<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
<!ENTITY RFC8986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC9315 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9315.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY I-D.irtf-nmrg-network-digital-twin-arch SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.irtf-nmrg-network-digital-twin-arch.xml">
]>


<rfc ipr="trust200902" docName="draft-irtf-nmrg-ai-challenges-01" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Coupling AI and network management">Research Challenges in Coupling Artificial Intelligence and Network Management</title>

    <author fullname="Jérôme François">
      <organization>University of Luxembourg and Inria</organization>
      <address>
        <postal>
          <street>6 Rue Richard Coudenhove-Kalergi</street>
          <city>Luxembourg</city>
          <country>Luxembourg</country>
        </postal>
        <email>jerome.francois@uni.lu</email>
      </address>
    </author>
    <author fullname="Alexander Clemm">
      <organization>Futurewei Technologies, Inc.</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <author fullname="Dimitri Papadimitriou">
      <organization>3NLab Belgium Reseach Center</organization>
      <address>
        <postal>
          <city>Leuven</city>
          <country>Belgium</country>
        </postal>
        <email>papadimitriou.dimitri.be@gmail.com</email>
      </address>
    </author>
    <author fullname="Stenio Fernandes">
      <organization>Central Bank of Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>stenio.fernandes@ieee.org</email>
      </address>
    </author>
    <author fullname="Stefan Schneider">
      <organization>Digital Railway (DSD) at Deutsche Bahn</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>stefanbschneider@outlook.com</email>
      </address>
    </author>

    <date year="2023" month="July" day="10"/>

    
    <workgroup>Internet Research Task Force</workgroup>
    <keyword>network management</keyword> <keyword>artificial intelligence</keyword> <keyword>machine learning</keyword>

    <abstract>


<t>This document is intended to introduce the challenges to overcome when Network Management (NM) problems may require to couple with Artificial Intelligence (AI) solutions. On the one hand, there are many difficult problems in NM that to this date have no good solutions, or where any solutions come with significant limitations and constraints. Artificial Intelligence may help produce novel solutions to those problems. On the other hand, for several reasons (computational costs of AI solutions, privacy of data), distribution of AI tasks became primordial. It is thus also expected that network are operated efficiently to support those tasks.</t>

<t>To identify the right set of challenges, the document defines a method based on the evolution and nature of NM problems. This will be done in parallel with advances and the nature of existing solutions in AI in order to highlight where AI and NM have been already coupled together or could benefit from a higher integration. So, the method aims at evaluating the gap between NM problems and AI solutions. Challenges are derived accordingly, assuming solving these challenges will help to reduce the gap between NM and AI.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>The functional scope of Network Management (NM) is very large, ranging from monitoring to accounting, from network provisioning to service diagnostics, from usage accounting to security. The taxonomy defined in <xref target="Hoo18"/> extends the traditional Fault, Configuration, Accounting, Performance, Security (FCAPS) domains by considering additional functional areas but above all by promoting additional views. For instance, network management approaches can be classified according to the technologies, methods or paradigms they will rely on. Methods include common approaches as for example mathematical optimization or queuing theory but also techniques which have been widely applied in last decades like game theory, data analysis, data mining and machine learning. In management paradigms, autonomic and cognitive management are listed. As highlighted by this taxonomy, the definition of automated and more intelligent techniques have been promoted to support efficient network management operations. Research in NM and more generally in networking has been very active in the area of applied ML <xref target="Bou18"/>.</t>

<t>However, for maintaining network operational in pre-defined safety bounds, NM still heavily relies on established procedures. Even after several cycles of adding automation, those procedures are still mostly fixed and set offline in the sense that the exact control loop and all possible scenarios are defined in advance. They are so mostly deterministic by nature or or at least with sufficient safety margin. Obviously, there have been a lot of propositions to make network smarter or intelligent with the use of Machine Learning (ML) but without large adoption for running real networks because it changes the paradigms towards stochastic methods.</t>

<t>ML includes regression analysis, statistical learning (SVM and variants), deep learning (ANN and variants), reinforcement learning, etc. It is a sub-area of Artificial Intelligence (AI) that concentrates the focus nowadays but AI encompasses other areas including knowledge representation, inductive logic programming, inference rule engine or by extension the techniques that allow to observe and perform actions on a system.</t>

<t>It is thus legitimate to question if ML or AI in general could be helpful for NM in regards to practical deployment. This question is actually tight with the problems the NM aims to address. Independently of NM, ML-based solutions were introduced to solve one type of problems in an approximate way which are very complex in nature, i.e. finding an optimal solution is not possible (in polynomial time). This is the case for NP-hard problems. In those cases, solutions typically rely on heuristics that may not yield optimal results, or algorithms that run into issues with scalability and the ability to produce timely results due to the exponential search space. In NM, those problems exist, for instance allocation of resources in case of Service Function Chaining (SFC) or network slicing  among others are recent examples which have gained interest in our community with SDN. Many propositions consist of modeling the optimization problem as an MILP (Mixed-Integer Linear Programming) and solve it by means of heuristics to reach a satisfactory tradeoff between solution quality (gap to optimality) - computation time and model size/dimensionality. Hence, ML is recognized to be well adapted to progress on this type of problem <xref target="Kaf19"/>.</t>

<t>However, all computational problems of NM are not NP-hard. Due to real-time constraints, some involve very short control loops that require both rapid decisions and the ability to rapidly adapt to new situations and different contexts. So, even in that case, time is critical and approximate solutions are usually more acceptable.  Again, it is where AI can be beneficial. Actually, expert systems are AI systems <xref target="Ste92"/> but this kind of systems are not designed to scale with the volume and heterogeneity of data we can collect in a network today for which the expert system is built thanks to numerous inference rules. In contrast, ML is more efficient to automatically learn abstract representations of the rules, which can be eventually updated.</t>

<t>On one hand another type of common problem in NM is classification. For instance, classifying network flows is helpful for security purposes to detect attack flows, to differentiate QoS among the different flows (e.g. real-time streams which need to be prioritized), etc. On the other hand, ML-based classification algorithms have been widely used in literature with high quality results when properly applied leading to their applications in commercial products. There are many algorithms including decision tress, support vector machine or (deep) neural networks which have been to be proven efficient in many areas and notably for image and natural language processing.</t>

<t>Finally, many problems also still rely on humans in the loop, from support issues such as dealing with trouble tickets to planning activities for the roll-out of new services. This creates operational bottlenecks and is often expensive and error prone. This kind of tasks could be either automated or guided by an AI system to avoid inividual human bias. It is worth noting that Ml relying training data generated by human can also suffer indirectly from a collective human bias. Indeed, the balance between human resources and the complexity of problems to deal with is actually very imbalanced and this will continue to increase due to the size of networks, heterogeneity of devices, services, etc. Hence, human-based procedures tend to be simple in comparison to the problems to solve or time-consuming. Notable examples are in security where the network operator should defend against potential unknown threat. As a result, services might be largely affected during hours</t>

<t>Actually, all the problems aforementioned are exacerbated by the situation of more complex networks to operate on many dimensions (users, devices, services, connections, etc.). Therefore, AI is expected to enable or simplify the solving of those problems in real networks in the near future <xref target="czb20"/> <xref target="Yan20"/> because those would require reaching unprecedented levels of performance in terms of throughput, latency, mobility, security, etc.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="acronyms"><name>Acronyms</name>

<t><list style="symbols">
  <t>AI: Artificial Intelligence</t>
  <t>FL: Federated Learning</t>
  <t>GAN: Generative Adversarial Network</t>
  <t>GNN: Graph Neural Network</t>
  <t>IBN: Intent-Based Networking</t>
  <t>LSTM: Long Short-Term Memory</t>
  <t>ML: Machine Learning</t>
  <t>MILP: Mixed-Integer Linear Programming</t>
  <t>MLP: Multilayer Perceptron</t>
  <t>NM: Network Management</t>
  <t>RL: Reinforcement Learning</t>
  <t>SFC: Service Function Chaining</t>
  <t>SVM: Support-Vector Machine</t>
  <t>VNF: Virtual Network Function</t>
</list></t>

</section>
<section anchor="pbNM"><name>Difficult problems in network management</name>

<t>As mentioned in introduction, problems to be tackled in NM tend to be complex and exhibit characteristics that make them candidates for solutions that involve AI techniques:</t>

<t><list style="symbols">
  <t>C1: A very large solution space, combinatorially exploding with the size of the problem domain. This makes it impractical to explore and test every solution (again NP-hard problems here)</t>
  <t>C2: Uncertainty and unpredictability along multiple dimensions, including the context in which the solution is applied, behavior of users and traffic, lack of visibility into network state, and more.  In addition, many networks do not exist in isolation but are subjected to myriads of interdependencies, some outside their control.  Accordingly, there are many external parameters that affect the efficiency of the solution to a problem and that cannot be known in advance: user activity, interconnected networks, etc.</t>
  <t>C3: The need to provide answers (i.e. compute solutions, deliver verdicts, make decisions)  in constrained or deterministic time. In many cases, context changes dynamically and decisions need to be made quickly to be of use.</t>
  <t>C4: Data-dependent solutions. To solve a problem accurately, it can be necessary to rely on large volumes of data, having to deal with issues that range from data heterogeneity to incomplete data to general challenges of dealing with high data velocity.</t>
  <t>C5: Need to be integrated with existing automatic and human processes.</t>
  <t>C6: Solutions <bcp14>MUST</bcp14> be cost-effective as resources (bandwidth, CPU, human, etc.) can be limited, notably when part of processing is distributed at the network edge or within the network.</t>
</list></t>

<t>Many decision/optimization problems are affected by multiple criteria. Below is a non-exhaustive list of complex NM problems for which AI and/or non-AI-based approaches have been proposed:</t>

<t><list style="symbols">
  <t>Computation of optimal paths: Packet forwarding is not always based on traditional routing protocols with least cost routing, but on computation of paths that are optimized for certain criteria - for example, to meet certain level objectives, to result in greater resilience, to balance utilization, to optimize energy usage, etc.  Many of those solutions can be found in SDN, where a controller or path computation element computes paths that are subsequently provisioned across the network.  However, such solutions generally do not scale to millions of paths (C1), and cannot be recomputed in sub-second time scales (C3) to take into account dynamically changing network conditions (C2). To compute those paths,  operations research techniques have been extensively used in literature along with AI methods as shown in <xref target="Lop20"/>. As such, this problem can be considered as close to big data problems with some of the different Vs: volume, velocity, variety, value…</t>
  <t>Classification of network traffic: Without loss of generality a common objective of network monitoring for operators is to know the type of traffic going through their networks (web, streaming, gaming, VoIP). By nature, this task analyzes data (C4) which can vary over time (C2) except in very particular scenarios like industrial isolated networks. However, the output of the classification technique is time-constrained only in specific cases where fast decisions <bcp14>MUST</bcp14> be made, for example to reroute traffic. Simple identification based on IANA-assigned TCP/UDP ports numbers were sufficient in the past. However, with applications using dynamic port numbers, signature techniques can be used to match packet payload <xref target="Sen04"/>. To handle applications now encapsulated in encrypted web or VPN traffic, machine-learning has been leveraged <xref target="Bri19"/>.</t>
  <t>Network diagnostics: Disruptions of networking services can have many causes and thus can rely on analyzing many sources of data (C4). Identifying the root cause can be of high importance when what is causing the disruption is not properly understood, so that repair actions can address the root cause versus just working around the symptoms. Such repair actions may involve human actions (C5). Further complicating the matter are scenarios in which disruptions are not “hard” but involve only a degradation of service level, and where disruptions are intermittent, not reproducible, and hard to predict.  Artificial intelligence techniques can offer promising solutions.</t>
  <t>Intent-Based Networking (IBN): Roughly speaking, IBN refers to the ability to manage  networks by articulating desired outcomes without the need to specify a course of actions to achieve those outcomes <xref target="RFC9315"/>.  The ability to determine such courses of actions, in particular in scenarios with multiple interdependencies, conflicting goals, large scale, and highly complex and dynamic environments is a huge and largely unsolved challenge (C1, C2, C3).  Artificial Intelligence techniques can be of help here in multiple ways, from accurately classifying dynamic context to determine matching actions to reframing the expression of intent as a game that can be played (and won) using artificially intelligent techniques.</t>
  <t>VNF (Virtual Network Function) placement and SFC design: VNFs need to be placed on physical resources and Service Function Chains designed in an optimized manner to avoid use of networking resources and minimize energy usage (C1,C6).</t>
  <t>Smart admission control to avoid congestion and oversubscription of network resources: Admission control needs to be set up and performed in ways that ensure service levels are optimized in a manner that is fair and aligned with application needs, congestion avoided or its effects mitigated (C6).</t>
</list></t>

