<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
<!ENTITY RFC8986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
]>


<rfc ipr="trust200902" docName="draft-francois-nmrg-ai-challenges-01" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Coupling AI and network management">Research Challenges in Coupling Artificial Intelligence and Network Management</title>

    <author fullname="Jérôme François">
      <organization>Inria</organization>
      <address>
        <postal>
          <street>615 rue du jardin botanique</street>
          <city>Villers-lès-transparency</city>
          <country>France</country>
        </postal>
        <email>jerome.francois@inria.fr</email>
      </address>
    </author>
    <author fullname="Alexander Clemm">
      <organization>Futurewei Technologies, Inc.</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <author fullname="Dimitri Papadimitriou">
      <organization>3NLab Belgium Reseach Center</organization>
      <address>
        <postal>
          <city>Leuven</city>
          <country>Belgium</country>
        </postal>
        <email>papadimitriou.dimitri.be@gmail.com</email>
      </address>
    </author>
    <author fullname="Stenio Fernandes">
      <organization>Central Bank of Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>stenio.fernandes@ieee.org</email>
      </address>
    </author>
    <author fullname="Stefan Schneider">
      <organization>Digital Railway (DSD) at Deutsche Bahn</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>stefanschneider93@googlemail.com</email>
      </address>
    </author>

    <date year="2022" month="October" day="24"/>

    
    <workgroup>Internet Research Task Force</workgroup>
    <keyword>network management</keyword> <keyword>artificial intelligence</keyword> <keyword>machine learning</keyword>

    <abstract>


<t>This document is intended to introduce the challenges to overcome when network management problems may require to be couple with AI solutions. On one hand, there are many difficult problems in Network Management that to this date have no good solutions, or where any solutions come with significant limitations and constraints.   Artificial Intelligence may help produce novel solutions to those problems.  On the other hand, for several reasons (computational costs of AI solutions, privacy of data), distribution of AI tasks became primordial. It is thus also expected that network <bcp14>SHOULD</bcp14> be operated efficiently to support those tasks.</t>

<t>To identify the right set of challenges, the document defines a method based on the evolution and nature of NM problems. This will be done in parallel with advances and the nature of existing solutions in AI in order to highlight where AI and NM have been already coupled together or could benefit from a higher integration. So, the method aims at evaluating the gap between NM problems and AI solutions. Challenges are derived accordingly, assuming solving these challenges will help to reduce the gap between NM and AI.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>The functional scope of network management (NM) is very large, ranging from monitoring to accounting, from network provisioning to service diagnostics, from usage accounting to security.   The taxonomy defined in <xref target="Hoo18"/> extends the traditional Fault, Configuration, Accounting, Performance, Security (FCAPS) domains by considering additional functional areas but above all by promoting additional views. For instance, network management approaches can be classified according to the technologies, methods or paradigms they will rely on. Methods include common approaches as for example mathematical optimization or queuing theory but also techniques which have been widely applied in last decades like game theory, data analysis, data mining and machine learning. In management paradigms, autonomic and cognitive management are listed. As highlighted by this taxonomy, the definition of automated and more intelligent techniques have been promoted to support efficient network management operations. Research in NM and more generally in networking has been very active in the area of applied ML <xref target="Bou18"/>.</t>

<t>However, for maintaining network operational in pre-defined safety bounds, NM still heavily relies on established procedures. Even after several cycles of adding automation, those procedures are still mostly fixed in the sense that the exact control loop is and all possibilities are defined in advance. They are so mostly deterministic by nature or or at least with maximal error bounds .Obviously, there have been a lot of propositions to make network smarter or intelligent with the use of ML but without large adoption for running real networks because it changes the paradigms towards stochastic methods.</t>

<t>ML is a sub-area of AI that concentrates the focus nowadays but AI encompasses other areas including knowledge representation, inference rule engine, statistical methods or by extension the techniques that allow to observe and perform actions on a system.</t>

<t>It is thus legitimate to question if ML or AI in general could be helpful for NM in regards to practical deployment. This question is actually tight with the problems the NM aims to address. Independently of NM, ML solutions were introduced to solve one type of problems in an approximate way  which are very complex in nature, i.e. finding an optimal solution is not possible (in polynomial time). This is the case for NP-hard problems. In those cases, solutions typically rely on heuristics that may not yield optimal results, or algorithms that run into issues with scalability and the ability to produce timely results due to the exponential search space. In NM, those problems exist, for instance allocation of resources in case of service function chaining or network slicing  among others are recent examples which have gained interest in our community with SDN. Many propositions consist of defining the problem as an MILP with some heuristics to reach a satisfactory tradeoff between solution quality - computation time and model size/dimensionality. Hence, ML is recognized to be well adapted to progress on this type of problem <xref target="Kaf19"/>.</t>

<t>However, all problems of NM are not NP-hard. Due to real-time constraints, some involve very short control loops that require both rapid decisions and the ability to rapidly adapt to new situations and different contexts. So, even in that case, time is critical and approximate solutions are usually more acceptable.  Again, it is where AI can be beneficial. Actually expert systems are AI systems <xref target="Ste92"/> but this kind of systems are not designed to scale with the volume and heterogeneity of data we can collect in a network today for which the expert system is built thanks to numerous inference rules. In contrast, ML is more efficient to automatically learn abstract representations of the rules, which can be eventually updated.</t>

<t>On one hand Another type of common problem in NM is classification. For instance, classifying network flows is helpful for security purposes to detect attack flows, to differentiate QoS among the different flows (e.g. real-time streams which need to be prioritized), etc. On the other hand, ML-based classification algorithms have been widely used in literature with high quality results when properly applied leading to their applications in commercial products. There are many algorithms including decision tress, support vector machine ir (deep) neural networks which have been to be proven efficient in many areas and notably for image and natural language processing.</t>

<t>Finally, many problems also still rely on humans in the loop, from support issues such as dealing with trouble tickets to planning activities for the roll-out of new services. This creates operational bottlenecks and is often expensive and error prone. This kind of tasks could be either automated or guided by an AI system to avoid human bias. Indeed, the balance between human resources and the complexity of problems to deal with is actually very imbalanced and this will continue to increase due to the size of networks, heterogeneity of devices, services, etc. Hence, human-based procedures tend to be simple in comparison to the problem to solve or time-consuming. Notable examples are in security where the network operator should defend against potential unknown threat. As a result, services might be largely affected during hours</t>

<t>Actually, all the problems aforementioned are exacerbated by the situation of more complex networks to operate on many dimensions (users, devices, services, connections, etc.). Therefore, AI is expected to enable or simplify the solving of those problems in real networks in the near future <xref target="czb20"/> <xref target="Yan20"/> because those would require reaching unprecedented levels of performance in terms of throughput, latency, mobility, security, etc.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="acronyms"><name>Acronyms</name>

<t>AI: Artificial Intelligence
GAN: Generative Adversarial Network
GNN: Graph Neural Network
LSTM: Long Short-Term Memory
ML: Machine Learning
MLP: Multilayer Perceptron
NM: Network Management</t>

</section>
<section anchor="pbNM"><name>Difficult problems in network management</name>

<t>As mentioned in introduction, problems to be tackled in NM tend to be complex and exhibit characteristics that make them candidates for solutions that involve AI techniques:</t>

<t><list style="symbols">
  <t>C1: A very large solution space, combinatorially exploding with the size of the problem domain. This makes it impractical to explore and test every solution (again NP-hard problems here)</t>
  <t>C2: Uncertainty and unpredictability along multiple dimensions, including the context in which the solution is applied, behavior of users and traffic, lack of visibility into network state, and more.  In addition, many networks do not exist in isolation but are subjected to myriads of interdependencies, some outside their control.  Accordingly, there are many external parameters that affect the efficiency of the solution to a problem and that cannot be known in advance: user activity, interconnected networks, etc.</t>
  <t>C3: The need to provide answers (i.e. compute solutions, deliver verdicts, make decisions)  in constrained or deterministic time. In many cases, context changes dynamically and decisions need to be made quickly to be of use.</t>
  <t>C4: Data-dependent solutions. To solve a problem accurately, it can be necessary to rely on large volumes of data, having to deal with issues that range from data heterogeneity to incomplete data to general challenges of dealing with high data velocity.</t>
  <t>C5: Need to be integrated with existing automatic and human processes.</t>
  <t>C6: Solutions <bcp14>MUST</bcp14> be cost-effective as resources (bandwidth, CPU, human, etc.) can be limited, notably when part of processing is distributed at the network edge or within the network.</t>
</list></t>

<t>Many problems are affected by multiple criteria. Below is a non-exhaustive list of complex NM problems for which AI and/or non-AI-based approaches have been proposed:</t>

