<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
<!ENTITY RFC8986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC9315 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9315.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY I-D.irtf-nmrg-network-digital-twin-arch SYSTEM "https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.irtf-nmrg-network-digital-twin-arch.xml">
]>


<rfc ipr="trust200902" docName="draft-irtf-nmrg-ai-challenges-03" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Coupling AI and network management">Research Challenges in Coupling Artificial Intelligence and Network Management</title>

    <author fullname="Jérôme François">
      <organization>University of Luxembourg and Inria</organization>
      <address>
        <postal>
          <street>6 Rue Richard Coudenhove-Kalergi</street>
          <city>Luxembourg</city>
          <country>Luxembourg</country>
        </postal>
        <email>jerome.francois@uni.lu</email>
      </address>
    </author>
    <author fullname="Alexander Clemm">
      <organization>Futurewei Technologies, Inc.</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <author fullname="Dimitri Papadimitriou">
      <organization>3NLab Belgium Reseach Center</organization>
      <address>
        <postal>
          <city>Leuven</city>
          <country>Belgium</country>
        </postal>
        <email>papadimitriou.dimitri.be@gmail.com</email>
      </address>
    </author>
    <author fullname="Stenio Fernandes">
      <organization>Central Bank of Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>stenio.fernandes@ieee.org</email>
      </address>
    </author>
    <author fullname="Stefan Schneider">
      <organization>Digital Railway (DSD) at Deutsche Bahn</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>stefanbschneider@outlook.com</email>
      </address>
    </author>

    <date year="2024" month="March" day="04"/>

    
    <workgroup>Internet Research Task Force</workgroup>
    <keyword>network management</keyword> <keyword>artificial intelligence</keyword> <keyword>machine learning</keyword>

    <abstract>


<t>This document is intended to introduce the challenges to overcome when Network Management (NM) problems may require to couple with Artificial Intelligence (AI) solutions. On the one hand, there are many difficult problems in NM that to this date have no good solutions, or where any solutions come with significant limitations and constraints. Artificial Intelligence may help produce novel solutions to those problems. On the other hand, for several reasons (computational costs of AI solutions, privacy of data), distribution of AI tasks became primordial. It is thus also expected that network are operated efficiently to support those tasks.</t>

<t>To identify the right set of challenges, the document defines a method based on the evolution and nature of NM problems. This will be done in parallel with advances and the nature of existing solutions in AI in order to highlight where AI and NM have been already coupled together or could benefit from a higher integration. So, the method aims at evaluating the gap between NM problems and AI solutions. Challenges are derived accordingly, assuming solving these challenges will help to reduce the gap between NM and AI.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>The functional scope of Network Management (NM) is very large, ranging from monitoring to accounting, from network provisioning to service diagnostics, from usage accounting to security. The taxonomy defined in <xref target="Hoo18"/> extends the traditional Fault, Configuration, Accounting, Performance, Security (FCAPS) domains by considering additional functional areas but above all by promoting additional views. For instance, network management approaches can be classified according to the technologies, methods or paradigms they will rely on. Methods include common approaches as for example mathematical optimization or queuing theory but also techniques which have been widely applied in last decades like game theory, data analysis, data mining and machine learning. In management paradigms, autonomic and cognitive management are listed. As highlighted by this taxonomy, the definition of automated and more intelligent techniques have been promoted to support efficient network management operations. Research in NM and more generally in networking has been very active in the area of applied ML <xref target="Bou18"/>.</t>

<t>However, for maintaining network operational in pre-defined safety bounds, NM still heavily relies on established procedures. Even after several cycles of adding automation, those procedures are still mostly fixed and set offline in the sense that the exact control loop and all possible scenarios are defined in advance. They are so mostly deterministic by nature or or at least with sufficient safety margin. Obviously, there have been a lot of propositions to make network smarter or intelligent with the use of Machine Learning (ML) but without large adoption for running real networks because it changes the paradigms towards stochastic methods.</t>

