or more attack nodes; provide an attack routine to the one or more attack nodes to cause the one or more attack nodes to initiate the attack; and receive, from the one or more attack nodes, an indication that the attack has completed. - View Dependent Claims (17, 18, 19)
-
-
20. A tangible, non-transitory, computer-readable media having software encoded thereon, the software when executed by a processor operable to:
-
evaluate a set of training data for a machine learning model to identify a missing feature subset in a feature space of the set of training data; identify a plurality of network nodes eligible to initiate an attack on a network to generate the missing feature subset; select, from among the plurality of network nodes, one or more attack nodes; provide an attack routine to the one or more attack nodes to cause the one or more attack nodes to initiate the attack; and receive, from the one or more attack nodes, an indication that the attack has completed.
-
Specification