</section>
<section anchor="hlchallenges"><name>High-level challenges in adopting AI in NM</name>

<t>As shown in the previous section, AI techniques are good candidates for the difficult NM problems. There have been many propositions but still most of them remain at the level of prototypes or have been only evaluated with simulation and/or emulation. It is thus questionable why our community investigates much research in this direction but has not adopted those solutions to operate real networks. There are different obstacles.</t>

<t>First, AI advances have been historically driven by the image/video, natural language and signal processing communities as well as robotics for many decades. As a result, the most impressive applications are in this area including recently the generalization of home assistants or the large progress in autonomous vehicles. However, the network experts have been focused on building the Internet, especially building protocols to make the world interconnected and with always better performance and services. This trend continues today with the 5G networks in deployment and beyond 5G under definition. Hence, AI was not the primary focus even if increased network automation calls for AI and ML solutions. However, AI is now considered as a core enabler for the future 6G networks which are sometimes qualified as AI-native networks.</t>

<t>While we can see major contributions in AI-based solutions for networking over more than two decades, only a fraction of the community was concerned by AI at that time. Progress as a whole, from a community perspective, was so limited and compensated by relying on the development of AI in the communities as mentioned earlier. Even if our problems share some commonalities, for example on the volume of data to analyze, there are many differences: data types are completely different, networks are by nature heavily distributed, etc. If problems are different, they <bcp14>SHOULD</bcp14> require distinct solutions. In a nutshell, network-tailored AI was overlooked and leads to a first set of challenges described in <xref target="AItechniques"></xref>.</t>

<t>Second, many AI techniques require enough representative data to be applied independently if the algorithms are supervised or unsupervised. NM has produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI techniques and lead so to a mismatch. For example, (deep) learning techniques mostly rely on having vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc)  but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>.</t>

<t>An additional challenge concerns the fact that AI techniques that involve analysis of networking data can also lead to the extraction of sensitive and personally-identifiable information, raising potential privacy concerns and concerns regarding the potential for abuse. For example, AI techniques used to analyze encrypted network traffic with the legitimate goal to protect the network from intrusions and illegitimate attack traffic could be used to infer information about network usage and interactions of network users.  Intelligent data analysis and the need to maintain privacy are in many ways that are contradictory in nature, resulting in an arms race.  Similarly, training ML solutions on real network data is in many cases preferable over using less-realisitic synthetic data sets. However, network data may contain private or sensitive data, the sharing of which may be problematic from a privacy standpoint and even result in legal exposure. The challenge concerns thus how to allow AI techniques to perform legitimate network management functions and provide network owners with operational insights into what is going on in their networks, while prohibiting their potential for abuse for other (illegitimate) purposes.  Challenges related to network data as input to ML algorithms is detailed in <xref target="netData"></xref>.</t>

<t>Finally, networks are already operated thanks to (semi-)automated procedures involving a large number of resources which are synchronized with management or orchestration tools. Adding AI supposes it would be seamlessly integrated within pre-existing processes. Although the goal of these procedures might be solely to provide relevant information to operators through alerts or dashboards in case of monitoring applications, many other applications rely on those procedures to trigger actions on the different resources, which can be local or remote. The use of AI or any other approaches to derive NM actions adds further constraint on them, especially regarding time constraints and synchronization to maintain a coherence over a distributed system.</t>

<t>A related challenge concerns the fact that to be deployed, a solution needs to not only provide a technical solution but to also be acceptable to users - in this case, network administrators and operators.  One challenge with automated solutions concerns that users want to feel “in control” and able to understand what is going on, even more so if ultimately those users are the ones who are held accountable for whether or not the network is running smoothly.  Those same concerns extend to artificially intelligent systems for obvious reasons. To mitigate those concerns, aspects such as the ability to explain actions that are taken - or about to be taken - by AI systems become important.</t>

<t>Beyond reasons of making users more comfortable, there are potentially also legal or regulatory ramifications to ensure that actions taken are properly understood.  For example,agencies such as the FCC may impose fines on network operators when services such as E911 experience outages, as there is a public interest in ensuring highest availability for such services.  In investigating causes for such outages, the underlying behavior of systems has to be properly understood, and even more so the reasons for actions that fall under the realm of network operations. All these aspects about integration and acceptability of the integration of AI in NM processes is detailed in <xref target="acceptability"></xref>.</t>

</section>
<section anchor="AItechniques"><name>AI techniques and network management</name>

<section anchor="problem-type-and-mapping"><name>Problem type and mapping</name>

<t>In the last few years, an increasing number of different AI techniques have been proposed and applied successfully to a growing variety of different problems in different domains, including network management <xref target="Mus18"/>, <xref target="Xie18"/>. Some of the more recently proposed AI approaches are clearly advancements of older approaches, which they supersede. Many other AI approaches are not predecessors or successors but simply complementary because they are useful for different problems or optimize different metrics. In fact, different AI approaches are useful for different kinds of problem inputs (e.g., tabular data vs. text vs. images vs. time series) and also for different kinds of desired outputs (e.g., a predicted value, a classification, or an action). Similarly, there may be trade-offs between multiple approaches that take the same kind of inputs and desired outputs (e.g., in terms of desired objective, computation complexity, constraints).</t>

<t>Overall, it is a key challenge of using AI for network management to properly understand and map which kind of problems with which inputs, outputs, and objectives are best solved with which kind of AI (or non-AI) approaches. Given the wealth of existing and newly released AI approaches, this is far from a trivial task.</t>

<section anchor="sub-challenge-suitable-approach-for-given-input"><name>Sub-challenge: Suitable Approach for Given Input</name>

<t>Different problems in network management come with widely different problem parameters. For example, security-related problems may have large amounts of text or encrypted data as input, whereas forecasting problems have historical time series data as input. They also vary in the amount of available data.</t>

<t>Both the type and amount of data influences which AI techniques could be useful. On one hand, in scenarios with little data, classical machine learning techniques (e.g., SVM, tree-based approaches, etc.) are often sufficient and even superior to neural networks. On the other hand, neural networks have the advantage of learning complex models from large amounts of data without requiring feature engineering. Here, different neural network architectures are useful for different kinds of problems. The traditional and simplest architecture are (fully connected) multi-layer perceptrons (MLPs), which are useful for structured, tabular data. For images, videos, or other high-dimensional data with correlation between “close” features, convolutional neural networks (CNNs) are useful. Recurrent neural networks (RNNs), especially LSTMs, and attention-based neural networks (transformers) are great for sequential data like time series or text. Finally, Graph Neural Networks (GNNs) can incorporate and consider the graph-structured input, which is very useful in network management, e.g., to represent the network topology.</t>

<t>The aforementioned rough guidelines can help identify a suitable AI approach and neural network architecture. Still, best results are often only achieved with sophisticated combinations of different approaches. For example, multiple elements can be combined into one architecture, e.g., with both CNNs and LSTMs, and multiple separate AI approaches can be used as an ensemble to combine their strengths. Here, simplifying the mapping from problem type and input to suitable AI approaches and architectures is clearly an open challenge. Future work <bcp14>SHOULD</bcp14> address this challenge by providing both clearer guidelines and striving for more general AI approaches that can easily be applied to a large variety of different problem inputs.</t>

</section>
<section anchor="sub-challenge-suitable-approach-for-desired-output"><name>Sub-challenge: Suitable Approach for Desired Output</name>

<t>Similar to the challenge of identifying suitable AI approaches for a given problem input, the desired output for a given problem also affects which AI approach <bcp14>SHOULD</bcp14> be chosen. Here, the format of the desired output (single value, class, action, etc.), the frequency of these outputs and their meaning <bcp14>SHOULD</bcp14> be considered.</t>

<t>Again, there are rough guidelines for identifying a group of suitable AI approaches. For example, if a single value is required (e.g., the amount of resources to allocate to a service instance), then typical supervised regression approaches <bcp14>SHOULD</bcp14> be used. If classification (e.g., of malware or another security issue <xref target="Abd10"/>) instead of a value is desired, supervised classification methods <bcp14>SHOULD</bcp14> be used. Alternatively, unsupervised machine learning can help to cluster given data into separate groups, which can be useful to analyze networking data, e.g., for better understanding different types of traffic or user segments.</t>

<t>In addition to these classical supervised and unsupervised methods, reinforcement learning approaches allow active, sequential decisions rather than simple predictions or classifications. This is often useful in network management, e.g., to actively control service scaling and placement as well as flow scheduling and routing. Reinforcement learning agents autonomously select suitable actions in a given environment and are especially useful for self-learning network management. In addition to model-free reinforcement learning, model-based planning approaches (e.g., Monte Carlo Tree Search (MCTS)) also allow choosing suitable actions in a given environment but require full knowledge of the environment dynamics. In contrast, model-free reinforcement learning is ideal for scenarios with unknown environment dynamics, which is often the case in network management.</t>

<t>Similar to the previous sub-challenge, these are just rough guidelines that can help to select a suitable group of AI approaches. Identifying the most suitable approach within the group, e.g., the best out of the many existing reinforcement learning approaches, is still challenging. And, as before, different approaches could be combined to enable even more effective network management (e.g., heuristics + RL, LSTMs + RL, …). Here, further research <bcp14>MAY</bcp14> simplify the mapping from desired problem output to choosing or designing a suitable AI approach.</t>

</section>
<section anchor="sub-challenge-tailoring-the-ai-approach-to-the-given-problem"><name>Sub-challenge: Tailoring the AI Approach to the Given Problem</name>

<t>After addressing the two aforementioned sub-challenges, one may have selected a useful kind of AI approach for the given input and output of a network management problem. For example, one may select regression and supervised learning to forecast upcoming network traffic. Or select reinforcement learning to continuously control network and service coordination (scaling, placement, etc.). However, even within each of these fields (regression, reinforcement learning, etc.), there are many possible algorithms and hyperparameters to consider. Selecting a suitable algorithm and parametrizing it with the right hyperparameters is crucial to tailor the AI approach to the given network management problem.</t>

<t>For example, there are many different regression techniques (classical linear, polynomial regression, lasso/ridge regression, SVR, regression trees, neural networks, etc.), each with different benefits and drawbacks and each with its own set of hyperparameters. Choosing a suitable technique depends on the amount and structure of the input data as well as on the desired output. It also depends on the available amount of compute resources and compute time until a prediction is required. If resources and time are not a limiting factor, many hyperparameters can be tuned automatically. In practice, however, the design space of choosing algorithms and hyperparameters is often so large that it cannot be effectively tuned automatically but also requires some initial expertise in selecting suitable AI algorithms and hyperparameters.</t>