<t>ML includes regression analysis, statistical learning (SVM and variants), deep learning (ANN and variants), reinforcement learning, etc. It is a sub-area of Artificial Intelligence (AI) that concentrates the focus nowadays but AI encompasses other areas including knowledge representation, inductive logic programming, inference rule engine or by extension the techniques that allow to observe and perform actions on a system.</t>

<t>It is thus legitimate to question if ML or AI in general could be helpful for NM in regards to practical deployment. This question is actually tight with the problems the NM aims to address. Independently of NM, ML-based solutions were introduced to solve one type of problems in an approximate way which are very complex in nature, i.e. finding an optimal solution is not possible (in polynomial time). This is the case for NP-hard problems. In those cases, solutions typically rely on heuristics that may not yield optimal results, or algorithms that run into issues with scalability and the ability to produce timely results due to the exponential search space. In NM, those problems exist, for instance allocation of resources in case of Service Function Chaining (SFC) or network slicing  among others are recent examples which have gained interest in our community with SDN. Many propositions consist of modeling the optimization problem as an MILP (Mixed-Integer Linear Programming) and solve it by means of heuristics to reach a satisfactory tradeoff between solution quality (gap to optimality) - computation time and model size/dimensionality. Hence, ML is recognized to be well adapted to progress on this type of problem <xref target="Kaf19"/>.</t>

<t>However, all computational problems of NM are not NP-hard. Due to real-time constraints, some involve very short control loops that require both rapid decisions and the ability to rapidly adapt to new situations and different contexts. So, even in that case, time is critical and approximate solutions are usually more acceptable.  Again, it is where AI can be beneficial. Actually, expert systems are AI systems <xref target="Ste92"/> but this kind of systems are not designed to scale with the volume and heterogeneity of data we can collect in a network today for which the expert system is built thanks to numerous inference rules. In contrast, ML is more efficient to automatically learn abstract representations of the rules, which can be eventually updated.</t>

<t>On one hand another type of common problem in NM is classification. For instance, classifying network flows is helpful for security purposes to detect attack flows, to differentiate QoS among the different flows (e.g. real-time streams which need to be prioritized), etc. On the other hand, ML-based classification algorithms have been widely used in literature with high quality results when properly applied leading to their applications in commercial products. There are many algorithms including decision tress, support vector machine or (deep) neural networks which have been to be proven efficient in many areas and notably for image and natural language processing.</t>

<t>Finally, many problems also still rely on humans in the loop, from support issues such as dealing with trouble tickets to planning activities for the roll-out of new services. This creates operational bottlenecks and is often expensive and error prone. This kind of tasks could be either automated or guided by an AI system to avoid inividual human bias. It is worth noting that Ml relying training data generated by human can also suffer indirectly from a collective human bias. Indeed, the balance between human resources and the complexity of problems to deal with is actually very imbalanced and this will continue to increase due to the size of networks, heterogeneity of devices, services, etc. Hence, human-based procedures tend to be simple in comparison to the problems to solve or time-consuming. Notable examples are in security where the network operator should defend against potential unknown threat. As a result, services might be largely affected during hours</t>

<t>Actually, all the problems aforementioned are exacerbated by the situation of more complex networks to operate on many dimensions (users, devices, services, connections, etc.). Therefore, AI is expected to enable or simplify the solving of those problems in real networks in the near future <xref target="czb20"/> <xref target="Yan20"/> because those would require reaching unprecedented levels of performance in terms of throughput, latency, mobility, security, etc.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="acronyms"><name>Acronyms</name>

