Predicting Interface Failures For Better Traffic Management.

Slides:



Advertisements
Similar presentations
Stable Load Control with Load Prediction in Multipath Packet Forwarding IlKyu Park, Youngseok Lee, and Yanghee Choi Proc. 15 th IEEE Int l conf. on Information.
Advertisements

EIGRP Explanation & Configuration By Bill Reed. We Will Examine the features of EIGRP Discuss why EIGRP is known as a Hybrid Routing Protocol Identify.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—2-1 Implementing an EIGRP-Based Solution Advanced EIGRP Features in an Enterprise Network.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBSCI Configuring EIGRP BSCI Module 2-5 – Configuring EIGRP in an Enterprise Network.
Module 20 Troubleshooting Common SQL Server 2008 R2 Administrative Issues.
EIGRP routing protocol Omer ben-shalom Omer Ben-Shalom: Must show how EIGRP is dealing with count to infinity problem Omer Ben-Shalom: Must.
Vikramaditya Jakkula Washington State University First International Workshop on Smart Homes for Tele-Health.
Network Automation Albert Greenberg, Nick Feamster, Richard Mortier, Mark Poepping, Lun Li, Sharad Agarwal, Changhoon Kim, Ramveer Chandra, et al.
RD-CSY /09 Distance Vector Routing Protocols.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Ns Simulation Final presentation Stella Pantofel Igor Berman Michael Halperin
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Lab 3-2 Debrief.
What is machine learning? 1. A very trivial machine learning tool K-Nearest-Neighbors (KNN) The predicted class of the query sample depends on the voting.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—5-1 Implementing a Highly Available Network Understanding High Availability.
Anomaly detection Problem motivation Machine Learning.
Link State Routing Protocol W.lilakiatsakun. Introduction (1) Link-state routing protocols are also known as shortest path first protocols and built around.
Routing and Routing Protocols Dynamic Routing Overview.
LAN Switching and WAN Networks Topic 6 - OSPF. What we have done so far! 18/09/2015Richard Hancock2  Looked at the basic switching concepts and configuration.
Chapter 6 – Connectivity Devices
Hospitalization Prediction From Health Care Claims Adithya Renduchintala, Benjamin Martin, & Lance Legel University of Colorado Boulder  Data Mining 
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 3 EIGRP.
Distance Vector Routing Protocols Routing Protocols and Concepts Lecture Week 4.
Chapter 5: Implementing Intrusion Prevention
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Analysis of QoS Arjuna Mithra Sreenivasan. Objectives Explain the different queuing techniques. Describe factors affecting network voice quality. Analyse.
Distance Vector Routing Protocols Dynamic Routing.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 3 EIGRP.
Copyright 2003 CCNA 3 Chapter 4 EIGRP By Your Name.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 3 EIGRP.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 3 EIGRP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 3 EIGRP.
NTU & MSRA Ming-Feng Tsai
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
© 2002, Cisco Systems, Inc. All rights reserved..
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
Theme Guidance - Network Traffic Proposed NMLRG IETF 95, April 2016 Sheng Jiang (Speaker, Co-chair) Page 1/6.
A Generic Approach to Big Data Alarms Prioritization
Experience Report: System Log Analysis for Anomaly Detection
© 2002, Cisco Systems, Inc. All rights reserved.
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Instructor Materials Chapter 5: Dynamic Routing
Distance Vector Routing Protocols
Monitoring Persistently Congested Internet Links
Improving the Defect Life Cycle Management Process
How Do Scientists Think?
CSSE463: Image Recognition Day 11
Power Prefixes Prioritization for Smarter BGP Reconvergence
© 2002, Cisco Systems, Inc. All rights reserved.
An Enhanced Support Vector Machine Model for Intrusion Detection
Cost-Sensitive Learning
Test Upgrade Name Title Company 9/18/2018 Microsoft SharePoint
© 2002, Cisco Systems, Inc. All rights reserved.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Chapter 5: Dynamic Routing
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel

Dynamic Routing Protocols
Distance Vector Routing Protocols
Cost-Sensitive Learning
Predicting Traffic Dmitriy Bespalov.
Dynamic Routing and OSPF
Approaching an ML Problem
Dynamic Routing Protocols
Distance Vector Routing Protocols
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
Data Mining, Machine Learning, Data Analysis, etc. scikit-learn
CSSE463: Image Recognition Day 11
CSSE463: Image Recognition Day 11
Sofia Pediaditaki and Mahesh Marina University of Edinburgh
Jia-Bin Huang Virginia Tech
Presentation transcript:

Predicting Interface Failures For Better Traffic Management. 28 March 2016 Predicting Interface Failures For Better Traffic Management. - Rudra Saha Cisco Systems

Agenda: Problem Scenario Current Solution Proposed Solution Experimental Methodology Tasks Done Current Outcomes Results Future Work Conclusion Q/A 28 March 2016

28 March 2016 Talk about the network crash scenario and traffic/data loss it will lead to

Current Solution: Essentially reactive in nature. Tries to detect and resolve network issues post failure. Dependent on redundant paths. Doesn’t look into the “Why” of the matter. 28 March 2016 Talk about BFD and FRR combo – bfd thresholds are set by engineers. No heurtistic to decide on this

Proposed Solution: Pro-active in nature. Relies on pattern observed in historical data. Minimal affect on router usage while data collection. Negligent affect while making prediction outside the router. 28 March 2016 Prediction >>> Detection , decreasing false negatives and false positives Here at Cisco we are considered about the smallest of the clock cycles.

Experimental Methodology: 28 March 2016 Yang not implemented --- talk about gold as well. It is going to be in use with polaris. So will work as a good data mining machine. Also do check out about something called DNA in cisco which does some anomaly detection (dumb thresholding method though) GLOBAL MODEL

… First task is to come up with relevant data. EIGRP protocol used because of domain expertise. New cli created which collect features from eigrp component. Features extracted from the global router level as well e.g. CPU usage, network bandwidth usage, memory usage etc. EEM scripts currently deployed to extract this from the cli. 28 March 2016 Feature extraction, correlation and engineering.

… Data for training and cross-validation purposes collected from a DUAL DMVPN topology with 100 spokes. Data is collected in groups of 6 minutes. Used One-Class SVM to create our prediction model. DBSCAN algorithm used to generate better insights into the data. 28 March 2016 Will talk about why used One class SVM Scholkopf’s One class SVM Technique DBSCAN as to why even use it and advantages from this. Why 6 mins (SIA convergence)

… The events with a route down / CPU hog/ Interface Down/ Traceback/ Crash/ Process Crash etc can be marked as an anomaly. 28 March 2016 Are we actually marking now ? We are using one class right .. .this might come up if someone pays good attention.

Current Outcomes: Once an outlier is detected, a simple probability model helps us plot the outlier variable vs time The prediction will help the admin to switch the traffic to an alternate path at the earliest. 28 March 2016

Results: With tailored anomalous data which had continuous high CPU utilization/network drop, the model assessed the nature of the data instance with high certainty. Neighbour down due to query storm in the DMVPN network was easily predicted. The model was able to predict an EIGRP neighbor flap due to SIA in PE-CE network. An accuracy of ~67% was achieved on the test dataset. 28 March 2016

Future Work: Future work will be to come up with a more robust dataset that covers all the relevant cases. Increase upon the number of feature points to improve the model and to come up with different models that suit our data. Include features other components from the network stack (lower level) in the prediction model. To take corrective action on the router automatically similar to FRR and bypass the issue from happening. 28 March 2016

Conclusion: We now have a mechanism in place to alert the network admin to take corrective action like diverting traffic from the interface before an issue can happen. In case the network admin does not take any preventive action and the failure does happen, the admin will now have a starting point to debug. 28 March 2016

28 March 2016