<t>This sub-challenge holds for all fields of AI: Supervised learning (regression and classification), self-supervised learning, unsupervised learning, and reinforcement learning, each are broad and rapidly growing fields. Selecting suitable algorithms and hyperparameters to tailor AI approaches to the network management problem is both an opportunity and a challenge. Here, future work should further explore these trade-offs and provide clearer guidelines on how to navigate these trade-offs for different network management tasks.</t>

</section>
</section>
<section anchor="performance-of-produced-models"><name>Performance of produced models</name>

<t>From a general point of view, any AI technique will produce results with a certain level of quality. This leads to two inherent questions: (1) what is the definition of the performance in a context of a NM application? (2) How to measure it? and (3) How to ensure/improve the quality of produced results?</t>

<t>Many metrics have been already defined to evaluate the performance of an AI-based techniques in regards to its NM-level objectives. For example, QoS metrics (throughput, latency) can serve to measure the performance of a routing algorithm along with the computational complexity (memory consumption, size of routing tables). The question is to model and measure these two antagonist types of metrics. Number of true/false positives/negatives are the most basic metrics for network attack detection functions. Although the first two questions are thus already answered even if improvement can be done, question (3) refers to the integration of metrics into AI algorithms. Its objective is to obtain the best results which need to be quantified with these metrics. Depending on the type of algorithm, these metrics are either evaluated in an online manner with a feedback loop (for example with reinforcement learning) or in batch to optimize a model based on a particular context (for example described by a dataset for machine learning).</t>

<t>The problem is two-fold. First, the performance can be measured through multiple metrics of different types (numerical or ordinal for example) and some can be constrained by fixed boundaries (like a maximum latency), making their joint use challenging when creating an AI model to resolve a NM problem. Second, the scale metrics differ from each other in terms of importance or impact and can eventually vary on their domains. It can be hard to precisely assess what is a good or bad value (as it might depend on multiple other ones) and it is even more difficult to integrate in an AI technique, especially for learning algorithms to adjust their models based on the performance. Indeed, learning algorithms run through multiple iterations and rely on internal metrics (MAE or (R)MSE for neural network, gini index or entropy for decision trees, distance to an hyperplane for SVMs, etc) which are not strongly correlated to the final metrics of the application. For instance, a decision tree algorithm for classification purposes aims at being able to create branches with a maximum of data from the same classes and so avoid mixing classes. It is done thanks to a criterion like the entropy index but this kind of Index does not assume any difference between mixing class A and B or A and C. Assuming now that from an operational point of view, if A and B are mixed in the predictions is not critical, the algorithm should have preferred to mix and A and B rather than A and C even if in the first case it will produce more errors.</t>

<t>Therefore, the internal functioning of the AI algorithms should be refined, here by defining a particular criterion to replace the entropy as a quality measure when separating two branches. It assumes that the final NM objectives are integrated at this stage.</t>

<t>Another concrete example is traffic predictors which aim at forecasting traffic demands. They only produce an input that is not necessarily simple to be interpreted and used by, e.g., capacity allocation strategies/policies. A traditional traffic prediction that tries to minimize (perfectly symmetric) MAE/MSE treats positive and negative errors in identical ways, hence is agnostic of the diverse meaning (and costs) of under- and over-provisioning. And, such a prediction does not provide any information on, e.g., how to dimension resources/capacity to accommodate the future demand avoiding all underprovisioning (which entails service disruption) while minimizing overprovisioning (i.e., wasting resources). In other words, it forces the operator to guess the overprovisioning by taking (non-informed) safety margins. A more sensible approach here is instead forecasting directly the needed capacity, rather than the traffic <xref target="Beg19"/>.</t>

<t>While the one above is just an example, the high-level challenge is devising forecasting models that minimize the correct objective/loss function for the specific NM task at hand (instead of generic MAE/MSE). In this way, the prediction phase becomes an integral part of the NM, and not just a (limited and hard-to-use) input to it. In ML terms, this maps to solving the loss-metric mismatch in the context of anticipatory NM <xref target="Hua19"/>.</t>

<t>Another issue for statistical learning (from examples/observations) is mainly about extracting an estimator from a finite set of input-output samples drawn from an unknown probability distribution that should be descriptive enough for unseen/new input data. In this context online monitoring and error control of the quality/properties of these point estimators (bias, variance, mean squared error, etc.) is critical for dynamic/uncertain network environments. Similar reasoning/challenge applies for interval estimates, i.e., confidence intervals (frequentist) and credible intervals (Bayesian).</t>

</section>
<section anchor="lightweight-ai"><name>Lightweight AI</name>

<t>Network management and operations often need to be performed under strict time constraints, i.e. at line rate, in particular in the context of autonomic or self-driven networks. Locating NM functions as close as possible where forwarding is achieved is thus an interesting option to avoid additional delays when these operations are performed remotely, for example in a centralized controller. Besides, forwarding devices may offer available resources to supplement or replace edge resources. In case of AI coupled with network management, AI tasks can be offloaded in network devices, or more generally embedded within the network. Obviously, time-critical tasks are the best candidates to be offloaded within the network. Costly learning tasks should be processed in high-end servers but created models can be deployed, configured, modified and tuned in switches.</t>

<t>Recent advances in network programmability ease the programming of specific tasks at data-plane level. P4 <xref target="Bos14"/> is widely used today for many tasks including firewalling <xref target="Dat18"/> or bandwidth management <xref target="Che19"/>. P4 is prone to be agnostic to a specific hardware. Switches actually have particular architectures and the RMT (Reconfigurable Match Table) <xref target="Bos13"/> model is generally accepted to be generic enough to represent limited but essential switch architecture components and functionalities. P4 is inspired by this architecture. The RMT model allows reconfiguring match-action tables where actions can be usual ones (rewrite some headers, forward, drop...). Actions are thus applied on the packets when they are forwarded. Actions can also be more complex programs with some safeguards: no loop, resistivity… The impact on the program development is huge. For example, real number operations are not available by default while they are primordial in many AI algorithms.</t>

<t>In a nutshell, the first challenge to overcome of embedding AI in a network is the capacity of the hardware to support AI operations (architectural limitation). Considering software equipment such as a virtual switch simplifies the problem but does not totally resolve it as, even in that case, strong line-rate requirement limits the type of programs to be executed. For example, BPF (Berkeley Packet Filter) <xref target="Mcc93"/> programs provides a higher control on packet processing in OVS <xref target="Cha18"/> but still have some limitations, as the execution time of these programs are bounded by nature to ensure their termination, an essential requirement assuming the run-to-completion model which permits high throughput.</t>

<t>The second challenge (resource limitation) of network-embedded AI in the network is to allocate enough resources for AI tasks with a limited impact on other tasks of network devices such as forwarding, monitoring, filtering… Approximation and/or optimization of AI tasks are potential directions to help in this area. For instance, many network monitoring proposals rely on sketches and with a proposed  well-tuned implementation for data-plane <xref target="Liu16"/><xref target="Yan18"/>. However, no general optimized AI-programmable abstraction exists to fit all cases and proposals are mostly use-case centric.  Research direction in NM regarding this issue can benefit from propositions in the field of embedded systems that face the same issues. Binarization of neural networks is one example <xref target="Lia18"/>. Besides, distributed processing is a common technique to distribute the load of a single task between multiple entities. AI task decomposition between network elements, edge servers or controllers has been also proposed <xref target="Gup18"/>.</t>

</section>
<section anchor="DistributedAI"><name>Distributed AI</name>

<t>Distributed AI assumes different related tasks and components to be distributed across computational resources which are possibly heterogeneous. For example, with advances in transfer and Federated Learning (FL), models can be learned, partially shared and combined or data can be also shared to either improve a local or global model. By nature, a network and a networked infrastructure is distributed and is thus well adapted to any distributed applications. This is exacerbated with the deployment of fog infrastructure mixing network and computational resources. Hence, network management can directly benefit to the distributed network structure to solve its own particular problems but any other type of AI-based distributed applications also assumes communication technologies to enable interactions between the different entities. This leads to the two sub-challenges described hereafter.</t>

<section anchor="netManFordistributedAI"><name>Network management for efficient distributed AI</name>

<t>Distributed AI relies on exchanging information between different entities and comes with various requirements in terms of volume, frequency, security, etc. This can be  mapped to network requirements such as latency, bandwidth or confidentiality. Therefore, the network needs to provide adequate resources to support the proper execution of the AI distributed application. While this is true for any distributed application, the nature of the problem that is intended to be solved by an AI application and how this would be solved can be considered. For example, with FL, local models can be shared to create a global model. In case of failure of network links or in case of too high latency, some local models might not be appropriately integrated into the global model with a possible impact on AI performance. Depending on the nature of the latter, it might be better to guarantee high performance communications with a few number of nodes or to ensure connectivity between all of them even with lower network performance. Coupling is thus necessary between the network management plane and the distributed AI applications which leads to a set of questions to be addressed about interfaces, data and information models or protocols. While the network can be adapted or eventually adapt itself to the AI distributed applications, AI applications could also adapt themselves to the underlying network conditions. It paves the way to research on methods to support AI application aware-network management or network-aware AI applications or a mix of both.</t>

</section>
<section anchor="distributed-ai-for-network-management"><name>Distributed AI for network management</name>

<t>For network management applications relying on distributed AI, challenges from <xref target="netManFordistributedAI"></xref> are still valid. Furthermore, network management problems also consider network-specific elements like traffic to be analyzed or configuration to be set on distributed network equipments. Co-locating AI processing and these elements (fully or partially) may help to increase performance. For example, precalculation on traffic data can be offloaded on network routers before being further processed in high-end servers in a data-center. Besides, as data is forwarded through multiple routers, decomposition of AI processes along the forward path is possible <xref target="Jos22"/>. In general, distributed AI-based network management decisions could be made at different nodes in the network based on locally available information <xref target="Sch21"/>. Hence, deployment of AI-based solutions for network management can also take into account various network attributes like network topology, routing policies or network device capability. In that case, management of computational and network resources is even more coupled than in <xref target="netManFordistributedAI"></xref> since the network is both part of the AI pipeline resources and the managed object through AI.</t>

<t>A primary application for distributed AI is for management problems that have a local scope.  One example concerns problems that can be addressed at the edge, involving tasks and control loops that monitor and apply local optimizations to the edge in isolation from activities conducted by other instances across the network.   However, distributed AI can involve techniques in which multiple entities collaborate to solve a global problem. Such solutions lend themselves to problems in which centralized solutions are faced with certain foundational challenges such as security, privacy, and trust:   The need to maintain complete state in a centralized solution may not be practical in some cases due to concerns such as privacy and trust among multiple subdomains which may not want to share all of their data even if they would be willing to collaborate on a problem). Other foundational challenges concern issue related to timeliness, in which distributed solutions may have inherent advanges over centralized solutions as they avoid issues related to delays caused by the need to communicate updates globally and across long distances.</t>

</section>
</section>
<section anchor="ai-for-planning-of-actions"><name>AI for planning of actions</name>

<t>Many tasks in network management revolve around the planning of actions with the purpose of optimizing a network and facilitating the delivery of communication services.  For example, Paths need to be planned and set up in ways that minimize wasted network resources (to optimize cost) while facilitating high network utilization (avoiding bottlenecks and the formation of congestion hotspots) and ensuring resiliency (by making sure that backup paths are not congruent with primary paths).  Other examples were mentioned in <xref target="pbNM"></xref>.</t>

