Do you trust this [network] computer

Notice: This blog post was originally published on Indeni before its acquisition by BlueCat.

The content reflects the expertise and perspectives of the Indeni team at the time of writing. While some references may be outdated, the insights remain valuable. For the latest updates and solutions, explore the rest of our blog

How to set AI and Machine Learning up for Success in Enterprise Networks

A documentary titled “Do You Trust This Computer?” was recently released, and it is worth the hour and 20 min investment to watch if you haven’t seen it yet. It discusses the current and future state of artificial intelligence, and the risks it presents to our society.

At Indeni we are working towards our vision of a self-driving network and wanted to share a few of our takeaways from this film. By following these steps we can enable advancing technologies like machine learning and AI to make a positive impact on our networks and wreak less havoc in the future.

#1. Create Documentation. In the film, IBM watson (a question answering computer system) was shown winning Jeopardy. Watson prepared for the challenge by reading the entire Wikipedia website. Say there is a Watson for networking or security operations, what is the equivalent knowledge source that he or she would need to read to be effective? A network engineer could read Cisco, CheckPoint or Radware documentation, PCI, HIPAA or FISMA compliance guidelines, in addition to internal runbooks, and even after that, they would be partially up to speed.

Similar to the approach Wikipedia has taken to documenting common knowledge to the most obscure incidents, we must do the same and document our networks. If more professionals contributed their knowledge, and others acted as peer reviewers, we could collectively expand our knowledge set, improve the quality of our data, and pave the way for machines to follow in our footsteps.

#2. Define Rules and Boundaries. To get a machine to do something autonomously, it must be programmed. Therefore, someone or a group of people have to set boundaries for that machine:

  • What metrics to analyze?
  • How to know data captured is important? Urgent? Normal?
  • After you’ve analyzed the data, what do you do next?

Before we can automate anything, including a robot or a network, we need to turn our experience into code and teach it the right thing to do. The growing adoption of virtualization and cloud platforms, paired with the continued use of legacy firewall, routing and switch technology, creates a complex web of statuses and dependencies for a person or machine to navigate. To get started, it is important for us to document the basic steps of how to perform:

  • Routine Maintenance
  • Gain Network Visibility
  • Ensure Availability
  • Implement Security best practices
  • Demonstrate Compliance

Once the basics are in place, we can add in edge cases and anomalies and even learn from peer networks before automating actions at large.

#3. Pair Humans & Machines to Ensure Accuracy. In the film, a machine named “Baxter” was placed on an assembly line. The company decided to replace humans with Baxter since it cost less than 3 human workers and “they never get tired, they never take breaks.” In other words, Baxter is more productive and generated less errors that his human counterparts. While this may be frightening, there is hope. Did you notice that the factory still included humans? While the human does not perform the same tasks as the machine, they are there to oversee the process and intervene when $&@! hits the fan (because it always does). This pairing of humans and machines will be the same relationship in a self-operating network. A human will always be needed to intervene when an incident escalates beyond the machines experience, or programmed capabilities to control.

#4. Earn Our Trust. The first step to trusting a person or a machine is transparency. It was alarming to hear from one of the interviewees that he didn’t know how their robot learned to recognize faces. Visibility into the code and ensuring ethical boundaries are programmed in place can avoid many “surprises” like this from happening. Which circles back to the importance of maintaining up to date documentation.

What are your takeaways from this film? What steps have you taken steps to program your network? Learn how Indeni is automating routine tasks with an open development approach here.

Related content

Security Insights for network security at the edge without complexity 

For LiveWire and LiveNX users, analyze flow and packet telemetry for faster threat detection, stronger forensics, and shared visibility.

Read more

Network observability maturity stuck? Learn how to pull ahead

In EMA and BlueCat’s new report, learn about the five-stage Network Observability Maturity Model and how your enterprise can move along it.

Read more

How to choose a protective DNS solution for your network

Learn how to choose the protective DNS solution that’s right for your network, including capabilities and integrations—without vendor hype.

Read more

Route traffic intelligently with DNS-based GSLB for BlueCat Edge

Discover how DNS-based GSLB with BlueCat Edge empowers networking teams to control traffic steering, reduce costs, and improve resilience.

Read more