<t><list style="symbols">
  <t>Computation of optimal paths: packet forwarding is not always based on traditional routing protocols with least cost routing, but on computation of paths that are optimized for certain criteria - for example, to meet certain level objectives, to result in greater resilience, to balance utilization, to optimize energy usage, etc.  Many of those solutions can be found in SDN, where a controller or path computation element computes paths that are subsequently provisioned across the network.  However, such solutions generally do not scale to millions of paths (C1), and cannot be recomputed in sub-second time scales (C3) to take into account dynamically changing network conditions (C2). To compute those paths,  operations research techniques have been extensively used in literature along with AI methods as shown in <xref target="Lop20"/>. As such, this problem can be considered as close to big data problems with some of the different Vs: volume, velocity, variety, value…</t>
  <t>Classification of network traffic: without loss of generality a common objective of network monitoring for operators is to know the type of traffic going through their networks (web, streaming, gaming, VoIP). By nature, this task analyzes data (C4) which can vary over time (C2) except in very particular scenarios like industrial isolated networks. However, the output of the classification technique is time-constrained only in specific cases where fast decisions <bcp14>MUST</bcp14> be made, for example to reroute traffic. Simple identification based on IANA-assigned TCP/UDP ports numbers were sufficient in the past. However, with applications using dynamic port numbers, signature techniques can be used to match packet payload <xref target="Sen04"/>. To handle applications now encapsulated in encrypted web or VPN traffic, machine-learning has been leveraged <xref target="Bri19"/>.</t>
  <t>Network diagnostics: disruptions of networking services can have many causes. Identifying the root cause can be of high importance when what is causing the disruption is not properly understood, so that repair actions can address the root cause versus just working around the symptoms.  Further complicating the matter are scenarios in which disruptions are not “hard” but involve only a degradation of service level, and where disruptions are intermittent, not reproducible, and hard to predict.  Artificial intelligence techniques can offer promising solutions.</t>
  <t>Intent-Based Networking (IBN): Roughly speaking, IBN refers to the ability to manage  networks by articulating desired outcomes without the need to specify a course of actions to achieve those outcomes.  The ability to determine such courses of actions, in particular in scenarios with multiple interdependencies, conflicting goals, large scale, and highly complex and dynamic environments is a huge and largely unsolved challenge.  Artificial Intelligence techniques can be of help here in multiple ways, from accurately classifying dynamic context to determine matching actions to reframing the expression of intent as a game that can be played (and won) using artificially intelligent techniques.</t>
  <t>VNF placement and SFC design: Virtual Network Functions need to be placed on physical resources and Service Function Chains designed in an optimized manner to avoid use of networking resources and minimize energy usage.</t>
  <t>Smart admission control to avoid congestion and oversubscription of network resources: Admission control needs to be set up and performed in ways that ensure service levels are optimized in a manner that is fair and aligned with application needs, congestion avoided or its effects mitigated.</t>
</list></t>

</section>
<section anchor="hlchallenges"><name>High-level challenges in adopting AI in NM</name>

<t>As shown in the previous section, AI techniques are good candidates for the difficult NM problems. There have been many propositions but still most of them remain at the level of prototypes or have been only evaluated with simulation and/or emulation. It is thus questionable why our community investigates much research in this direction but has not adopted those solutions to operate real networks. There are different obstacles.</t>

<t>First, AI advances have been historically driven by the image/video, natural language and signal processing communities as well as robotics for many decades. As a result, the most impressive applications are in this area including recently the generalization of home assistants or the large progress in autonomous vehicles. However, the network experts have been focused on building the Internet, especially building protocols to make the world interconnected and with always better performance and services. This trend continues today with the 5G in deployment and 6G under definition. Hence, AI was not our primary focus. However, AI is now considered as a core enabler for the future 6G networks which are sometimes qualified as AI-native networks.</t>

<t>While we can see major contributions in AI-based solutions for networking over more than two decades, only a fraction of the community was concerned by AI at that time. Progress as a whole, from a community perspective, was so limited and compensated by relying on the development of AI in the communities as mentioned earlier. Even if our problems share some commonalities, for example on the volume of data to analyze, there are many differences: data types are completely different, networks are by nature heavily distributed, etc. If problems are different, they <bcp14>SHOULD</bcp14> require distinct solutions. In a nutshell, network-tailored AI was overlooked.</t>

<t>Second, many AI techniques require enough representative data to be applied independently if the algorithms are supervised or unsupervised. NM has produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI techniques and lead so to a mismatch. For example, (deep) learning techniques mostly rely on having vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc)  but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>.</t>

<t>An additional challenge concerns the fact that AI techniques that involve analysis of networking data can also lead to the extraction of sensitive and personally-identifiable information, raising potential privacy concerns and concerns regarding the potential for abuse. For example, AI techniques used to analyze encrypted network traffic with the legitimate goal to protect the network from intrusions and illegitimate attack traffic could be used to infer information about network usage and interactions of network users.  Intelligent data analysis and the need to maintain privacy are in many ways that are contradictory in nature, resulting in an arms race.  Similarly, training ML solutions on real network data is in many cases preferable over using less-realisitic synthetic data sets.However, network data may contain private or sensitive data, the sharing of which may be problematic from a privacy standpoint and even result in legal exposure. The challenge concerns thus how to allow AI techniques to perform legitimate network management functions and provide network owners with operational insights into what is going on in their networks, while prohibiting their potential for abuse for other (illegitimate) purposes.</t>

<t>Finally, networks are already operated thanks to (semi-)automated procedures involving a large number of resources which are synchronized with management or orchestration tools. Adding AI supposes it would be seamlessly integrated within pre-existing processes. Although the goal of these procedures might be solely to provide relevant information to operators through alerts or dashboards in case of monitoring applications, many other applications rely on those procedures to trigger actions on the different resources, which can be local or remote. The use of AI or any other approaches to derive NM actions adds further constraint on them, especially regarding time constraints and synchronization to maintain a coherence over a distributed system.</t>

<t>A related challenge concerns the fact that to be deployed, a solution needs to not only provide a technical solution but to also be acceptable to users - in this case, network administrators and operators.  One challenge with automated solutions concerns that users want to feel “in control” and able to understand what is going on, even more so if ultimately those users are the ones who are held accountable for whether or not the network is running smoothly.  Those same concerns extend to artificially intelligent systems for obvious reasons. To mitigate those concerns, aspects such as the ability to explain actions that are taken - or about to be taken - by AI systems become important.</t>

<t>Beyond reasons of making users more comfortable, there are potentially also legal or regulatory ramifications to ensure that actions taken are properly understood.  For example,agencies such as the FCC may impose fines on network operators when services such as E911 experience outages, as there is a public interest in ensuring highest availability for such services.  In investigating causes for such outages, the underlying behavior of systems has to be properly understood, and even more so the reasons for actions that fall under the realm of network operations.</t>

</section>
<section anchor="AItechniques"><name>AI techniques for network management</name>

<section anchor="problem-type-and-mapping"><name> Problem type and mapping</name>

<t>In the last few years, an increasing number of different AI techniques have been proposed and applied successfully to a growing variety of different problems in different domains, including network management <xref target="Mus18"/>, <xref target="Xie18"/>. Some of the more recently proposed AI approaches are clearly advancements of older approaches, which they supersede. Many other AI approaches are not predecessors or successors but simply complementary because they are useful for different problems or optimize different metrics. In fact, different AI approaches are useful for different kinds of problem inputs (e.g., tabular data vs. text vs. images vs. time series) and also for different kinds of desired outputs (e.g., a predicted value, a classification, or an action). Similarly, there may be trade-offs between multiple approaches that take the same kind of inputs and desired outputs (e.g., in terms of desired objective, computation complexity, constraints).</t>

<t>Overall, it is a key challenge of using AI for network management to properly understand and map which kind of problems with which inputs, outputs, and objectives are best solved with which kind of AI (or non-AI) approaches. Given the wealth of existing and newly released AI approaches, this is far from a trivial task.</t>

<section anchor="sub-challenge-suitable-approach-for-given-input"><name>Sub-challenge: Suitable Approach for Given Input</name>

<t>Different problems in network management come with widely different problem parameters. For example, security-related problems may have large amounts of text or encrypted data as input, whereas forecasting problems have historical time series data as input. They also vary in the amount of available data.</t>

<t>Both the type and amount of data influences which AI techniques could be useful. On one hand, in scenarios with little data, classical machine learning techniques (e.g., SVM, tree-based approaches, etc.) are often sufficient and even superior to neural networks. On the other hand, neural networks have the advantage of learning complex models from large amounts of data without requiring feature engineering. Here, different neural network architectures are useful for different kinds of problems. The traditional and simplest architecture are (fully connected) multi-layer perceptrons (MLPs), which are useful for structured, tabular data. For images, videos, or other high-dimensional data with correlation between “close” features, convolutional neural networks (CNNs) are useful. Recurrent neural networks (RNNs), especially LSTMs, and attention-based neural networks (transformers) are great for sequential data like time series or text. Finally, Graph Neural Networks (GNNs) can incorporate and consider the graph-structured input, which is very useful in network management, e.g., to represent the network topology.</t>

<t>The aforementioned rough guidelines can help identify a suitable AI approach and neural network architecture. Still, best results are often only achieved with sophisticated combinations of different approaches. For example, multiple elements can be combined into one architecture, e.g., with both CNNs and LSTMs, and multiple separate AI approaches can be used as an ensemble to combine their strengths. Here, simplifying the mapping from problem type and input to suitable AI approaches and architectures is clearly an open challenge. Future work <bcp14>SHOULD</bcp14> address this challenge by providing both clearer guidelines and striving for more general AI approaches that can easily be applied to a large variety of different problem inputs.</t>

</section>
<section anchor="sub-challenge-suitable-approach-for-desired-output"><name>Sub-challenge: Suitable Approach for Desired Output</name>