<t>The need for planning only increases with the rise of centralized control planes.  The promise of central control is that decisions can be optimized when made with complete knowledge of relevant context, as opposed to distributed control that needs to rely on local decisions being made with incomplete knowledge while incurring higher overhead to replicate relevant state across multiple systems.  However, as the scale of networks and interconnected systems continues to grow, so does the size of the planning task.  Many problems are NP-hard.  As a result, solutions typically need to rely on heuristics and algorithms that often result in suboptimal outcomes and that are challenging to deploy in a scalable manner.</t>

<t>The emergence of Intent-Based Networking emphasizes the need for automated planning even further.  The concept underlying “intent” is that it should allow users (network operators, not end users of communication services) to articulate desired outcomes without the need to specify how to achieve those outcomes. An Intent-Based System is responsible for translating the intent into courses of action that achieve the desired outcomes and that continue to maintain the outcomes over time. How the necessary courses of action are derived and what planning needs to take place is left open but where the real challenge lies.  Solutions that rely on clever algorithms devised by human developers face the same challenges as any other network management tasks.</t>

<t>These properties (problems with a clearly defined need, whose solution is faced with exploding search spaces and that today rely on algorithms and heuristics that in many cases result only suboptimal outcomes and significant limitations in scale) make automated planning of actions an ideal candidate for the application of AI-based solutions.</t>

<t>AI applications in network management in the past have been largely focusing on classification problems. Examples include analysis by Intrusion Protection Systems of traffic flow patterns to detect suspicious traffic, classification of encrypted traffic for improved QoS treatment based on suspected application type, and prediction of performance parameters based on observations.  In addition, AI has been used for troubleshooting and diagnostics, as well as for automated help and customer support systems.  However, AI-based solutions for the automated planning of actions, including the automated identification of courses of action, have to this point not been explored much.</t>

<t>A much-publicized leap in AI has been the development of AlphaGo <xref target="Sil16"/>.  Instead of using AI to merely solve classification problems, AlphaGo has been successful in automatically deriving winning strategy for board games, specifically the game of Go which features a prohibitively large search space that was long thought to put the ability to play Go at a world class level beyond the reach of problems that AI could solve.   Among the remarkable aspects of Alpha Go is that it is able to identify winning strategies completely on its own, without needing those strategies to be taught or learned by observations assuming the system is aware of rules.</t>

<t>The challenge for AI in network management is hence, where is the equivalent of an Alpha Go that can be applied to network management (and networking) problems?  Specifically, better solutions are needed for solutions that automatically derive plans and courses of actions for network optimization and similar NP-hard problems, such as provided today with only limited effectiveness by controllers and management applications.</t>

<t>Also, the evaluation of AI algorithms to derive courses of actions is more complex than more common regression or classification tasks. Actions need to be applied in order to observe the results it leads to. However, contrary to game playing, solutions need to be applied in the real world, where actions have real effects and consequences. Different orientations can be envisioned. First, incremental application of AI decisions with small steps can allow us to carefully observe and detect unexpected effects. This can be complemented with roll-back techniques. Second, formal verification techniques can be leveraged to verify decisions made by AI are maintained within safety bounds. Third, sandbox environments can be used but they <bcp14>SHOULD</bcp14> be representative enough of the real world. After progress in simulation and emulation, recent research advances lead to the definition of digital twins <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/> which implies a tight coupling between a real system and its digital twin to ensure a parallel but synchronized execution. Alternatively, transfer learning techniques in another promising area to be able to capitalize on ML models applicable on a real word system in a more generic sandbox environment. It is actually also an open problem to make the use of AI more acceptable as highlighted in the dedicated section.</t>

</section>
</section>
<section anchor="netData"><name>Network data as input for ML algorithms</name>

<t>Many applications of AI takes as input data. The quality of the outputs of ML-based techniques are highly dependent on the quality and quantity of data used for learning but also on other parameters. For example, as modern network infrastructures move towards higher speed and scale, they aim to support increasingly more demanding services with strict performance guarantees. These often require resource reconfigurations at run time, in response to emerging network events, so that they can ensure reliable delivery at the expected performance level. Timely observation and detection of events is also of paramount importance for security purposes, and can allow faster execution of remedy actions thus leading to reduced service downtime.</t>

<t>Thus, the challenge of data management is multifaceted as detailed in next subsections.</t>

<section anchor="data-for-ai-based-nm-solutions"><name>Data for AI-based NM solutions</name>

<t>Assuming a network management application, the first problem to address is to define the data to be collected which will be appropriate to obtain accurate results. This data selection can require defining problem-specific data or features (feature engineering).</t>

<t>Firstly, NM has already produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI problems and lead to a mismatch. Indeed, machine learning algorithms only work as desired when data to be analyzed respects properties. Many methods rely on vector-based distances which so supposes that the data encoded into the vector respects the underlying distance semantic. Taking the first n bytes of a packet as vectors and computing distances accordingly is possible but does not embed the semantic of the information carried out in the headers. For example, (deep) learning techniques mostly rely on vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc) but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>. Data to handle can be in a schema-free or eventually text-based format. One example could be the automated annotation of management intents provided in an unstructured textual format (policies descriptions, specifications,) to extract from them management entities and operations. For that purpose, suitable annotation models need to be built using existing NER (Named Entity Recognition) techniques usually applied for NLP. However, this <bcp14>SHALL</bcp14> be carefully crafted or specialized for network management (intent) language which indirectly bounces back to the challenges of AI techniques for NM specified earlier.</t>

<t>Secondly, The behavior of any network is not just derived from the events that can be directly observed, such as network traffic overload, but also from events occurring outside the environment of the network. The information provided by the detectors of such kinds of events, e.g. a natural incident (earthquake, storm), can be used to determine the adaptation of the network to avoid potential problems derived from such events. Those can be provided by BigData sources as well as sensors of many kinds. The AI challenge related to this task is to process large amounts of data and associate it with the effects that those events have on the network. It is hard to determine the static and dynamic relation between the data provided by external sources and the specific implications it has in networks. For instance, the effect of a “flash crowd” detected in an external source depends on the relation of a particular network to such an event. This can be addressed by AI and its particular application to network management. The objective is to complement a control-loop, as shown in <xref target="Mar18"/>, by including the specific AI engines into the decision components as well as the processes that close the loop, so the AI engine can receive feedback from the network in order to improve its own behavior. Similar challenges are addressed in other domains, image processing and computer vision, by using artifacts for anticipating movements in object location and identification.</t>

</section>
<section anchor="data-collection"><name>Data collection</name>

<t>Once defined, the second problem to address is the collection of data. Monitoring frameworks have been developed for many years such as IPFIX <xref target="RFC7011"/> and more recently with SDN-based monitoring solutions <xref target="Yu14"/><xref target="Ngu20"/>. However, going towards more AI for actions in network management supposes also to retrieve more than traffic related information. Actually, configuration information such as topologies, routing tables or security policies have been proven to be relevant in specific scenarios. As a result, many different technologies can be used to retrieve meaningful data. To support improved QoE, monitoring of the application layer is helpful but far from being easy with the heterogeneity of end-user applications and the wide use of encrypted channels. Monitoring techniques need to be reinvented through the definition of new techniques to extract knowledge from raw measurement <xref target="Bri19"/> or by involving end-users with crowd-sourcing <xref target="Hir15"/> and distributed monitoring. Also, the data-mesh concept proposes to classify data into three categories: source-aligned, aggregate and consumer-aligned. Source-aligned data are those related to the same operational domain and it is important to correlate or aggregate them with higher planes: management-, control- and forwarding plane. An issue is the difference, not only in the nature of data, but in their volumes and their variety. Some may change rapidly over time (for example network traffic) while other may be quite stable (device state).</t>

<t>The collecting process requirements depend on the kind of processing. We can distinguish two major classes: batch/offline vs real-time/online processing. In particular, real-time monitoring tools are key in enabling dynamic resource management functions to operate on short reconfiguration cycles. However, maintaining an accurate view of the network state requires a vast amount of information to be collected and processed. While efficient mechanisms that extract raw measurement data at line rate have been recently developed, the processing of collected data is still a costly operation. This involves potentially sampling, evaluating and aggregating a vast amount of state information as a response to a diverse set of monitoring queries, before generating accurate reports. One difficult problem resides also in the availability of data as real-time data from different sources to be aggregated may not arrive at the same time requiring so some buffering techniques. Machine learning methods, e.g. based on regression, can be used to intelligently filter the raw measurements and thus reduce the volume of data to process. For example, in <xref target="Tan20"/> the authors proposed an approach in which the classifiers derived for this purpose (according to measurements on traffic properties) can achieve a threefold improvement in the query processing capability. A residual question is the storage of raw measurements. In fact, predicting the lifetime of data is challenging because their analysis may not be planned and triggered by a particular event (for example, an anomaly or attack). As a result, the provisioning of storage capacity can be hard.</t>

<t>In parallel to the continuously increasing dynamicity of networks and complexity of traffic, there is a trend towards more user traffic processing customization <xref target="RFC8986"/><xref target="Li19"/>. As a result, fine grained information about network element states is expected and new propositions have emerged to collect on-path data or in-band network telemetry information <xref target="Tan20b"/>. These new approaches have been designed by introducing much flexibility and customization and could be helpful to be used in conjunction with AI applications. However, the seamless coupling of telemetry processes with packet forwarding requires careful definition of solutions to limit the overhead and the impact of the throughput while providing the necessary level of details. This shares commonalities with the lightweight AI challenge.</t>

</section>
<section anchor="usable-data"><name>Usable data</name>

<t>Although all agree on the necessity to have more shared datasets, it is quite uncommon in practice. Data contains private or sensitive information and may not be shared because of the criticality of data (which can be used by ill-intentioned adversaries) or due to laws or regulations, even within the same company. To solve this issue, anonymization techniques <xref target="Dij19"/> can be enhanced to optimize the trade-off between valuable data vs sensitive information (potential) leakage or reconstruction.
Whatever the final user of data, regulations and laws impose rules on data management with potentially costly impact if they are not respected voluntarily or not. Defining a new monitoring framework should always consider security and privacy aspects, for example to let any user/customer or access/remove its own data with General Data Protection Regulation (GDPR) in EU. The challenge resides here in the capacity of qualifying what is critical or private information and the capacity for an adversary to reconstruct it from other sources of data. Hence AI/ML based solutions will require more data but also more administrative, legal and ethical procedures. Those can last long and so slow down the deployment of a new solution. In addition, this requires interaction with experts from different domains (e.g. AI engineer and a lawyer). The integration of these non-technical constraints should be considered when defining new data to be collected or a new technique to collect data. However, knowing the final use of data is most of the time necessary for ethical and legal assessment which assumes that those considerations <bcp14>SHOULD</bcp14>  be integrated from the early design of new AI-based solutions.</t>

<t>For supervised or semi-supervised training, having a labeled dataset is a prerequisite. It constitutes a major challenge as well. One one hand, collectors are able to retrieve data. On the other hand, those network data are typically unlabeled. This limits application of ML to unsupervised learning tasks (learning from data). Because manual labeling is a tedious task. one option is to leverage AI to guide humans. This may also support a better generalization of a learned model. Indeed, an underlying challenge is the genericity or coverage of the datasets. Labels encode values of an objective function, the challenge posed by the design of such tools is tremendous since for involving a M:N relationship: 1 data type may be associated to M objective function values and N data types may be associated to 1 objective function. As a result, most datasets used for research encodes a single label for a particular application like attack label for datasets to be used in the context of intrusion detection or application type for network traffic used for classification where the value of a single dataset could be capitalized in several applications.</t>