<t><list style="symbols">
  <t>AI: Artificial Intelligence</t>
  <t>FL: Federated Learning</t>
  <t>GAN: Generative Adversarial Network</t>
  <t>GNN: Graph Neural Network</t>
  <t>IBN: Intent-Based Networking</t>
  <t>LSTM: Long Short-Term Memory</t>
  <t>ML: Machine Learning</t>
  <t>MILP: Mixed-Integer Linear Programming</t>
  <t>MLP: Multilayer Perceptron</t>
  <t>NM: Network Management</t>
  <t>RL: Reinforcement Learning</t>
  <t>SFC: Service Function Chaining</t>
  <t>SVM: Support-Vector Machine</t>
  <t>VNF: Virtual Network Function</t>
</list></t>

</section>
<section anchor="pbNM"><name>Difficult problems in network management</name>

<t>As mentioned in introduction, problems to be tackled in NM tend to be complex and exhibit characteristics that make them candidates for solutions that involve AI techniques:</t>

<t><list style="symbols">
  <t>C1: A very large solution space, combinatorially exploding with the size of the problem domain. This makes it impractical to explore and test every solution (again NP-hard problems here)</t>
  <t>C2: Uncertainty and unpredictability along multiple dimensions, including the context in which the solution is applied, behavior of users and traffic, lack of visibility into network state, and more.  In addition, many networks do not exist in isolation but are subjected to myriads of interdependencies, some outside their control.  Accordingly, there are many external parameters that affect the efficiency of the solution to a problem and that cannot be known in advance: user activity, interconnected networks, etc.</t>
  <t>C3: The need to provide answers (i.e. compute solutions, deliver verdicts, make decisions)  in constrained or deterministic time. In many cases, context changes dynamically and decisions need to be made quickly to be of use.</t>
  <t>C4: Data-dependent solutions. To solve a problem accurately, it can be necessary to rely on large volumes of data, having to deal with issues that range from data heterogeneity to incomplete data to general challenges of dealing with high data velocity.</t>
  <t>C5: Need to be integrated with existing automatic and human processes.</t>
  <t>C6: Solutions <bcp14>MUST</bcp14> be cost-effective as resources (bandwidth, CPU, human, etc.) can be limited, notably when part of processing is distributed at the network edge or within the network.</t>
</list></t>

<t>Many decision/optimization problems are affected by multiple criteria. Below is a non-exhaustive list of complex NM problems for which AI and/or non-AI-based approaches have been proposed:</t>