<t>Similar to the challenge of identifying suitable AI approaches for a given problem input, the desired output for a given problem also affects which AI approach <bcp14>SHOULD</bcp14> be chosen. Here, the format of the desired output (single value, class, action, etc.), the frequency of these outputs and their meaning <bcp14>SHOULD</bcp14> be considered.</t>

<t>Again, there are rough guidelines for identifying a group of suitable AI approaches. For example, if a single value is required (e.g., the amount of resources to allocate to a service instance), then typical supervised regression approaches <bcp14>SHOULD</bcp14> be used. If classification (e.g., of malware or another security issue <xref target="Abd10"/>) instead of a value is desired, supervised classification methods <bcp14>SHOULD</bcp14> be used. Alternatively, unsupervised machine learning can help to cluster given data into separate groups, which can be useful to analyze networking data, e.g., for better understanding different types of traffic or user segments.</t>

<t>In addition to these classical supervised and unsupervised methods, reinforcement learning approaches allow active, sequential decisions rather than simple predictions or classifications. This is often useful in network management, e.g., to actively control service scaling and placement as well as flow scheduling and routing. Reinforcement learning agents autonomously select suitable actions in a given environment and are especially useful for self-learning network management. In addition to model-free reinforcement learning, model-based planning approaches (e.g., Monte Carlo Tree Search (MCTS)) also allow choosing suitable actions in a given environment but require full knowledge of the environment dynamics. In contrast, model-free reinforcement learning is ideal for scenarios with unknown environment dynamics, which is often the case in network management.</t>

<t>Similar to the previous sub-challenge, these are just rough guidelines that can help to select a suitable group of AI approaches. Identifying the most suitable approach within the group, e.g., the best out of the many existing reinforcement learning approaches, is still challenging. And, as before, different approaches could be combined to enable even more effective network management (e.g., heuristics + RL, LSTMs + RL, …). Here, further research <bcp14>MAY</bcp14> simplify the mapping from desired problem output to choosing or designing a suitable AI approach.</t>

</section>
<section anchor="sub-challenge-tailoring-the-ai-approach-to-the-given-problem"><name>Sub-challenge: Tailoring the AI Approach to the Given Problem</name>

<t>After addressing the two aforementioned sub-challenges, one may have selected a useful kind of AI approach for the given input and output of a network management problem. For example, one may select regression and supervised learning to forecast upcoming network traffic. Or select reinforcement learning to continuously control network and service coordination (scaling, placement, etc.). However, even within each of these fields (regression, reinforcement learning, etc.), there are many possible algorithms and hyperparameters to consider. Selecting a suitable algorithm and parametrizing it with the right hyperparameters is crucial to tailor the AI approach to the given network management problem.</t>

<t>For example, there are many different regression techniques (classical linear, polynomial regression, lasso/ridge regression, SVR, regression trees, neural networks, etc.), each with different benefits and drawbacks and each with its own set of hyperparameters. Choosing a suitable technique depends on the amount and structure of the input data as well as on the desired output. It also depends on the available amount of compute resources and compute time until a prediction is required. If resources and time are not a limiting factor, many hyperparameters can be tuned automatically. In practice, however, the design space of choosing algorithms and hyperparameters is often so large that it cannot be effectively tuned automatically but also requires some initial expertise in selecting suitable AI algorithms and hyperparameters.</t>

<t>This sub-challenge holds for all fields of AI: Supervised learning (regression and classification), self-supervised learning, unsupervised learning, and reinforcement learning, each are broad and rapidly growing fields. Selecting suitable algorithms and hyperparameters to tailor AI approaches to the network management problem is both an opportunity and a challenge. Here, future work should further explore these trade-offs and provide clearer guidelines on how to navigate these trade-offs for different network management tasks.</t>

</section>
</section>
<section anchor="performance-of-produced-models"><name> Performance of produced models</name>

<t>From a general point of view, any AI technique will produce results with a certain level of quality. This leads to two inherent questions: (1) what is the definition of the performance in a context of a NM application? (2) How to measure it? and (3) How to ensure/improve the quality of produced results?</t>

<t>Many metrics have been already defined to evaluate the performance of an AI-based techniques in regards to its NM-level objectives. For example, QoS metrics (throughput, latency) can serve to measure the performance of a routing algorithm along with the computational complexity (memory consumption, size of routing tables). The question is to model and measure these two antagonist types of metrics. Number of true/false positives/negatives are the most basic metrics for network attack detection functions. Although the first two questions are thus already answered even if improvement can be done, question (3) refers to the integration of metrics into AI algorithms. Its objective is to obtain the best results which need to be quantified with these metrics. Depending on the type of algorithm, these metrics are either evaluated in an online manner with a feedback loop (for example with reinforcement learning) or in batch to optimize a model based on a particular context (for example described by a dataset for machine learning).</t>

<t>The problem is two-fold. First, the performance can be measured through multiple metrics of different types (numerical or ordinal for example) and some can be constrained by fixed boundaries (like a maximum latency), making their joint use challenging when creating an AI model to resolve a NM problem. Second, the scale metrics differ from each other in terms of importance or impact and can eventually vary on their domains. It can be hard to precisely assess what is a good or bad value (as it might depend on multiple other ones) and it is even more difficult to integrate in an AI technique, especially for learning algorithms to adjust their models based on the performance. Indeed, learning algorithms run through multiple iterations and rely on internal metrics (MAE or (R)MSE for neural network, gini index or entropy for decision trees, distance to an hyperplane for SVMs, etc) which are not strongly correlated to the final metrics of the application. For instance, a decision tree algorithm for classification purposes aims at being able to create branches with a maximum of data from the same classes and so avoid mixing classes. It is done thanks to a criterion like the entropy index but this kind of Index does not assume any difference between mixing class A and B or A and C. Assuming now that from an operational point of view, if A and B are mixed in the predictions is not critical, the algorithm should have preferred to mix and A and B rather than A and C even if in the first case it will produce more errors.</t>

<t>Therefore, the internal functioning of the AI algorithms should be refined, here by defining a particular criterion to replace the entropy as a quality measure when separating two branches. It assumes that the final NM objectives are integrated at this stage.</t>

<t>Another concrete example is traffic predictors which aim at forecasting traffic demands. They only produce an input that is not necessarily simple to be interpreted and used by, e.g., capacity allocation strategies/policies. A traditional traffic prediction that tries to minimize (perfectly symmetric) MAE/MSE treats positive and negative errors in identical ways, hence is agnostic of the diverse meaning (and costs) of under- and over-provisioning. And, such a prediction does not provide any information on, e.g., how to dimension resources/capacity to accommodate the future demand avoiding all underprovisioning (which entails service disruption) while minimizing overprovisioning (i.e., wasting resources). In other words, it forces the operator to guess the overprovisioning by taking (non-informed) safety margins. A more sensible approach here is instead forecasting directly the needed capacity, rather than the traffic <xref target="Beg19"/>.</t>

<t>While the one above is just an example, the high-level challenge is devising forecasting models that minimize the correct objective/loss function for the specific NM task at hand (instead of generic MAE/MSE). In this way, the prediction phase becomes an integral part of the NM, and not just a (limited and hard-to-use) input to it. In ML terms, this maps to solving the loss-metric mismatch in the context of anticipatory NM <xref target="Hua19"/>.</t>

<t>Another issue for statistical learning (from examples/observations) is mainly about extracting an estimator from a finite set of input-output samples drawn from an unknown probability distribution that should be descriptive enough for unseen/new input data. In this context online monitoring and error control of the quality/properties of these point estimators (bias, variance, mean squared error, etc.) is critical for dynamic/uncertain network environments. Similar reasoning/challenge applies for interval estimates, i.e., confidence intervals (frequentist) and credible intervals (Bayesian).</t>

</section>
<section anchor="lightweight-ai"><name> Lightweight AI</name>

<t>Network management and operations often need to be performed under strict time constraints, i.e. at line rate, in particular in the context of autonomic or self-driven networks. Locating NM functions as close as possible where forwarding is achieved is thus an interesting option to avoid additional delays when these operations are performed remotely, for example in a centralized controller. Besides, forwarding devices may offer available resources to supplement or replace edge resources. In case of AI coupled with network management, AI tasks can be offloaded in network devices, or more generally embedded within the network. Obviously, time-critical tasks are the best candidates to be offloaded within the network. Costly learning tasks should be processed in high-end servers but created models can be deployed, configured, modified and tuned in switches.</t>

<t>Recent advances in network programmability ease the programming of specific tasks at data-plane level. P4 <xref target="Bos14"/> is widely used today for many tasks including firewalling <xref target="Dat18"/> or bandwidth management <xref target="Che19"/>. P4 is prone to be agnostic to a specific hardware. Switches actually have particular architectures and the RMT (Reconfigurable Match Table) <xref target="Bos13"/> model is generally accepted to be generic enough to represent limited but essential switch architecture components and functionalities. P4 is inspired by this architecture. The RMT model allows reconfiguring match-action tables where actions can be usual ones (rewrite some headers, forward, drop...). Actions are thus applied on the packets when they are forwarded. Actions can also be more complex programs with some safeguards: no loop, resistivity… The impact on the program development is huge. For example, real number operations are not available by default while they are primordial in many AI algorithms.</t>