<t>Again, researchers need empirical (or at least realistic) datasets to validate their solutions. Unfortunately, as highlighted above, having such data from real deployments for various reasons (business secrets, privacy concerns, concerns that vulnerabilities are revealed by accident, raw unlabeled data, etc.) is tough. Even if such a dataset is available it might not be enough to convincingly validate a new algorithm.
Instead of falling back to artificial testbed experiments or simulation, it would be useful to have the capability to generate datasets with characteristics that are not 100% identical but similar to the characteristics of one or more real datasets. Such synthetic networks can be used to validate new management algorithms, intrusion detection systems, etc.
The usage of AI (for example GANs) in this area <xref target="Hui22"/> is not yet widespread and there are still many concerns that deter researchers, e.g. the fear of leaking sensitive information from the original dataset into the synthetic dataset.</t>

</section>
</section>
<section anchor="acceptability"><name>Acceptability of AI</name>

<t>Networks are critical infrastructures. On one hand, they <bcp14>SHOULD</bcp14> be operated without interruption and must be interoperable. Networks, except in a lab, are not isolated which slow down innovation in general. For example, changing Internet routing protocols <bcp14>SHOULD</bcp14> be accepted by all. The same applies for protocol. Even if there have been several versions of major protocols in use like TCP or DNS, there are still some security issues which cannot be patched with 100% guarantee. On the other hand, results provided by AI solutions are uncertain by nature. The same technique applied in different environments can produce different results. AI techniques need some effort (time and human) to be properly configured or to be stabilized. For instance, reinforcement learning needs several iterations before being able to produce acceptable results. These properties of AI techniques are thus a bit antagonist with the criticality of network infrastructures. With that in mind, acceptability of AI by network operators is clearly an obstacle for its larger adoption.</t>

<section anchor="explainability"><name>Explainability of Network-AI products</name>

<t>A common issue across all Machine Learning (ML) applications is that they are black boxes. This means that, after training, the knowledge acquired by ML models is unintelligible to humans. As a result, offering hard guarantees on performance is a very challenging issue. In addition, complex ML models like neural networks -that often have more than hundreds of thousands of parameters- are very hard to debug or troubleshoot in case of failure.</t>

<t>While this is a common issue for all applications of AI, many areas work well with uncertainty and the black-box behavior of AI-based solutions. For instance, users accept an inherent error in recommender systems or computer vision solutions.</t>

<t>The networking field has already produced a set of well-established network management algorithms and methods, with clear performance guarantees and troubleshooting mechanisms <xref target="Rex06"/><xref target="Kr14"/>. As such, improving debugging, troubleshooting and guarantees on AI-based solutions for networking is a must.</t>

<t>AI researchers and practitioners are devoting large research efforts to improve this aspect of ML models, which is commonly known as explainability <xref target="XAI"/>.</t>

<t>This set of techniques provides insights and, in some cases, guarantees on the performance and behavior of ML-based solutions. Understanding such techniques, researching and applying them to network AI is critical for the success of the field.</t>

<t>There exist several ML-based methods that are human-understandable, although not widely used today. For instance, <xref target="Mar20"/> shows a method for building anticipation models (prediction) that provide explanations while determining some actions for tuning some parameters of the network. There are other challenges that <bcp14>SHOULD</bcp14> be addressed, such as providing explanations for other ML methods that are quite extended. For instance, xNN/SVM models can be accompanied by Digital Twins of the network that are reversely explored to explain some output from the ML model (e.g., xNN/SVM). In this context, there already exist several methods <xref target="Zil20"/><xref target="Puj21"/> that produce human-readable interpretations of trained NN models, by analyzing their neural activations on different inputs. (As an aside, it should be noted that Digital Twins are not considered per se an AI approach; they merely serve to provide a digital representation of a network that can serve as its proxy and offer a layer of indirection between management applications and actual network resources. That being said, it is conceivable that AI-based management applications can be combined and operate in conjunction with Digital Twin technology, for example to use a Digital Twins as an experimentation sandbox or staging ground for AI-driven applciations.)</t>

</section>
<section anchor="ai-based-products-and-algorithms-in-production-systems"><name>AI-based products and algorithms in production systems</name>

<t>AI-based network management and optimization algorithms are first trained, then the resulting model is used to produce relevant inferences in operation, either in management or optimization scenarios. A relevant question for the success of AI-based solutions is: where does this training occur?</t>

<t>Traditionally, AI-based models have been trained in the same scenario where they operate<xref target="Val17"/><xref target="Xu18"/>, this is the customer network. However this presents critical drawbacks. First, training an AI model for management and operation typically requires generating network configurations and scenarios that can break the network. This is because training requires seeing a broad spectrum of scenarios. Thus, it is not feasible in production networks. Second, customer networks may not be equipped with the monitoring infrastructure required to collect the data used in the training process (e.g., performance metrics).</t>

<t>A more sensible approach is to train the AI-based product in a lab, for instance in the vendor’s premises. In the lab, AI models can be trained in a controlled testbed, with any configuration, even ones that break the network. However, the main challenge here arises from the fundamental differences between the lab’s network and the customer networks. For instance, the topology of the lab’s network might be smaller, etc. As a result, there is a need for models that are able to generalize. In this context, generalization means that models should be able to operate in other scenarios not seen during training, with different topologies, routing configurations, scheduling policies, etc.</t>

<t>In order to address this generalization problem, multiple complementary approaches are possible: 
One approach is training on diverse data that represents large parts of the expected problem space. For example, training with various different traffic patterns will help improve generalization to unseen but comparable traffic patterns.
Another approach is to leverage AI designs or architectures that facilitate generalization. One example are Graph Neural Networks (GNN) <xref target="gnn1"/><xref target="gnn2"/>. GNNs are a rather novel type of neural network able to operate and generalize over graphs. Indeed, networks are fundamentally represented as graphs: topology, routing, etc. With GNNs, vendors can train the AI model in a lab with a certain topology and then directly use the resulting model in different customer networks, even with different network topologies.
Finally, another approach is Transfer Learning <xref target="tl1"/>. With this technique, the knowledge gained in the lab’s training  is used to operate in the customer network. Transfer Learning still requires that some data from the customer is used to re-train and fine-tune the model (e.g., accurate performance measurements). This means that, for each customer network, re-training is required. This may be problematic since it requires added cost and access to customer data.</t>

<t>In addition to the challenge of generalizing from training to production environment, there are also challenges in terms of interoperability between different AI approaches and different deployment environments.
As mentioned above, AI approaches may be deployed in diverse environments, e.g., for training and production, but also for local development, for testing, and for validation or in different part of the production systems.
These environments may differ in available compute resources, network topology, operating systems, cloud providers, etc. (single node machine, single cluster, many distributed clusters, ...). Deploying the same AI solutions in these different environments can lead to various challenges in terms of interoperability. Common AI frameworks support scaling across networks of different size. Yet, many frameworks are often combined, e.g., for data collection, processing, predictions, validation, etc. Again, ensuring interoperability between these frameworks can be tedious.</t>

<t>This shares some  with problems described in <xref target="DistributedAI"></xref> and particularly emphasizes the need for network environments to provide interfaces and descriptions suitable for AI solutions to be properly instantiated and configured.</t>

<t>One approach to address these interoperability challenges is through meta-frameworks that interface with most available AI frameworks. These meta-frameworks provide a higher level of abstraction and often allow seamless deployment across different environments (e.g., on-premise or at different cloud providers) <xref target="Mor18"/>.</t>

</section>
<section anchor="ai-with-humans-in-the-loop"><name>AI with humans in the loop</name>

<t>Depending on the network management task, AI can automate and replace manual human control or it can complement human experts and keep them in the loop. Keeping humans in the loop will be an important step of building trust in AI approaches and help ensure the desired outcomes.
There are various ways of keeping humans in the loop in the different fields of AI, which could be useful for different aspects of network management.</t>

<t>In classification tasks (e.g., detecting security breaches, malware or detecting anomalies), trained AI models provide a confidence score in addition to the predicted class. If the confidence is high, the prediction is used directly. If the confidence is too low, a human expert may jump in and make the decision - thereby also providing valuable training data to improve the AI model. Such approaches are already being used in industry, e.g., to automatically label datasets (AWS SageMake). Similar approaches could also be used for other supervised learning tasks, e.g., regression. Still, it is an open challenge to keep humans in the loop in all phases of the learning process.</t>

<t>Another field of AI is reinforcement learning, which is useful for taking continuous control decisions in network management, e.g., controlling service scaling and placement as well as flow scheduling and routing over time. Reinforcement learning agents typically interact with the environment (i.e., the simulated or real network) completely autonomously without human feedback. However, there is a growing number of approaches to put human experts back into the loop. One approach is offline reinforcement learning, where the training data does not come from the reinforcement learning agent’s own exploration but from pre-recorded traces of human experts (e.g., placement decisions that were made by humans before). Another approach is to reward the reinforcement learning agent based on human feedback rather than a pre-defined reward function <xref target="Lee21"/>. Again, while there are first promising approaches, more work is required in this area.
Overall, it is an open challenge to both leverage the benefits of AI but keep human experts in the loop where it is useful.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security considerations</name>

<t>This document introduces the challenges of coupling AI and NM. Since the aim is not to address a particular problem by proposing a solution, no security concern is directly raised. However, examples of applications mentioned and cited in the different sections may face their own security concerns. In this section, our objective is to highlight high-level security considerations to be considered when coupling AI and NM which will need to be refined according to a particular application.</t>

<section anchor="ai-based-security-solutions"><name>AI-based security solutions</name>

<t>The first security consideration refers to the use of AI for NM problem related to security of the managed networked systems. There are multiple scenarios where AI can be leveraged: to perform traffic filtering, to detect anomalies or to decide on target moving defence strategies. In these cases, the performance of the AI algorithm directly impacts on the security performance (e.g. detection or mitigation effectiveness) like any other non-AI system. However, AI methods generally tends to obfuscate how predictions are made and decisions taken. Explainability of AI is thus highly important. This is why this concern is addressed globally in this document in <xref target="explainability"></xref> as it is a general problem that can impact on other types of NM applications.</t>

<t>Assuming a ML trained model, there is always an uncertainty regarding reachable performances on the wild once the solution is deployed as it can suffer from a poor generalization due to different reasons. There are two major problems which are well known in the ML field: overfitting or under-fitting.  In the first case, the learned model is too specific to the training data while in the second case the model does not extract any knowledge from data. To avoid these issues, hyper-parameter fine-tuning is necessary. For example, the number of iterations is an essential hyper-parameter to be adjusted to learn a neural network model. If it is too low, the learning does not converge to a representative model of the training data (underfitting) but with a high value, there is a risk that the model is too close to the training data (overfitting). In general, finding the right hyper-parameters is helpful to find a good ML algorithm configurations. There are different techniques ranging from grid-search to bayesian optimization falling into the AI area of Hyper-Parameter Optimization (HPO) <xref target="Bis23"/>.</t>

<t>Besides, machine learning assumes to have representative training data. The quality of dataset for learning is a vast problem. Additionally, the representation of data needs to be addressed carefully to be properly analyzed by AI models, for example with pre-processing techniques to normalize data, balance classes or encode categorical features depending on the type of algorithms. Actually, <xref target="netData"></xref> of this document fully addresses the concerns related to data in regards to NM problems.</t>

</section>
<section anchor="security-of-ai"><name>Security of AI</name>

<t>Although ensuring a good performance of AI algorithms is already challenging, assuming an attacker aiming at compromising it emphasises the problem. Adversarial AI and notably adversarial ML have attracted a lot of attention over the last year. Adversarial AI and ML relates to both attack and defences. While this is out of scope of the document, evaluating threats against an ML system before deploying it is an important aspect. This supposes to assess what types of information the attacker can access (training data, trained model, algorithm configuration...) and the performable malicious actions (inject false training data, test the system, etc.) to evaluate the magnitude of the impact of possible attacks.</t>

<t>For illustration purposes, we refer hereafter to some examples. In the case of an intrusion detector, an attacker may try to compromise training data by providing adversarial samples to ensure that the detector will miss-classify the future attacks <xref target="Jmi22"/>. In a white-box approach where the model is known from the attacker, the attack can be carefully crafted to avoid being properly labelled. For instance, packet sizes and timings can be easily modified to bypass ML-based traffic classification system <xref target="Nas21"/>. In a black-box model, the attacker ignores the functioning or training data of the ML systems but can try to infer some information. For example, the attacker can try to reconstruct sensitive information which have been used for training. This type of attack qualified as model inversion <xref target="Fre15"/> raises concern regarding privacy.</t>

</section>
<section anchor="relevance-of-ai-based-outputs"><name> Relevance of AI-based outputs</name>

<t>Security breaches can be created by an AI-driven application. Actually,any system that will be use to guide or advice on actions to be perform on network raise the same issue. For example, if an AI algorithm decide to change the filtering tables in a network it may compromise access control policies. Irrelevant results could be also produced. In the area of QoS, an AI system could allocate a bandwidth to a flow higher to the real link capacity. As shown from these two examples, an AI can produce decisions or values which are out of bounds of normal operations. To avoid such issues, safeguards can be added to discard or correct irrelevant outputs. Detecting such type of outputs can be also chalelnging in complex and distributed systems such as a network. Formal verification methods or testing techniques are helpful in that context.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC7011;
&RFC8986;
&RFC9315;
&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References'>