<t>In a nutshell, the first challenge to overcome of embedding AI in a network is the capacity of the hardware to support AI operations (architectural limitation). Considering software equipment such as a virtual switch simplifies the problem but does not totally resolve it as, even in that case, strong line-rate requirement limits the type of programs to be executed. For example, BPF (Berkeley Packet Filter) programs provides a higher control on packet processing in OVS <xref target="Cha18"/> but still have some limitations, as the execution time of these programs are bounded by nature to ensure their termination, an essential requirement assuming the run-to-completion model which permits high throughput.</t>

<t>The second challenge (resource limitation) of network-embedded AI in the network is to allocate enough resources for AI tasks with a limited impact on other tasks of network devices such as forwarding, monitoring, filtering… Approximation and/or optimization of AI tasks are potential directions to help in this area. For instance, many network monitoring proposals rely on sketches and with a proposed  well-tuned implementation for data-plane <xref target="Liu16"/><xref target="Yan18"/>. However, no general optimized AI-programmable abstraction exists to fit all cases and proposals are mostly use-case centric.  Research direction in NM regarding this issue can benefit from propositions in the field of embedded systems that face the same issues. Binarization of neural networks is one example <xref target="Lia18"/>. Besides, distributed processing is a common technique to distribute the load of a single task between multiple entities. AI task decomposition between network elements, edge servers or controllers has been also proposed <xref target="Gup18"/>.</t>

</section>
<section anchor="ai-for-planning-of-actions"><name>AI for planning of actions</name>

<t>Many tasks in network management revolve around the planning of actions with the purpose of optimizing a network and facilitating the delivery of communication services.  For example, Paths need to be planned and set up in ways that minimize wasted network resources (to optimize cost) while facilitating high network utilization (avoiding bottlenecks and the formation of congestion hotspots) and ensuring resiliency (by making sure that backup paths are not congruent with primary paths).  Other examples were mentioned in section 2.</t>

<t>The need for planning only increases with the rise of centralized control planes.  The promise of central control is that decisions can be optimized when made with complete knowledge of relevant context, as opposed to distributed control that needs to rely on local decisions being made with incomplete knowledge while incurring higher overhead to replicate relevant state across multiple systems.  However, as the scale of networks and interconnected systems continues to grow, so does the size of the planning task.  Many problems are NP-hard.  As a result, solutions typically need to rely on heuristics and algorithms that often result in suboptimal outcomes and that are challenging to deploy in a scalable manner.</t>

<t>The emergence of Intent-Based Networking emphasizes the need for automated planning even further.  The concept underlying “intent” is that it should allow users (network operators, not end users of communication services) to articulate desired outcomes without the need to specify how to achieve those outcomes. An Intent-Based System is responsible for translating the intent into courses of action that achieve the desired outcomes and that continue to maintain the outcomes over time. How the necessary courses of action are derived and what planning needs to take place is left open but where the real challenge lies.  Solutions that rely on clever algorithms devised by human developers face the same challenges as any other network management tasks.</t>

<t>These properties (problems with a clearly defined need, whose solution is faced with exploding search spaces and that today rely on algorithms and heuristics that in many cases result only suboptimal outcomes and significant limitations in scale) make automated planning of actions an ideal candidate for the application of AI-based solutions.</t>

<t>AI applications in network management in the past have been largely focusing on classification problems. Examples include analysis by Intrusion Protection Systems of traffic flow patterns to detect suspicious traffic, classification of encrypted traffic for improved QoS treatment based on suspected application type, and prediction of performance parameters based on observations.  In addition, AI has been used for troubleshooting and diagnostics, as well as for automated help and customer support systems.  However, AI-based solutions for the automated planning of actions, including the automated identification of courses of action, have to this point not been explored much.</t>

<t>A much-publicized leap in AI has been the development of Alpha Go.  Instead of using AI to merely solve classification problems, Alpha Go has been successful in automatically deriving winning strategy for board games, specifically the game of Go which features a prohibitively large search space that was long thought to put the ability to play Go at a world class level beyond the reach of problems that AI could solve.   Among the remarkable aspects of Alpha Go is that it is able to identify winning strategies completely on its own, without needing those strategies to be taught or learned by observations assuming the system is aware of rules.</t>

<t>The challenge for AI in network management is hence, where is the equivalent of an Alpha Go that can be applied to network management (and networking) problems?  Specifically, better solutions are needed for solutions that automatically derive plans and courses of actions for network optimization and similar NP-hard problems, such as provided today with only limited effectiveness by controllers and management applications.</t>

<t>Also, the evaluation of AI algorithms to derive courses of actions is more complex than more common regression or classification tasks. Actions need to be applied in order to observe the results it leads to. However, contrary to game playing, solutions need to be applied in the real world, where actions have real effects and consequences. Different orientations can be envisioned. First, incremental application of AI decisions with small steps can allow us to carefully observe and detect unexpected effects. This can be complemented with roll-back techniques. Second, formal verification techniques can be leveraged to verify decisions made by AI are maintained within safety bounds. Third, sandbox environments can be used but they <bcp14>SHOULD</bcp14> be representative enough of the real world. After progress in simulation and emulation, recent research advances lead to the definition of digital twins which implies a tight coupling between a real system and its digital twin to ensure a parallel but synchronized execution. Alternatively, transfer learning techniques in another promising area to be able to capitalize on ML models applicable on a real word system in a more generic sandbox environment. It is actually also an open problem to make the use of AI more acceptable as highlighted in the dedicated section.</t>

</section>
</section>
<section anchor="netData"><name>Network data as input for ML algorithms</name>

<t>Many applications of AI takes as input data. The quality of the outputs of ML-based techniques are highly dependent on the quality and quantity of data used for learning but also on other parameters. For example, as modern network infrastructures move towards higher speed and scale, they aim to support increasingly more demanding services with strict performance guarantees. These often require resource reconfigurations at run time, in response to emerging network events, so that they can ensure reliable delivery at the expected performance level. Timely observation and detection of events is also of paramount importance for security purposes, and can allow faster execution of remedy actions thus leading to reduced service downtime.</t>

<t>Thus, the challenge of data management is multifaceted as detailed in next subsections.</t>

<section anchor="data-for-ai-based-nm-solutions"><name>Data for AI-based NM solutions</name>

<t>Assuming a network management application, the first problem to address is to define the data to be collected which will be appropriate to obtain accurate results. This data selection can require defining problem-specific data or features (feature engineering).</t>

<t>Firstly, NM has already produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI problems and lead to a mismatch. Indeed, machine learning algorithms only work as desired when data to be analyzed respects properties. Many methods rely on vector-based distances which so supposes that the data encoded into the vector respects the underlying distance semantic. Taking the first n bytes of a packet as vectors and computing distances accordingly is possible but does not embed the semantic of the information carried out in the headers. For example, (deep) learning techniques mostly rely on vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc) but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>. Data to handle can be in a schema-free or eventually text-based format. One example could be the automated annotation of management intents provided in an unstructured textual format (policies descriptions, specifications,) to extract from them management entities and operations. For that purpose, suitable annotation models need to be built using existing NER (Named Entity Recognition) techniques usually applied for NLP. However, this <bcp14>SHALL</bcp14> be carefully crafted or specialized for network management (intent) language which indirectly bounces back to the challenges of AI techniques for NM specified earlier.</t>

<t>Secondly, The behavior of any network is not just derived from the events that can be directly observed, such as network traffic overload, but also from events occurring outside the environment of the network. The information provided by the detectors of such kinds of events, e.g. a natural incident (earthquake, storm), can be used to determine the adaptation of the network to avoid potential problems derived from such events. Those can be provided by BigData sources as well as sensors of many kinds. The AI challenge related to this task is to process large amounts of data and associate it with the effects that those events have on the network. It is hard to determine the static and dynamic relation between the data provided by external sources and the specific implications it has in networks. For instance, the effect of a “flash crowd” detected in an external source depends on the relation of a particular network to such an event. This can be addressed by AI and its particular application to network management. The objective is to complement a control-loop, as shown in <xref target="Mar18"/>, by including the specific AI engines into the decision components as well as the processes that close the loop, so the AI engine can receive feedback from the network in order to improve its own behavior. Similar challenges are addressed in other domains, image processing and computer vision, by using artifacts for anticipating movements in object location and identification.</t>

</section>
<section anchor="data-collection"><name>Data collection</name>

<t>Once defined, the second problem to address is the collection of data. Monitoring frameworks have been developed for many years such as IPFIX <xref target="RFC7011"/> and more recently with SDN-based monitoring solutions <xref target="Yu14"/><xref target="Ngu20"/>. However, going towards more AI for actions in network management supposes also to retrieve more than traffic related information. Actually, configuration information such as topologies, routing tables or security policies have been proven to be relevant in specific scenarios. As a result, many different technologies can be used to retrieve meaningful data. To support improved QoE, monitoring of the application layer is helpful but far from being easy with the heterogeneity of end-user applications and the wide use of encrypted channels. Monitoring techniques need to be reinvented through the definition of new techniques to extract knowledge from raw measurement <xref target="Bri19"/> or by involving end-users with crowd-sourcing <xref target="Hir15"/> and distributed monitoring. Also, the data-mesh concept proposes to classify data into three categories: source-aligned, aggregate and consumer-aligned. Source-aligned data are those related to the same operational domain and it is important to correlate or aggregate them with higher planes: management-, control- and forwarding plane. An issue is the difference, not only in the nature of data, but in their volumes and their variety. Some may change rapidly over time (for example network traffic) while other may be quite stable (device state).</t>

<t>The collecting process requirements depend on the kind of processing. We can distinguish two major classes: batch/offline vs real-time/online processing. In particular, real-time monitoring tools are key in enabling dynamic resource management functions to operate on short reconfiguration cycles. However, maintaining an accurate view of the network state requires a vast amount of information to be collected and processed. While efficient mechanisms that extract raw measurement data at line rate have been recently developed, the processing of collected data is still a costly operation. This involves potentially sampling, evaluating and aggregating a vast amount of state information as a response to a diverse set of monitoring queries, before generating accurate reports. One difficult problem resides also in the availability of data as real-time data from different sources to be aggregated may not arrive at the same time requiring so some buffering techniques. Machine learning methods, e.g. based on regression, can be used to intelligently filter the raw measurements and thus reduce the volume of data to process. For example, in <xref target="Tan20"/> the authors proposed an approach in which the classifiers derived for this purpose (according to measurements on traffic properties) can achieve a threefold improvement in the query processing capability. A residual question is the storage of raw measurements. In fact, predicting the lifetime of data is challenging because their analysis may not be planned and triggered by a particular event (for example, an anomaly or attack). As a result, the provisioning of storage capacity can be hard.</t>

<t>In parallel to the continuously increasing dynamicity of networks and complexity of traffic, there is a trend towards more user traffic processing customization <xref target="RFC8986"/><xref target="Li19"/>. As a result, fine grained information about network element states is expected and new propositions have emerged to collect on-path data or in-band network telemetry information <xref target="Tan20b"/>. These new approaches have been designed by introducing much flexibility and customization and could be helpful to be used in conjunction with AI applications. However, the seamless coupling of telemetry processes with packet forwarding requires careful definition of solutions to limit the overhead and the impact of the throughput while providing the necessary level of details. This shares commonalities with the lightweight AI challenge.</t>

</section>
<section anchor="usable-data"><name>Usable data</name>

<t>Although all agree on the necessity to have more shared datasets, it is quite uncommon in practice. Data contains private or sensitive information and may not be shared because of the criticality of data (which can be used by ill-intentioned adversaries) or due to laws or regulations, even within the same company. To solve this issue, anonymization techniques <xref target="Dij19"/> can be enhanced to optimize the trade-off between valuable data vs sensitive information (potential) leakage or reconstruction.
Whatever the final user of data, regulations and laws impose rules on data management with potentially costly impact if they are not respected voluntarily or not. Defining a new monitoring framework should always consider security and privacy aspects, for example to let any user/customer or access/remove its own data with General Data Protection Regulation (GDPR) in EU. The challenge resides here in the capacity of qualifying what is critical or private information and the capacity for an adversary to reconstruct it from other sources of data. Hence AI/ML based solutions will require more data but also more administrative, legal and ethical procedures. Those can last long and so slow down the deployment of a new solution. In addition, this requires interaction with experts from different domains (e.g. AI engineer and a lawyer). The integration of these non-technical constraints should be considered when defining new data to be collected or a new technique to collect data. However, knowing the final use of data is most of the time necessary for ethical and legal assessment which assumes that those considerations <bcp14>SHOULD</bcp14>  be integrated from the early design of new AI-based solutions.</t>

<t>For supervised or semi-supervised training, having a labeled dataset is a prerequisite. It constitutes a major challenge as well. One one hand, collectors are able to retrieve data. On the other hand, those network data are typically unlabeled. This limits application of ML to unsupervised learning tasks (learning from data). Because manual labeling is a tedious task. one option is to leverage AI to guide humans. This may also support a better generalization of a learned model. Indeed, an underlying challenge is the genericity or coverage of the datasets. Labels encode values of an objective function, the challenge posed by the design of such tools is tremendous since for involving a M:N relationship: 1 data type may be associated to M objective function values and N data types may be associated to 1 objective function. As a result, most datasets used for research encodes a single label for a particular application like attack label for datasets to be used in the context of intrusion detection or application type for network traffic used for classification where the value of a single dataset could be capitalized in several applications.</t>

<t>Again, researchers need empirical (or at least realistic) datasets to validate their solutions. Unfortunately, as highlighted above, having such data from real deployments for various reasons (business secrets, privacy concerns, concerns that vulnerabilities are revealed by accident, raw unlabeled data, etc.) is tough. Even if such a dataset is available it might not be enough to convincingly validate a new algorithm.
Instead of falling back to artificial testbed experiments or simulation, it would be useful to have the capability to generate datasets with characteristics that are not 100% identical but similar to the characteristics of one or more real datasets. Such synthetic networks can be used to validate new management algorithms, intrusion detection systems, etc.
The usage of AI (for example GANs) in this area <xref target="Hui22"/> is not yet widespread and there are still many concerns that deter researchers, e.g. the fear of leaking sensitive information from the original dataset into the synthetic dataset.</t>

</section>
</section>
<section anchor="acceptability-of-ai"><name> Acceptability of AI</name>

<t>Networks are critical infrastructures. On one hand, they <bcp14>SHOULD</bcp14> be operated without interruption and must be interoperable. Networks, except in a lab, are not isolated which slow down innovation in general. For example, changing Internet routing protocols <bcp14>SHOULD</bcp14> be accepted by all. The same applies for protocol. Even if there have been several versions of major protocols in use like TCP or DNS, there are still some security issues which cannot be patched with 100% guarantee. On the other hand, results provided by AI solutions are uncertain by nature. The same technique applied in different environments can produce different results. AI techniques need some effort (time and human) to be properly configured or to be stabilized. For instance, reinforcement learning needs several iterations before being able to produce acceptable results. These properties of AI techniques are thus a bit antagonist with the criticality of network infrastructures. With that in mind, acceptability of AI by network operators is clearly an obstacle for its larger adoption.</t>

<section anchor="explainability-of-network-ai-products"><name> Explainability of Network-AI products</name>

<t>A common issue across all Machine Learning (ML) applications is that they are black boxes. This means that, after training, the knowledge acquired by ML models is unintelligible to humans. As a result, offering hard guarantees on performance is a very challenging issue. In addition, complex ML models like neural networks -that often have more than hundreds of thousands of parameters- are very hard to debug or troubleshoot in case of failure.</t>

<t>While this is a common issue for all applications of AI, many areas work well with uncertainty and the black-box behavior of AI-based solutions. For instance, users accept an inherent error in recommender systems or computer vision solutions.</t>

<t>The networking field has already produced a set of well-established network management algorithms and methods, with clear performance guarantees and troubleshooting mechanisms <xref target="Rex06"/><xref target="Kr14"/>. As such, improving debugging, troubleshooting and guarantees on AI-based solutions for networking is a must.</t>

<t>AI researchers and practitioners are devoting large research efforts to improve this aspect of ML models, which is commonly known as explainability <xref target="XAI"/>.</t>

<t>This set of techniques provides insights and, in some cases, guarantees on the performance and behavior of ML-based solutions. Understanding such techniques, researching and applying them to network AI is critical for the success of the field.</t>

<t>There exist several ML-based methods that are human-understandable, although not widely used today. For instance, <xref target="Mar20"/> shows a method for building anticipation models (prediction) that provide explanations while determining some actions for tuning some parameters of the network. There are other challenges that <bcp14>SHOULD</bcp14> be addressed, such as providing explanations for other ML methods that are quite extended. For instance, xNN/SVM models can be accompanied by Digital Twins of the network that are reversely explored to explain some output from the ML model (e.g., xNN/SVM). In this context, there already exist several methods <xref target="Zil20"/><xref target="Puj21"/> that produce human-readable interpretations of trained NN models, by analyzing their neural activations on different inputs.</t>

</section>
<section anchor="ai-based-products-and-algorithms-in-production-systems"><name> AI-based products and algorithms in production systems</name>

<t>AI-based network management and optimization algorithms are first trained, then the resulting model is used to produce relevant inferences in operation, either in management or optimization scenarios. A relevant question for the success of AI-based solutions is: where does this training occur?</t>

<t>Traditionally, AI-based models have been trained in the same scenario where they operate<xref target="Val17"/><xref target="Xu18"/>, this is the customer network. However this presents critical drawbacks. First, training an AI model for management and operation typically requires generating network configurations and scenarios that can break the network. This is because training requires seeing a broad spectrum of scenarios. Thus, it is not feasible in production networks. Second, customer networks may not be equipped with the monitoring infrastructure required to collect the data used in the training process (e.g., performance metrics).</t>

<t>A more sensible approach is to train the AI-based product in a lab, for instance in the vendor’s premises. In the lab, AI models can be trained in a controlled testbed, with any configuration, even ones that break the network. However, the main challenge here arises from the fundamental differences between the lab’s network and the customer networks. For instance, the topology of the lab’s network might be smaller, etc. As a result, there is a need for models that are able to generalize. In this context, generalization means that models should be able to operate in other scenarios not seen during training, with different topologies, routing configurations, scheduling policies, etc.</t>

<t>In order to address this generalization problem, two main approaches are possible: The first one is Transfer Learning <xref target="tl1"/>. With this technique, the knowledge gained in the lab’s training  is used to operate in the customer network. Transfer Learning still requires that some data from the customer is used to re-train the model (e.g., accurate performance measurements). This means that, for each customer network, re-training is required. This presents important drawbacks, since this represents an added cost and access to customer data might be problematic.</t>