&I-D.irtf-nmrg-network-digital-twin-arch;
<reference anchor="Mcc93" >
  <front>
    <title>The BSD packet filter: a new architecture for user-level packet capture</title>
    <author initials="S." surname="McCanne" fullname="Steve McCanne">
      <organization></organization>
    </author>
    <author initials="V." surname="Jacobson" fullname="Van Jacobson">
      <organization></organization>
    </author>
    <date year="1993"/>
  </front>
<annotation>USENIX Winter Conference</annotation></reference>
<reference anchor="Ste92" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="D." surname="Stern" fullname="Daniel Stern">
      <organization></organization>
    </author>
    <author initials="P." surname="Chemouil" fullname="Prosper Chemouil">
      <organization></organization>
    </author>
    <date year="1992"/>
  </front>
<annotation>Networks, Kobe, Japan</annotation></reference>
<reference anchor="Abd10" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="K. A." surname="Jalil" fullname="Kamarularifin Abd Jalil">
      <organization></organization>
    </author>
    <author initials="M. H." surname="Kamarudin" fullname="Muhammad Hilmi Kamarudin">
      <organization></organization>
    </author>
    <author initials="M. N." surname="Masrek" fullname="Mohamad Noorman Masrek">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>IEEE international conference on networking and information technology</annotation></reference>
<reference anchor="Beg19" >
  <front>
    <title>DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning</title>
    <author initials="D." surname="Bega" fullname="D. Bega">
      <organization></organization>
    </author>
    <author initials="M." surname="Gramaglia" fullname="M. Gramaglia">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <author initials="A." surname="Banchs" fullname="A. Banchs">
      <organization></organization>
    </author>
    <author initials="X." surname="Costa-Perez" fullname="X. Costa-Perez">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="Bos13" >
  <front>
    <title>Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="H.-S." surname="Kim" fullname="Hun-Seok Kim">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="F." surname="Mujica" fullname="Fernando Mujica">
      <organization></organization>
    </author>
    <author initials="M." surname="Horowitz" fullname="Mark Horowitz">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Bos14" >
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="D." surname="Daly" fullname="Dan Daly">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard-" fullname="Martin Izzard-">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
      <organization></organization>
    </author>
    <author initials="D." surname="Talayco" fullname="Dan Talayco">
      <organization></organization>
    </author>
    <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="D." surname="Walker" fullname="David Walker">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>SIGCOMM Comput. Commun. Rev. 44</annotation></reference>
<reference anchor="Dat18" >
  <front>
    <title>P4Guard: Designing P4 Based Firewall</title>
    <author initials="R." surname="Datta" fullname="R. Datta">
      <organization></organization>
    </author>
    <author initials="S." surname="Choi" fullname="S. Choi">
      <organization></organization>
    </author>
    <author initials="A." surname="Chowdhary" fullname="A. Chowdhary">
      <organization></organization>
    </author>
    <author initials="Y." surname="Park," fullname="Y. Park,">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Military Communications Conference (MILCOM)</annotation></reference>
<reference anchor="Che19" >
  <front>
    <title>P4-Enabled Bandwidth Management</title>
    <author initials="Y." surname="Chen" fullname="Y. Chen">
      <organization></organization>
    </author>
    <author initials="L." surname="Yen" fullname="L. Yen">
      <organization></organization>
    </author>
    <author initials="W." surname="Wang" fullname="W. Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Chuang" fullname="C. Chuang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Y. Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Tseng" fullname="C. Tseng">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>Asia-Pacific Network Operations and Management Symposium (APNOMS)</annotation></reference>
<reference anchor="Cha18" >
  <front>
    <title>Oko: Extending Open vSwitch with Stateful Filters</title>
    <author initials="P." surname="Chaignon" fullname="Paul Chaignon">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="T." surname="Delmas" fullname="Thibault Delmas">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM Symposium on SDN Research (SOSR)</annotation></reference>
<reference anchor="czb20" >
  <front>
    <title>Network Management 2030: Operations and Control of Network 2030 Services</title>
    <author initials="A." surname="Clemm" fullname="A. Clemm">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Zhani" fullname="M. F. Zhani">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Springer Journal of Network and Systems Management (JNSM)</annotation></reference>
<reference anchor="Hua19" >
  <front>
    <title>Addressing the Loss-Metric Mismatch with Adaptive Loss Alignment</title>
    <author initials="C." surname="Huang" fullname="Chen Huang">
      <organization></organization>
    </author>
    <author initials="S." surname="Zhai" fullname="Shuangfei Zhai">
      <organization></organization>
    </author>
    <author initials="W." surname="Talbott" fullname="Walter Talbott">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Bautista" fullname="Miguel Angel Bautista">
      <organization></organization>
    </author>
    <author initials="S.-Y." surname="Sun" fullname="Shih-Yu Sun">
      <organization></organization>
    </author>
    <author initials="C." surname="Guestrin" fullname="Carlos Guestrin">
      <organization></organization>
    </author>
    <author initials="J." surname="Susskind" fullname="Josh Susskind">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ICRL</annotation></reference>
<reference anchor="Jos22" >
  <front>
    <title>NetREC Network-wide in-network REal-value Computation.</title>
    <author initials="M." surname="Jose" fullname="Matthews Jose">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE International Conference on Network Softwarization (NetSoft)</annotation></reference>
<reference anchor="Lee21" >
  <front>
    <title>Feedback-efficient interactive reinforcement learning via relabeling experience and unsupervised pre-training</title>
    <author initials="K." surname="Lee" fullname="K. Lee">
      <organization></organization>
    </author>
    <author initials="L." surname="Smith" fullname="L. Smith">
      <organization></organization>
    </author>
    <author initials="P." surname="Abbeel" fullname="P. Abbeel">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>arXiv preprint arXiv:2106.05091</annotation></reference>
<reference anchor="Lia18" >
  <front>
    <title>FP-BNN: Binarized neural network on FPGA</title>
    <author initials="S." surname="Liang" fullname="Shuang Liang">
      <organization></organization>
    </author>
    <author initials="S." surname="Yin" fullname="Shouyi Yin">
      <organization></organization>
    </author>
    <author initials="L." surname="Liu" fullname="Leibo Liu">
      <organization></organization>
    </author>
    <author initials="W." surname="Luk" fullname="Wayne Luk">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Shaojun Wei">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Neurocomputing, Volume 275</annotation></reference>
<reference anchor="Liu16" >
  <front>
    <title>One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon</title>
    <author initials="Z." surname="Liu" fullname="Zaoxing Liu">
      <organization></organization>
    </author>
    <author initials="A." surname="Manousis" fullname="Antonis Manousis">
      <organization></organization>
    </author>
    <author initials="G." surname="Vorsanger" fullname="Gregory Vorsanger">
      <organization></organization>
    </author>
    <author initials="V." surname="Sekar" fullname="Vyas Sekar">
      <organization></organization>
    </author>
    <author initials="V." surname="Braverman" fullname="Vladimir Braverman">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Yan18" >
  <front>
    <title>Elastic sketch: adaptive and fast network-wide measurements</title>
    <author initials="T." surname="Yang" fullname="Tong Yang">
      <organization></organization>
    </author>
    <author initials="J." surname="Jiang" fullname="Jie Jiang">
      <organization></organization>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization></organization>
    </author>
    <author initials="Q." surname="Huang" fullname="Qun Huang">
      <organization></organization>
    </author>
    <author initials="J." surname="Gong" fullname="Junzhi Gong">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhou" fullname="Yang Zhou">
      <organization></organization>
    </author>
    <author initials="R." surname="Miao" fullname="Rui Miao">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xiaoming Li">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="Steve Uhlig">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Gup18" >
  <front>
    <title>Sonata: query-driven streaming network telemetry</title>
    <author initials="A." surname="Gupta" fullname="Arpit Gupta">
      <organization></organization>
    </author>
    <author initials="R." surname="Harrison" fullname="Rob Harrison">
      <organization></organization>
    </author>
    <author initials="M." surname="Canini" fullname="Marco Canini">
      <organization></organization>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="W." surname="Willinger" fullname="Walter Willinger">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Mar18" >
  <front>
    <title>Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Harai" fullname="Hiroaki Harai">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, Vol. 15, N. 2,</annotation></reference>
<reference anchor="Mar20" >
  <front>
    <title>Explained Intelligent Management Decisions in Virtual Networks and Network Slices</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Asaeda" fullname="H. Asaeda">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</annotation></reference>
<reference anchor="Mus18" >
  <front>
    <title>An overview on application of machine learning techniques in optical networks</title>
    <author initials="F." surname="Musumeci" fullname="F. Musumeci">
      <organization></organization>
    </author>
    <author initials="C." surname="Rottondi" fullname="C. Rottondi">
      <organization></organization>
    </author>
    <author initials="A." surname="Nag" fullname="A. Nag">
      <organization></organization>
    </author>
    <author initials="I." surname="Macaluso" fullname="I. Macaluso">
      <organization></organization>
    </author>
    <author initials="D." surname="Zibar" fullname="D. Zibar">
      <organization></organization>
    </author>
    <author initials="M." surname="Ruffini" fullname="M. Ruffini">
      <organization></organization>
    </author>
    <author initials="M." surname="Tornatore" fullname="M. Tornatore">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 21(2), 1383-1408.</annotation></reference>
<reference anchor="Ngu20" >
  <front>
    <title>Efficient SDN-based traffic monitoring in IoT networks with double deep Q-network</title>
    <author initials="T. G." surname="Nguyen" fullname="T. G. Nguyen">
      <organization></organization>
    </author>
    <author initials="T. V." surname="Phan" fullname="T. V. Phan">
      <organization></organization>
    </author>
    <author initials="D. T." surname="Hoang" fullname="D. T. Hoang">
      <organization></organization>
    </author>
    <author initials="T. N." surname="Nguyen" fullname="T. N. Nguyen">
      <organization></organization>
    </author>
    <author initials="C." surname="So-In" fullname="C. So-In">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>International conference on computational data and social networks, Springer</annotation></reference>
<reference anchor="Tan20" >
  <front>
    <title>Classification-assisted Query Processing for Network Telemetry</title>
    <author initials="G." surname="Tangari" fullname="G. Tangari">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="M. Charalambides">
      <organization></organization>
    </author>
    <author initials="G." surname="Pavlou" fullname="G. Pavlou">
      <organization></organization>
    </author>
    <author initials="C." surname="Grazian" fullname="C. Grazian">
      <organization></organization>
    </author>
    <author initials="D." surname="Tuncer" fullname="D. Tuncer">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Network Traffic Measurement and Analysis Conference (TMA)</annotation></reference>
<reference anchor="Tan20b" >
  <front>
    <title>In-band Network Telemetry: A Survey</title>
    <author initials="T." surname="Lizhuang" fullname="Tan, Lizhuang">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Su, Wei">
      <organization></organization>
    </author>
    <author initials="Z." surname="Zhenyi" fullname="Zhang, Zhenyi">
      <organization></organization>
    </author>
    <author initials="M." surname="Jingying" fullname="Miao, Jingying">
      <organization></organization>
    </author>
    <author initials="L." surname="Xiaoxi" fullname="Liu, Xiaoxi">
      <organization></organization>
    </author>
    <author initials="L." surname="Na" fullname="Li, Na">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Computer Networks. 186. 10.1016</annotation></reference>
<reference anchor="Val17" >
  <front>
    <title>Learning to route</title>
    <author initials="V." surname="A." fullname="Valadarsky, A.">
      <organization></organization>
    </author>
    <author initials="S." surname="M." fullname="Schapira, M.">
      <organization></organization>
    </author>
    <author initials="S." surname="D." fullname="Shahaf, D.">
      <organization></organization>
    </author>
    <author initials="T." surname="A." fullname="Tamar, A.">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>ACM HotNets</annotation></reference>
<reference anchor="Xu18" >
  <front>
    <title>Experience-driven networking: A deep reinforcement learning based approach</title>
    <author initials="X." surname="Z." fullname="Xu, Z.">
      <organization></organization>
    </author>
    <author initials="T." surname="J." fullname="Tang J.">
      <organization></organization>
    </author>
    <author initials="M." surname="J." fullname="Meng, J.">
      <organization></organization>
    </author>
    <author initials="Z." surname="W." fullname="Zhang, W.">
      <organization></organization>
    </author>
    <author initials="W." surname="Y." fullname="Wang, Y.">
      <organization></organization>
    </author>
    <author initials="L. C." surname="H." fullname="Liu, C. H.">
      <organization></organization>
    </author>
    <author initials="Y." surname="D." fullname="Yang, D.">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="tl1" >
  <front>
    <title>Transfer learning</title>
    <author initials="L." surname="Torrey" fullname="Lisa Torrey">
      <organization></organization>
    </author>
    <author initials="J." surname="Shavlik" fullname="Jude Shavlik">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>Handbook of research on machine learning applications and trends: algorithms, methods, and techniques</annotation></reference>
<reference anchor="gnn1" >
  <front>
    <title>Relational inductive biases, deep learning, and graph networks</title>
    <author initials="P. W." surname="Battaglia" fullname="Peter W. Battaglia">
      <organization></organization>
    </author>
    <author initials="E." surname="al" fullname="Et. al">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>arXiv preprint arXiv:1806.01261</annotation></reference>
<reference anchor="gnn2" >
  <front>
    <title>Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN</title>
    <author initials="K." surname="Rusek" fullname="K. Rusek">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="J. Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="A." surname="Mestres" fullname="A. Mestres">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="P. Barlet-Ros">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM Symposium on SDN Research</annotation></reference>
<reference anchor="Rex06" >
  <front>
    <title>Route optimization in IP networks</title>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<annotation>Handbook of Optimization in Telecommunications (pp. 679-700), Springer</annotation></reference>
<reference anchor="Kr14" >
  <front>
    <title>Software-defined networking: A comprehensive survey</title>
    <author initials="D." surname="Kreutz" fullname="D. Kreutz">
      <organization></organization>
    </author>
    <author initials="F. M." surname="Ramos" fullname="F. M. Ramos">
      <organization></organization>
    </author>
    <author initials="P. E." surname="Verissimo" fullname="P. E. Verissimo">
      <organization></organization>
    </author>
    <author initials="C. E." surname="Rothenberg" fullname="C. E. Rothenberg">
      <organization></organization>
    </author>
    <author initials="S." surname="Azodolmolky" fullname="S. Azodolmolky">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="S. Uhlig">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76</annotation></reference>
<reference anchor="XAI" >
  <front>
    <title>Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models</title>
    <author initials="W." surname="Samek" fullname="Wojciech Samek">
      <organization></organization>
    </author>
    <author initials="T." surname="Wiegand" fullname="Thomas Wiegand">
      <organization></organization>
    </author>
    <author initials="K.-R." surname="Müller" fullname="Klaus-Robert Müller">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>arXiv preprint arXiv:1708.08296</annotation></reference>
<reference anchor="Zil20" >
  <front>
    <title>Interpreting Deep Learning-Based Networking Systems</title>
    <author initials="Z." surname="Meng" fullname="Zili Meng">
      <organization></organization>
    </author>
    <author initials="M." surname="Wang" fullname="Minhu Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Bai" fullname="Jiasong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Xu" fullname="Mingwei Xu">
      <organization></organization>
    </author>
    <author initials="H." surname="Mao" fullname="Hongzi Mao">
      <organization></organization>
    </author>
    <author initials="H." surname="Hu" fullname="Hongxin Hu">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Mor18" >
  <front>
    <title>Ray: A Distributed Framework for Emerging AI Applications</title>
    <author initials="P." surname="Moritz" fullname="Philipp Moritz">
      <organization></organization>
    </author>
    <author initials="R." surname="Nishihara" fullname="Robert Nishihara">
      <organization></organization>
    </author>
    <author initials="S." surname="Wang" fullname="Stephanie Wang">
      <organization></organization>
    </author>
    <author initials="A." surname="Tumanov" fullname="Alexey Tumanov">
      <organization></organization>
    </author>
    <author initials="R." surname="Liaw" fullname="Richard Liaw">
      <organization></organization>
    </author>
    <author initials="E." surname="Liang" fullname="Eric Liang">
      <organization></organization>
    </author>
    <author initials="M." surname="Elibol" fullname="Melih Elibol">
      <organization></organization>
    </author>
    <author initials="Z." surname="Yang" fullname="Zongheng Yang">
      <organization></organization>
    </author>