<t>A different approach is to use Graph Neural Networks (GNN) <xref target="gnn1"/><xref target="gnn2"/>. GNNs are a novel type of neural network able to operate and generalize over graphs. Indeed, networks are fundamentally represented as graphs: topology, routing, etc. With GNN, vendors can train the AI model in a lab and then use the resulting model, as is, in different customer networks, without additional re-training using customer data.</t>

</section>
<section anchor="ai-with-humans-in-the-loop"><name> AI with humans in the loop</name>

<t>Depending on the network management task, AI can automate and replace manual human control or it can complement human experts and keep them in the loop. Keeping humans in the loop will be an important step of building trust in AI approaches and help ensure the desired outcomes.
There are various ways of keeping humans in the loop in the different fields of AI, which could be useful for different aspects of network management.</t>

<t>In classification tasks (e.g., detecting security breaches, malware or detecting anomalies), trained AI models provide a confidence score in addition to the predicted class. If the confidence is high, the prediction is used directly. If the confidence is too low, a human expert may jump in and make the decision - thereby also providing valuable training data to improve the AI model. Such approaches are already being used in industry, e.g., to automatically label datasets (AWS SageMake). Similar approaches could also be used for other supervised learning tasks, e.g., regression. Still, it is an open challenge to keep humans in the loop in all phases of the learning process.</t>

<t>Another field of AI is reinforcement learning, which is useful for taking continuous control decisions in network management, e.g., controlling service scaling and placement as well as flow scheduling and routing over time. Reinforcement learning agents typically interact with the environment (i.e., the simulated or real network) completely autonomously without human feedback. However, there is a growing number of approaches to put human experts back into the loop. One approach is offline reinforcement learning, where the training data does not come from the reinforcement learning agent’s own exploration but from pre-recorded traces of human experts (e.g., placement decisions that were made by humans before). Another approach is to reward the reinforcement learning agent based on human feedback rather than a pre-defined reward function <xref target="Lee21"/>. Again, while there are first promising approaches, more work is required in this area.
Overall, it is an open challenge to both leverage the benefits of AI but keep human experts in the loop where it is useful.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TODO Security</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC7011;
&RFC8986;
&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References'>

<reference anchor="Ste92" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="D." surname="Stern" fullname="Daniel Stern">
      <organization></organization>
    </author>
    <author initials="P." surname="Chemouil" fullname="Prosper Chemouil">
      <organization></organization>
    </author>
    <date year="1992"/>
  </front>
<annotation>Networks, Kobe, Japan</annotation></reference>
<reference anchor="Abd10" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="K. A." surname="Jalil" fullname="Kamarularifin Abd Jalil">
      <organization></organization>
    </author>
    <author initials="M. H." surname="Kamarudin" fullname="Muhammad Hilmi Kamarudin">
      <organization></organization>
    </author>
    <author initials="M. N." surname="Masrek" fullname="Mohamad Noorman Masrek">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>IEEE international conference on networking and information technology</annotation></reference>
<reference anchor="Beg19" >
  <front>
    <title>DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning</title>
    <author initials="D." surname="Bega" fullname="D. Bega">
      <organization></organization>
    </author>
    <author initials="M." surname="Gramaglia" fullname="M. Gramaglia">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <author initials="A." surname="Banchs" fullname="A. Banchs">
      <organization></organization>
    </author>
    <author initials="X." surname="Costa-Perez" fullname="X. Costa-Perez">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="Bos13" >
  <front>
    <title>Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="H.-S." surname="Kim" fullname="Hun-Seok Kim">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="F." surname="Mujica" fullname="Fernando Mujica">
      <organization></organization>
    </author>
    <author initials="M." surname="Horowitz" fullname="Mark Horowitz">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Bos14" >
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="D." surname="Daly" fullname="Dan Daly">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard-" fullname="Martin Izzard-">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
      <organization></organization>
    </author>
    <author initials="D." surname="Talayco" fullname="Dan Talayco">
      <organization></organization>
    </author>
    <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="D." surname="Walker" fullname="David Walker">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>SIGCOMM Comput. Commun. Rev. 44</annotation></reference>
<reference anchor="Dat18" >
  <front>
    <title>P4Guard: Designing P4 Based Firewall</title>
    <author initials="R." surname="Datta" fullname="R. Datta">
      <organization></organization>
    </author>
    <author initials="S." surname="Choi" fullname="S. Choi">
      <organization></organization>
    </author>
    <author initials="A." surname="Chowdhary" fullname="A. Chowdhary">
      <organization></organization>
    </author>
    <author initials="Y." surname="Park," fullname="Y. Park,">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Military Communications Conference (MILCOM)</annotation></reference>
<reference anchor="Che19" >
  <front>
    <title>P4-Enabled Bandwidth Management</title>
    <author initials="Y." surname="Chen" fullname="Y. Chen">
      <organization></organization>
    </author>
    <author initials="L." surname="Yen" fullname="L. Yen">
      <organization></organization>
    </author>
    <author initials="W." surname="Wang" fullname="W. Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Chuang" fullname="C. Chuang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Y. Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Tseng" fullname="C. Tseng">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>Asia-Pacific Network Operations and Management Symposium (APNOMS)</annotation></reference>
<reference anchor="Cha18" >
  <front>
    <title>Oko: Extending Open vSwitch with Stateful Filters</title>
    <author initials="P." surname="Chaignon" fullname="Paul Chaignon">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="T." surname="Delmas" fullname="Thibault Delmas">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM Symposium on SDN Research (SOSR)</annotation></reference>
<reference anchor="czb20" >
  <front>
    <title>Network Management 2030: Operations and Control of Network 2030 Services</title>
    <author initials="A." surname="Clemm" fullname="A. Clemm">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Zhani" fullname="M. F. Zhani">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Springer Journal of Network and Systems Management (JNSM)</annotation></reference>
<reference anchor="Hua19" >
  <front>
    <title>Addressing the Loss-Metric Mismatch with Adaptive Loss Alignment</title>
    <author initials="C." surname="Huang" fullname="Chen Huang">
      <organization></organization>
    </author>
    <author initials="S." surname="Zhai" fullname="Shuangfei Zhai">
      <organization></organization>
    </author>
    <author initials="W." surname="Talbott" fullname="Walter Talbott">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Bautista" fullname="Miguel Angel Bautista">
      <organization></organization>
    </author>
    <author initials="S.-Y." surname="Sun" fullname="Shih-Yu Sun">
      <organization></organization>
    </author>
    <author initials="C." surname="Guestrin" fullname="Carlos Guestrin">
      <organization></organization>
    </author>
    <author initials="J." surname="Susskind" fullname="Josh Susskind">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ICRL</annotation></reference>
<reference anchor="Lee21" >
  <front>
    <title>Feedback-efficient interactive reinforcement learning via relabeling experience and unsupervised pre-training</title>
    <author initials="K." surname="Lee" fullname="K. Lee">
      <organization></organization>
    </author>
    <author initials="L." surname="Smith" fullname="L. Smith">
      <organization></organization>
    </author>
    <author initials="P." surname="Abbeel" fullname="P. Abbeel">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>arXiv preprint arXiv:2106.05091</annotation></reference>
<reference anchor="Lia18" >
  <front>
    <title>FP-BNN: Binarized neural network on FPGA</title>
    <author initials="S." surname="Liang" fullname="Shuang Liang">
      <organization></organization>
    </author>
    <author initials="S." surname="Yin" fullname="Shouyi Yin">
      <organization></organization>
    </author>
    <author initials="L." surname="Liu" fullname="Leibo Liu">
      <organization></organization>
    </author>
    <author initials="W." surname="Luk" fullname="Wayne Luk">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Shaojun Wei">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Neurocomputing, Volume 275</annotation></reference>
<reference anchor="Liu16" >
  <front>
    <title>One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon</title>
    <author initials="Z." surname="Liu" fullname="Zaoxing Liu">
      <organization></organization>
    </author>
    <author initials="A." surname="Manousis" fullname="Antonis Manousis">
      <organization></organization>
    </author>
    <author initials="G." surname="Vorsanger" fullname="Gregory Vorsanger">
      <organization></organization>
    </author>
    <author initials="V." surname="Sekar" fullname="Vyas Sekar">
      <organization></organization>
    </author>
    <author initials="V." surname="Braverman" fullname="Vladimir Braverman">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Yan18" >
  <front>
    <title>Elastic sketch: adaptive and fast network-wide measurements</title>
    <author initials="T." surname="Yang" fullname="Tong Yang">
      <organization></organization>
    </author>
    <author initials="J." surname="Jiang" fullname="Jie Jiang">
      <organization></organization>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization></organization>
    </author>
    <author initials="Q." surname="Huang" fullname="Qun Huang">
      <organization></organization>
    </author>
    <author initials="J." surname="Gong" fullname="Junzhi Gong">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhou" fullname="Yang Zhou">
      <organization></organization>
    </author>
    <author initials="R." surname="Miao" fullname="Rui Miao">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xiaoming Li">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="Steve Uhlig">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Gup18" >
  <front>
    <title>Sonata: query-driven streaming network telemetry</title>
    <author initials="A." surname="Gupta" fullname="Arpit Gupta">
      <organization></organization>
    </author>
    <author initials="R." surname="Harrison" fullname="Rob Harrison">
      <organization></organization>
    </author>
    <author initials="M." surname="Canini" fullname="Marco Canini">
      <organization></organization>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="W." surname="Willinger" fullname="Walter Willinger">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Mar18" >
  <front>
    <title>Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Harai" fullname="Hiroaki Harai">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, Vol. 15, N. 2,</annotation></reference>
<reference anchor="Mar20" >
  <front>
    <title>Explained Intelligent Management Decisions in Virtual Networks and Network Slices</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Asaeda" fullname="H. Asaeda">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</annotation></reference>
<reference anchor="Mus18" >
  <front>
    <title>An overview on application of machine learning techniques in optical networks</title>
    <author initials="F." surname="Musumeci" fullname="F. Musumeci">
      <organization></organization>
    </author>
    <author initials="C." surname="Rottondi" fullname="C. Rottondi">
      <organization></organization>
    </author>
    <author initials="A." surname="Nag" fullname="A. Nag">
      <organization></organization>
    </author>
    <author initials="I." surname="Macaluso" fullname="I. Macaluso">
      <organization></organization>
    </author>
    <author initials="D." surname="Zibar" fullname="D. Zibar">
      <organization></organization>
    </author>
    <author initials="M." surname="Ruffini" fullname="M. Ruffini">
      <organization></organization>
    </author>
    <author initials="M." surname="Tornatore" fullname="M. Tornatore">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 21(2), 1383-1408.</annotation></reference>
<reference anchor="Ngu20" >
  <front>
    <title>Efficient SDN-based traffic monitoring in IoT networks with double deep Q-network</title>
    <author initials="T. G." surname="Nguyen" fullname="T. G. Nguyen">
      <organization></organization>
    </author>
    <author initials="T. V." surname="Phan" fullname="T. V. Phan">
      <organization></organization>
    </author>
    <author initials="D. T." surname="Hoang" fullname="D. T. Hoang">
      <organization></organization>
    </author>
    <author initials="T. N." surname="Nguyen" fullname="T. N. Nguyen">
      <organization></organization>
    </author>
    <author initials="C." surname="So-In" fullname="C. So-In">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>International conference on computational data and social networks, Springer</annotation></reference>
<reference anchor="Tan20" >
  <front>
    <title>Classification-assisted Query Processing for Network Telemetry</title>
    <author initials="G." surname="Tangari" fullname="G. Tangari">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="M. Charalambides">
      <organization></organization>
    </author>
    <author initials="G." surname="Pavlou" fullname="G. Pavlou">
      <organization></organization>
    </author>
    <author initials="C." surname="Grazian" fullname="C. Grazian">
      <organization></organization>
    </author>
    <author initials="D." surname="Tuncer" fullname="D. Tuncer">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Network Traffic Measurement and Analysis Conference (TMA)</annotation></reference>
<reference anchor="Tan20b" >
  <front>
    <title>In-band Network Telemetry: A Survey</title>
    <author initials="T." surname="Lizhuang" fullname="Tan, Lizhuang">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Su, Wei">
      <organization></organization>
    </author>
    <author initials="Z." surname="Zhenyi" fullname="Zhang, Zhenyi">
      <organization></organization>
    </author>
    <author initials="M." surname="Jingying" fullname="Miao, Jingying">
      <organization></organization>
    </author>
    <author initials="L." surname="Xiaoxi" fullname="Liu, Xiaoxi">
      <organization></organization>
    </author>
    <author initials="L." surname="Na" fullname="Li, Na">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Computer Networks. 186. 10.1016</annotation></reference>
<reference anchor="Val17" >
  <front>
    <title>Learning to route</title>
    <author initials="V." surname="A." fullname="Valadarsky, A.">
      <organization></organization>
    </author>
    <author initials="S." surname="M." fullname="Schapira, M.">
      <organization></organization>
    </author>
    <author initials="S." surname="D." fullname="Shahaf, D.">
      <organization></organization>
    </author>
    <author initials="T." surname="A." fullname="Tamar, A.">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>ACM HotNets</annotation></reference>
<reference anchor="Xu18" >
  <front>
    <title>Experience-driven networking: A deep reinforcement learning based approach</title>
    <author initials="X." surname="Z." fullname="Xu, Z.">
      <organization></organization>
    </author>
    <author initials="T." surname="J." fullname="Tang J.">
      <organization></organization>
    </author>
    <author initials="M." surname="J." fullname="Meng, J.">
      <organization></organization>
    </author>
    <author initials="Z." surname="W." fullname="Zhang, W.">
      <organization></organization>
    </author>
    <author initials="W." surname="Y." fullname="Wang, Y.">
      <organization></organization>
    </author>
    <author initials="L. C." surname="H." fullname="Liu, C. H.">
      <organization></organization>
    </author>
    <author initials="Y." surname="D." fullname="Yang, D.">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="tl1" >
  <front>
    <title>Transfer learning</title>
    <author initials="L." surname="Torrey" fullname="Lisa Torrey">
      <organization></organization>
    </author>
    <author initials="J." surname="Shavlik" fullname="Jude Shavlik">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>Handbook of research on machine learning applications and trends: algorithms, methods, and techniques</annotation></reference>
<reference anchor="gnn1" >
  <front>
    <title>Relational inductive biases, deep learning, and graph networks</title>
    <author initials="P. W." surname="Battaglia" fullname="Peter W. Battaglia">
      <organization></organization>
    </author>
    <author initials="E." surname="al" fullname="Et. al">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>arXiv preprint arXiv:1806.01261</annotation></reference>
<reference anchor="gnn2" >
  <front>
    <title>Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN</title>
    <author initials="K." surname="Rusek" fullname="K. Rusek">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="J. Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="A." surname="Mestres" fullname="A. Mestres">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="P. Barlet-Ros">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM Symposium on SDN Research</annotation></reference>