    <author initials="W." surname="Paul" fullname="William Paul">
      <organization></organization>
    </author>
    <author initials="M." surname="Jordan" fullname="Michael Jordan">
      <organization></organization>
    </author>
    <author initials="I." surname="Stoica" fullname="Ion Stoica">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>USENIX Symposium on Operating Systems Design and Implementation (OSDI)</annotation></reference>
<reference anchor="Puj21" >
  <front>
    <title>NetXplain: Real-time explainability of Graph Neural Networks applied to Computer Networks</title>
    <author initials="D." surname="Pujol-Perich" fullname="David Pujol-Perich">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="José Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="S." surname="Xiao" fullname="Shihan Xiao">
      <organization></organization>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabello" fullname="Albert Cabello">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="Pere Barlet-Ros">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>MLSys workshop on Graph Neural Networks and Systems (GNNSys)</annotation></reference>
<reference anchor="Li19" >
  <front>
    <title>A Framework for Qualitative Communications Using Big Packet Protocol</title>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization></organization>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization></organization>
    </author>
    <author initials="H." surname="Yousefi" fullname="Hamed Yousefi">
      <organization></organization>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization></organization>
    </author>
    <author initials="L." surname="Dong" fullname="Lijun Dong">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck." fullname="Filip De Turck.">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM SIGCOMM Workshop on Networking for Emerging Applications and Technologies (NEAT)</annotation></reference>
<reference anchor="Hir15" >
  <front>
    <title>Crowdsourced network measurements: Benefits and best practices</title>
    <author initials="M." surname="Hirth" fullname="Matthias Hirth">
      <organization></organization>
    </author>
    <author initials="T." surname="Hossfeld" fullname="Tobias Hossfeld">
      <organization></organization>
    </author>
    <author initials="M." surname="Mellia" fullname="Marco Mellia">
      <organization></organization>
    </author>
    <author initials="C." surname="Schwartz" fullname="Christian Schwartz">
      <organization></organization>
    </author>
    <author initials="F." surname="Lehrieder" fullname="Frank Lehrieder">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Computer Networks. 90</annotation></reference>
<reference anchor="Bri19" >
  <front>
    <title>Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic</title>
    <author initials="P.-O." surname="Brissaud" fullname="Pierre-Olivier Brissaud">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
      <organization></organization>
    </author>
    <author initials="T." surname="Cholez" fullname="Thibault Cholez">
      <organization></organization>
    </author>
    <author initials="O." surname="Bettan" fullname="Olivier Bettan">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 16 (3)</annotation></reference>
<reference anchor="Hoo18" >
  <front>
    <title>Updated Taxonomy for the Network and Service Management Research Field</title>
    <author initials="J. V. D." surname="Hooft" fullname="Jeroen Van Der Hooft">
      <organization></organization>
    </author>
    <author initials="M." surname="Claeys" fullname="Maxim Claeys">
      <organization></organization>
    </author>
    <author initials="N." surname="Bouten" fullname="Niels Bouten">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
      <organization></organization>
    </author>
    <author initials="A. P. B." surname="Stiller" fullname="Aiko Pras, Burkhard Stiller">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="Marinos Charalambides">
      <organization></organization>
    </author>
    <author initials="R." surname="Badonnel" fullname="Rémi Badonnel">
      <organization></organization>
    </author>
    <author initials="J." surname="Serrat" fullname="Joan Serrat">
      <organization></organization>
    </author>
    <author initials="C. R. P. D." surname="Santos" fullname="Carlos Raniery Paula Dos Santos">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck" fullname="Filip De Turck">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Network System Managemen (JNSM) 26, 790–808</annotation></reference>
<reference anchor="Bou18" >
  <front>
    <title>A comprehensive survey on machine learning for networking: evolution, applications and research opportunities</title>
    <author initials="R." surname="Boutaba" fullname="Raouf Boutaba">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Salahuddin" fullname="Mohammad A. Salahuddin">
      <organization></organization>
    </author>
    <author initials="N." surname="Limam" fullname="Noura Limam">
      <organization></organization>
    </author>
    <author initials="S." surname="Ayoubi" fullname="Sara Ayoubi">
      <organization></organization>
    </author>
    <author initials="N." surname="Shahriar" fullname="Nashid Shahriar">
      <organization></organization>
    </author>
    <author initials="F." surname="Estrada-Solano" fullname="Felipe Estrada-Solano">
      <organization></organization>
    </author>
    <author initials="O. M." surname="Caicedo" fullname="Oscar M. Caicedo">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Internet Services and Applications 9, 16</annotation></reference>
<reference anchor="Kaf19" >
  <front>
    <title>Automation of 5G Network Slice Control Functions with Machine Learning</title>
    <author initials="V. P." surname="Kafle" fullname="V. P. Kafle">
      <organization></organization>
    </author>
    <author initials="P." surname="Martinez-Julia" fullname="P. Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="T." surname="Miyazawa" fullname="T. Miyazawa">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Communications Standards Magazine, vol. 3, no. 3, pp. 54-62</annotation></reference>
<reference anchor="Yan20" >
  <front>
    <title>Artificial-Intelligence-Enabled Intelligent 6G Networks</title>
    <author initials="H." surname="Yang" fullname="H. Yang">
      <organization></organization>
    </author>
    <author initials="A." surname="Alphones" fullname="A. Alphones">
      <organization></organization>
    </author>
    <author initials="Z." surname="Xiong" fullname="Z. Xiong">
      <organization></organization>
    </author>
    <author initials="D." surname="Niyato" fullname="D. Niyato">
      <organization></organization>
    </author>
    <author initials="J." surname="Zhao" fullname="J. Zhao">
      <organization></organization>
    </author>
    <author initials="K." surname="Wu," fullname="K. Wu,">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE Network, vol. 34, no. 6, pp. 272-280</annotation></reference>
<reference anchor="Lop20" >
  <front>
    <title>Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches</title>
    <author initials="J." surname="López" fullname="J. López">
      <organization></organization>
    </author>
    <author initials="M." surname="Labonne" fullname="M. Labonne">
      <organization></organization>
    </author>
    <author initials="C." surname="Poletti" fullname="C. Poletti">
      <organization></organization>
    </author>
    <author initials="D." surname="Belabed" fullname="D. Belabed">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Symposium on Network Computing and Applications (NCA)</annotation></reference>
<reference anchor="Sen04" >
  <front>
    <title>Accurate, scalable in-network identification of p2p traffic using application signatures</title>
    <author initials="S." surname="Sen" fullname="Subhabrata Sen">
      <organization></organization>
    </author>
    <author initials="O." surname="Spatscheck" fullname="Oliver Spatscheck">
      <organization></organization>
    </author>
    <author initials="D." surname="Wang" fullname="Dongmei Wang">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
<annotation>ACM International conference on World Wide Web (WWW)</annotation></reference>
<reference anchor="Rin17" >
  <front>
    <title>IP2Vec: Learning Similarities Between IP Addresses</title>
    <author initials="M." surname="Ring" fullname="M. Ring">
      <organization></organization>
    </author>
    <author initials="A." surname="Dallmann" fullname="A. Dallmann">
      <organization></organization>
    </author>
    <author initials="D." surname="Landes" fullname="D. Landes">
      <organization></organization>
    </author>
    <author initials="A." surname="Hotho" fullname="A. Hotho">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>IEEE International Conference on Data Mining Workshops (ICDMW)</annotation></reference>
<reference anchor="Evr19" >
  <front>
    <title>port2dist: Semantic Port Distances for Network Analytics</title>
    <author initials="L." surname="Evrard" fullname="Laurent Evrard">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="J.-N." surname="Colin" fullname="Jean-Noël Colin">
      <organization></organization>
    </author>
    <author initials="F." surname="Beck" fullname="Frédéric Beck">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</annotation></reference>
<reference anchor="Sol20" >
  <front>
    <title>A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks</title>
    <author initials="H. M." surname="Soliman" fullname="Hazem M. Soliman">
      <organization></organization>
    </author>
    <author initials="G." surname="Salmon" fullname="Geoff Salmon">
      <organization></organization>
    </author>
    <author initials="D." surname="Sovilij" fullname="Dusan Sovilij">
      <organization></organization>
    </author>
    <author initials="M." surname="Rao" fullname="Mohan Rao">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Conference on Cloud Networking (CloudNet)</annotation></reference>
<reference anchor="Sco11" >
  <front>
    <title>On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses</title>
    <author initials="S. E." surname="Coull" fullname="Scott E. Coull">
      <organization></organization>
    </author>
    <author initials="F." surname="Monrose" fullname="Fabian Monrose">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<annotation>NDSS</annotation></reference>
<reference anchor="Xie18" >
  <front>
    <title>A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges</title>
    <author initials="J." surname="Xie" fullname="Junfeng Xie">
      <organization></organization>
    </author>
    <author initials="F. R." surname="Yu" fullname="F. Richard Yu">
      <organization></organization>
    </author>
    <author initials="T." surname="Huang" fullname="Tao Huang">
      <organization></organization>
    </author>
    <author initials="R." surname="Xie" fullname="Renchao Xie">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jiang Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Wang" fullname="Chenmeng Wang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Yunjie Liu">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials</annotation></reference>
<reference anchor="Yu14" >
  <front>
    <title>Distributed and collaborative traffic monitoring in software defined networks</title>
    <author initials="Y." surname="Yu" fullname="Ye Yu">
      <organization></organization>
    </author>
    <author initials="C." surname="Qian" fullname="Chen Qian">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Hot topics in software defined networking</annotation></reference>
<reference anchor="Dij19" >
  <front>
    <title>A Survey of Network Traffic Anonymisation Techniques and Implementations</title>
    <author initials="N. V." surname="Dijkhuizen" fullname="Niels Van Dijkhuizen">
      <organization></organization>
    </author>
    <author initials="J. V. D." surname="Ham" fullname="Jeroen Van Der Ham">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Comput. Surv. 51, 3, Article 52</annotation></reference>
<reference anchor="Sch21" >
  <front>
    <title>Distributed Online Service Coordination Using Deep Reinforcement Learning</title>
    <author initials="S." surname="Schneider" fullname="Stefan Schneider">
      <organization></organization>
    </author>
    <author initials="H." surname="Qarawlus" fullname="Haydar Qarawlus">
      <organization></organization>
    </author>
    <author initials="H." surname="Karl" fullname="Holger Karl">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE International Conference on Distributed Computing Systems (ICDCS)</annotation></reference>
<reference anchor="Hui22" >
  <front>
    <title>Knowledge Enhanced GAN for IoT Traffic Generation</title>
    <author initials="S." surname="Hui" fullname="Shuodi Hui">
      <organization></organization>
    </author>
    <author initials="H." surname="Wang" fullname="Huandong Wang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Wang" fullname="Zhenhua Wang">
      <organization></organization>
    </author>
    <author initials="X." surname="Yang" fullname="Xinghao Yang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhongjin Liu">
      <organization></organization>
    </author>
    <author initials="D." surname="Jin" fullname="Depeng Jin">
      <organization></organization>
    </author>
    <author initials="Y." surname="Li" fullname="Yong Li">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>ACM Web Conference 2022 (WWW)</annotation></reference>
<reference anchor="Sil16" >
  <front>
    <title>Mastering the game of Go with deep neural networks and tree search</title>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="A." surname="Huang" fullname="Aja Huang">
      <organization></organization>
    </author>
    <author initials="C. J." surname="Maddison" fullname="Christopher J. Maddison">
      <organization></organization>
    </author>
    <author initials="A." surname="Guez" fullname="Arthur Guez">
      <organization></organization>
    </author>
    <author initials="L." surname="Sifre" fullname="Laurent Sifre">
      <organization></organization>
    </author>
    <author initials="G. V. D." surname="Driessche" fullname="George Van Den Driessche">
      <organization></organization>
    </author>
    <author initials="J." surname="Schrittwieser" fullname="Julian Schrittwieser">
      <organization></organization>
    </author>
    <author initials="I." surname="Antonoglou" fullname="Ioannis Antonoglou">
      <organization></organization>
    </author>
    <author initials="V." surname="Panneershelvam" fullname="Veda Panneershelvam">
      <organization></organization>
    </author>
    <author initials="M." surname="Lanctot" fullname="Marc Lanctot">
      <organization></organization>
    </author>
    <author initials="S." surname="Dieleman" fullname="Sander Dieleman">
      <organization></organization>
    </author>
    <author initials="D." surname="Grewe" fullname="Dominik Grewe">
      <organization></organization>
    </author>
    <author initials="J." surname="Nham" fullname="John Nham">
      <organization></organization>
    </author>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="I." surname="Sutskever" fullname="Ilya Sutskever">
      <organization></organization>
    </author>
    <author initials="T." surname="Lillicrap" fullname="Timothy Lillicrap">
      <organization></organization>
    </author>
    <author initials="M." surname="Leach" fullname="Madeleine Leach">
      <organization></organization>
    </author>
    <author initials="K." surname="Kavukcuoglu" fullname="Koray Kavukcuoglu">
      <organization></organization>
    </author>
    <author initials="T." surname="Graepel" fullname="Thore Graepel">
      <organization></organization>
    </author>
    <author initials="D." surname="Hassabis" fullname="Demis Hassabis">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>Nature, vol. 529 (2016), pp. 484-503</annotation></reference>
<reference anchor="Nas21" >
  <front>
    <title>Defeating DNN-Based Traffic Analysis Systems inReal-Time With Blind Adversarial Perturbations</title>
    <author initials="M." surname="Nasr" fullname="M. Nasr">
      <organization></organization>
    </author>
    <author initials="A." surname="Bahramali" fullname="A. Bahramali">
      <organization></organization>
    </author>
    <author initials="A." surname="Houmansadr" fullname="A. Houmansadr">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>USENIX Security Symposium</annotation></reference>
<reference anchor="Jmi22" >
  <front>
    <title>Adversarial machine learning for network intrusion detection: A comparative study</title>
    <author initials="H." surname="Jmila" fullname="H. Jmila">
      <organization></organization>
    </author>
    <author initials="M. I." surname="Khedher" fullname="M. I. Khedher">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Computer Networks</annotation></reference>
<reference anchor="Fre15" >
  <front>
    <title>Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures</title>
    <author initials="M." surname="Fredrikson" fullname="M. Fredrikson">
      <organization></organization>
    </author>
    <author initials="M. S." surname="Jha" fullname="M. S. Jha">
      <organization></organization>
    </author>
    <author initials="T." surname="Ristenpart" fullname="T. Ristenpart">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>ACM SIGSAC Conference on Computer and Communications Security</annotation></reference>
<reference anchor="Bis23" >
  <front>
    <title>Hyperparameter optimization: Foundations, algorithms, best practices, and open challenges</title>
    <author initials="B." surname="Bischl" fullname="B. Bischl">
      <organization></organization>
    </author>
    <author initials="M." surname="Binder" fullname="M. Binder">
      <organization></organization>
    </author>
    <author initials="M." surname="Lang" fullname="M. Lang">
      <organization></organization>
    </author>
    <author initials="T." surname="Pielok" fullname="T. Pielok">
      <organization></organization>
    </author>
    <author initials="J." surname="Richter" fullname="J. Richter">
      <organization></organization>
    </author>
    <author initials="S." surname="Coors" fullname="S. Coors">
      <organization></organization>
    </author>
    <author initials="J." surname="Thomas" fullname="J. Thomas">
      <organization></organization>
    </author>
    <author initials="T." surname="Ullmann" fullname="T. Ullmann">
      <organization></organization>
    </author>
    <author initials="M." surname="Becker" fullname="M. Becker">
      <organization></organization>
    </author>
    <author initials="A.-L." surname="Boulesteix" fullname="A.-L. Boulesteix">
      <organization></organization>
    </author>
    <author initials="D." surname="Deng" fullname="D. Deng">
      <organization></organization>
    </author>
    <author initials="M." surname="Lindauer" fullname="M. Lindauer">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 13(2)</annotation></reference>


    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document is the result of a collective work. Authors of this document are the main contributors and the editors but contributions have been also received from the following people we acknowledge: Laurent Ciavaglia, Felipe Alencar Lopes, Abdelkader Lahamdi, Albert Cabellos, José Suárez-Varela, Marinos Charalambides, Ramin Sadre, Pedro Martinez-Julia and Flavio Esposito</t>

<t>This document is also partially supported by project AI@EDGE, funded from the European Union's Horizon 2020 H2020-ICT-52 call for projects, under grant agreement no. 101015922.</t>

<t>The views expressed in this document do not necessarily reflect those of the Bank of Canada's Governing Council.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