<reference anchor="Rex06" >
  <front>
    <title>Route optimization in IP networks</title>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<annotation>Handbook of Optimization in Telecommunications (pp. 679-700), Springer</annotation></reference>
<reference anchor="Kr14" >
  <front>
    <title>Software-defined networking: A comprehensive survey</title>
    <author initials="D." surname="Kreutz" fullname="D. Kreutz">
      <organization></organization>
    </author>
    <author initials="F. M." surname="Ramos" fullname="F. M. Ramos">
      <organization></organization>
    </author>
    <author initials="P. E." surname="Verissimo" fullname="P. E. Verissimo">
      <organization></organization>
    </author>
    <author initials="C. E." surname="Rothenberg" fullname="C. E. Rothenberg">
      <organization></organization>
    </author>
    <author initials="S." surname="Azodolmolky" fullname="S. Azodolmolky">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="S. Uhlig">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76</annotation></reference>
<reference anchor="XAI" >
  <front>
    <title>Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models</title>
    <author initials="W." surname="Samek" fullname="Wojciech Samek">
      <organization></organization>
    </author>
    <author initials="T." surname="Wiegand" fullname="Thomas Wiegand">
      <organization></organization>
    </author>
    <author initials="K.-R." surname="Müller" fullname="Klaus-Robert Müller">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>arXiv preprint arXiv:1708.08296</annotation></reference>
<reference anchor="Zil20" >
  <front>
    <title>Interpreting Deep Learning-Based Networking Systems</title>
    <author initials="Z." surname="Meng" fullname="Zili Meng">
      <organization></organization>
    </author>
    <author initials="M." surname="Wang" fullname="Minhu Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Bai" fullname="Jiasong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Xu" fullname="Mingwei Xu">
      <organization></organization>
    </author>
    <author initials="H." surname="Mao" fullname="Hongzi Mao">
      <organization></organization>
    </author>
    <author initials="H." surname="Hu" fullname="Hongxin Hu">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Puj21" >
  <front>
    <title>NetXplain: Real-time explainability of Graph Neural Networks applied to Computer Networks</title>
    <author initials="D." surname="Pujol-Perich" fullname="David Pujol-Perich">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="José Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="S." surname="Xiao" fullname="Shihan Xiao">
      <organization></organization>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabello" fullname="Albert Cabello">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="Pere Barlet-Ros">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>MLSys workshop on Graph Neural Networks and Systems (GNNSys)</annotation></reference>
<reference anchor="Li19" >
  <front>
    <title>A Framework for Qualitative Communications Using Big Packet Protocol</title>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization></organization>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization></organization>
    </author>
    <author initials="H." surname="Yousefi" fullname="Hamed Yousefi">
      <organization></organization>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization></organization>
    </author>
    <author initials="L." surname="Dong" fullname="Lijun Dong">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck." fullname="Filip De Turck.">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM SIGCOMM Workshop on Networking for Emerging Applications and Technologies (NEAT)</annotation></reference>
<reference anchor="Hir15" >
  <front>
    <title>Crowdsourced network measurements: Benefits and best practices</title>
    <author initials="M." surname="Hirth" fullname="Matthias Hirth">
      <organization></organization>
    </author>
    <author initials="T." surname="Hossfeld" fullname="Tobias Hossfeld">
      <organization></organization>
    </author>
    <author initials="M." surname="Mellia" fullname="Marco Mellia">
      <organization></organization>
    </author>
    <author initials="C." surname="Schwartz" fullname="Christian Schwartz">
      <organization></organization>
    </author>
    <author initials="F." surname="Lehrieder" fullname="Frank Lehrieder">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Computer Networks. 90</annotation></reference>
<reference anchor="Bri19" >
  <front>
    <title>Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic</title>
    <author initials="P.-O." surname="Brissaud" fullname="Pierre-Olivier Brissaud">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
      <organization></organization>
    </author>
    <author initials="T." surname="Cholez" fullname="Thibault Cholez">
      <organization></organization>
    </author>
    <author initials="O." surname="Bettan" fullname="Olivier Bettan">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 16 (3)</annotation></reference>
<reference anchor="Hoo18" >
  <front>
    <title>Updated Taxonomy for the Network and Service Management Research Field</title>
    <author initials="J. V. D." surname="Hooft" fullname="Jeroen Van Der Hooft">
      <organization></organization>
    </author>
    <author initials="M." surname="Claeys" fullname="Maxim Claeys">
      <organization></organization>
    </author>
    <author initials="N." surname="Bouten" fullname="Niels Bouten">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
      <organization></organization>
    </author>
    <author initials="A. P. B." surname="Stiller" fullname="Aiko Pras, Burkhard Stiller">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="Marinos Charalambides">
      <organization></organization>
    </author>
    <author initials="R." surname="Badonnel" fullname="Rémi Badonnel">
      <organization></organization>
    </author>
    <author initials="J." surname="Serrat" fullname="Joan Serrat">
      <organization></organization>
    </author>
    <author initials="C. R. P. D." surname="Santos" fullname="Carlos Raniery Paula Dos Santos">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck" fullname="Filip De Turck">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Network System Managemen (JNSM) 26, 790–808</annotation></reference>
<reference anchor="Bou18" >
  <front>
    <title>A comprehensive survey on machine learning for networking: evolution, applications and research opportunities</title>
    <author initials="R." surname="Boutaba" fullname="Raouf Boutaba">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Salahuddin" fullname="Mohammad A. Salahuddin">
      <organization></organization>
    </author>
    <author initials="N." surname="Limam" fullname="Noura Limam">
      <organization></organization>
    </author>
    <author initials="S." surname="Ayoubi" fullname="Sara Ayoubi">
      <organization></organization>
    </author>
    <author initials="N." surname="Shahriar" fullname="Nashid Shahriar">
      <organization></organization>
    </author>
    <author initials="F." surname="Estrada-Solano" fullname="Felipe Estrada-Solano">
      <organization></organization>
    </author>
    <author initials="O. M." surname="Caicedo" fullname="Oscar M. Caicedo">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Internet Services and Applications 9, 16</annotation></reference>
<reference anchor="Kaf19" >
  <front>
    <title>Automation of 5G Network Slice Control Functions with Machine Learning</title>
    <author initials="V. P." surname="Kafle" fullname="V. P. Kafle">
      <organization></organization>
    </author>
    <author initials="P." surname="Martinez-Julia" fullname="P. Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="T." surname="Miyazawa" fullname="T. Miyazawa">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Communications Standards Magazine, vol. 3, no. 3, pp. 54-62</annotation></reference>
<reference anchor="Yan20" >
  <front>
    <title>Artificial-Intelligence-Enabled Intelligent 6G Networks</title>
    <author initials="H." surname="Yang" fullname="H. Yang">
      <organization></organization>
    </author>
    <author initials="A." surname="Alphones" fullname="A. Alphones">
      <organization></organization>
    </author>
    <author initials="Z." surname="Xiong" fullname="Z. Xiong">
      <organization></organization>
    </author>
    <author initials="D." surname="Niyato" fullname="D. Niyato">
      <organization></organization>
    </author>
    <author initials="J." surname="Zhao" fullname="J. Zhao">
      <organization></organization>
    </author>
    <author initials="K." surname="Wu," fullname="K. Wu,">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE Network, vol. 34, no. 6, pp. 272-280</annotation></reference>
<reference anchor="Lop20" >
  <front>
    <title>Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches</title>
    <author initials="J." surname="López" fullname="J. López">
      <organization></organization>
    </author>
    <author initials="M." surname="Labonne" fullname="M. Labonne">
      <organization></organization>
    </author>
    <author initials="C." surname="Poletti" fullname="C. Poletti">
      <organization></organization>
    </author>
    <author initials="D." surname="Belabed" fullname="D. Belabed">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Symposium on Network Computing and Applications (NCA)</annotation></reference>
<reference anchor="Sen04" >
  <front>
    <title>Accurate, scalable in-network identification of p2p traffic using application signatures</title>
    <author initials="S." surname="Sen" fullname="Subhabrata Sen">
      <organization></organization>
    </author>
    <author initials="O." surname="Spatscheck" fullname="Oliver Spatscheck">
      <organization></organization>
    </author>
    <author initials="D." surname="Wang" fullname="Dongmei Wang">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
<annotation>ACM International conference on World Wide Web (WWW)</annotation></reference>
<reference anchor="Rin17" >
  <front>
    <title>IP2Vec: Learning Similarities Between IP Addresses</title>
    <author initials="M." surname="Ring" fullname="M. Ring">
      <organization></organization>
    </author>
    <author initials="A." surname="Dallmann" fullname="A. Dallmann">
      <organization></organization>
    </author>
    <author initials="D." surname="Landes" fullname="D. Landes">
      <organization></organization>
    </author>
    <author initials="A." surname="Hotho" fullname="A. Hotho">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>IEEE International Conference on Data Mining Workshops (ICDMW)</annotation></reference>
<reference anchor="Evr19" >
  <front>
    <title>port2dist: Semantic Port Distances for Network Analytics</title>
    <author initials="L." surname="Evrard" fullname="Laurent Evrard">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="J.-N." surname="Colin" fullname="Jean-Noël Colin">
      <organization></organization>
    </author>
    <author initials="F." surname="Beck" fullname="Frédéric Beck">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</annotation></reference>
<reference anchor="Sol20" >
  <front>
    <title>A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks</title>
    <author initials="H. M." surname="Soliman" fullname="Hazem M. Soliman">
      <organization></organization>
    </author>
    <author initials="G." surname="Salmon" fullname="Geoff Salmon">
      <organization></organization>
    </author>
    <author initials="D." surname="Sovilij" fullname="Dusan Sovilij">
      <organization></organization>
    </author>
    <author initials="M." surname="Rao" fullname="Mohan Rao">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Conference on Cloud Networking (CloudNet)</annotation></reference>
<reference anchor="Sco11" >
  <front>
    <title>On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses</title>
    <author initials="S. E." surname="Coull" fullname="Scott E. Coull">
      <organization></organization>
    </author>
    <author initials="F." surname="Monrose" fullname="Fabian Monrose">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<annotation>NDSS</annotation></reference>
<reference anchor="Xie18" >
  <front>
    <title>A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges</title>
    <author initials="J." surname="Xie" fullname="Junfeng Xie">
      <organization></organization>
    </author>
    <author initials="F. R." surname="Yu" fullname="F. Richard Yu">
      <organization></organization>
    </author>
    <author initials="T." surname="Huang" fullname="Tao Huang">
      <organization></organization>
    </author>
    <author initials="R." surname="Xie" fullname="Renchao Xie">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jiang Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Wang" fullname="Chenmeng Wang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Yunjie Liu">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials</annotation></reference>
<reference anchor="Yu14" >
  <front>
    <title>Distributed and collaborative traffic monitoring in software defined networks</title>
    <author initials="Y." surname="Yu" fullname="Ye Yu">
      <organization></organization>
    </author>
    <author initials="C." surname="Qian" fullname="Chen Qian">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Hot topics in software defined networking</annotation></reference>
<reference anchor="Dij19" >
  <front>
    <title>A Survey of Network Traffic Anonymisation Techniques and Implementations</title>
    <author initials="N. V." surname="Dijkhuizen" fullname="Niels Van Dijkhuizen">
      <organization></organization>
    </author>
    <author initials="J. V. D." surname="Ham" fullname="Jeroen Van Der Ham">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Comput. Surv. 51, 3, Article 52</annotation></reference>
<reference anchor="Hui22" >
  <front>
    <title>Knowledge Enhanced GAN for IoT Traffic Generation</title>
    <author initials="S." surname="Hui" fullname="Shuodi Hui">
      <organization></organization>
    </author>
    <author initials="H." surname="Wang" fullname="Huandong Wang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Wang" fullname="Zhenhua Wang">
      <organization></organization>
    </author>
    <author initials="X." surname="Yang" fullname="Xinghao Yang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhongjin Liu">
      <organization></organization>
    </author>
    <author initials="D." surname="Jin" fullname="Depeng Jin">
      <organization></organization>
    </author>
    <author initials="Y." surname="Li" fullname="Yong Li">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>ACM Web Conference 2022 (WWW)</annotation></reference>


    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document is the result of a collective work. Authors of this document are the main contributors and the editors but contributions have been also received from the following people we acknowledge: Laurent Ciavaglia, Felipe Alencar Lopes, Abdelkader Lahamdi, Albert Cabellos, José Suárez-Varela, Marinos Charalambides, Ramin Sadre, Pedro Martinez-Julia and Flavio Esposito</t>

<t>This document is also partially supported by project AI@EDGE, funded from the European Union's Horizon 2020 H2020-ICT-52 call for projects, under grant agreement no. 101015922.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