<t><list style="symbols">
  <t>Computation of optimal paths: Packet forwarding is not always based on traditional routing protocols with least cost routing, but on computation of paths that are optimized for certain criteria - for example, to meet certain level objectives, to result in greater resilience, to balance utilization, to optimize energy usage, etc.  Many of those solutions can be found in SDN, where a controller or path computation element computes paths that are subsequently provisioned across the network.  However, such solutions generally do not scale to millions of paths (C1), and cannot be recomputed in sub-second time scales (C3) to take into account dynamically changing network conditions (C2). To compute those paths,  operations research techniques have been extensively used in literature along with AI methods as shown in <xref target="Lop20"/>. As such, this problem can be considered as close to big data problems with some of the different Vs: volume, velocity, variety, value…</t>
  <t>Classification of network traffic: Without loss of generality a common objective of network monitoring for operators is to know the type of traffic going through their networks (web, streaming, gaming, VoIP). By nature, this task analyzes data (C4) which can vary over time (C2) except in very particular scenarios like industrial isolated networks. However, the output of the classification technique is time-constrained only in specific cases where fast decisions <bcp14>MUST</bcp14> be made, for example to reroute traffic. Simple identification based on IANA-assigned TCP/UDP ports numbers were sufficient in the past. However, with applications using dynamic port numbers, signature techniques can be used to match packet payload <xref target="Sen04"/>. To handle applications now encapsulated in encrypted web or VPN traffic, machine-learning has been leveraged <xref target="Bri19"/>.</t>
  <t>Network diagnostics: Disruptions of networking services can have many causes and thus can rely on analyzing many sources of data (C4). Identifying the root cause can be of high importance when what is causing the disruption is not properly understood, so that repair actions can address the root cause versus just working around the symptoms. Such repair actions may involve human actions (C5). Further complicating the matter are scenarios in which disruptions are not “hard” but involve only a degradation of service level, and where disruptions are intermittent, not reproducible, and hard to predict.  Artificial intelligence techniques can offer promising solutions.</t>
  <t>Network observability: having deeper insights of network status can rely on monitoring techniques to gather data from various sources. A major issue is to aggregate all these data in a valuable format. While they are not directly used to automate some actions, the aggregation of the data needs to be presented in an interpretable manner to human operators. In this area, vizualisation techniques are helpful and also rely on AI-related tehcniques to provide the best outputs by reducing the number of dimensions (C4) and adapting the vizualisation of data to there potential final use in human-handled processes (C5).</t>
  <t>Intent-Based Networking (IBN): Roughly speaking, IBN refers to the ability to manage  networks by articulating desired outcomes without the need to specify a course of actions to achieve those outcomes <xref target="RFC9315"/>.  The ability to determine such courses of actions, in particular in scenarios with multiple interdependencies, conflicting goals, large scale, and highly complex and dynamic environments is a huge and largely unsolved challenge (C1, C2, C3). As an illustration, a major problem with intent is ti interpret them correctly knowing that different intent formats have been proposed including natural language. Without good interpretation of the intent, i.e. the expected outcomes, the derived actions will not be adequate. In case the intent is correctly interpreted, a major problem is to find concrete solutions to realize the intents which implicilty needs to optimize the actions to be taken. Artificial Intelligence techniques can be of help here in multiple ways, from accurately classifying dynamic context to determine matching actions to reframing the expression of intent as a game that can be played (and won) using artificially intelligent techniques.</t>
  <t>VNF (Virtual Network Function) placement and SFC design: VNFs need to be placed on physical resources and Service Function Chains designed in an optimized manner to avoid use of networking resources and minimize energy usage (C1,C6).</t>
  <t>Smart admission control to avoid congestion and oversubscription of network resources: Admission control needs to be set up and performed in ways that ensure service levels are optimized in a manner that is fair and aligned with application needs, congestion avoided or its effects mitigated (C6).</t>
</list></t>

</section>
<section anchor="hlchallenges"><name>High-level challenges in adopting AI in NM</name>

<t>As shown in the previous section, AI techniques are good candidates for the difficult NM problems. There have been many propositions but still most of them remain at the level of prototypes or have been only evaluated with simulation and/or emulation. It is thus questionable why our community investigates much research in this direction but has not adopted those solutions to operate real networks. There are different obstacles.</t>

<t>First, AI advances have been historically driven by the image/video, natural language and signal processing communities as well as robotics for many decades. As a result, the most impressive applications are in this area including recently the generalization of home assistants or the large progress in autonomous vehicles. However, the network experts have been focused on building the Internet, especially building protocols to make the world interconnected and with always better performance and services. This trend continues today with the 5G networks in deployment and beyond 5G under definition. Hence, AI was not the primary focus even if increased network automation calls for AI and ML solutions. However, AI is now considered as a core enabler for the future 6G networks which are sometimes qualified as AI-native networks.</t>

<t>While we can see major contributions in AI-based solutions for networking over more than two decades, only a fraction of the community was concerned by AI at that time. Progress as a whole, from a community perspective, was so limited and compensated by relying on the development of AI in the communities as mentioned earlier. Even if our problems share some commonalities, for example on the volume of data to analyze, there are many differences: data types are completely different, networks are by nature heavily distributed, etc. If problems are different, they <bcp14>SHOULD</bcp14> require distinct solutions. In a nutshell, network-tailored AI was overlooked and leads to a first set of challenges described in <xref target="AItechniques"></xref>.</t>

<t>Second, many AI techniques require enough representative data to be applied independently if the algorithms are supervised or unsupervised. NM has produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI techniques and lead so to a mismatch. For example, (deep) learning techniques mostly rely on having vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc)  but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>.</t>

<t>An additional challenge concerns the fact that AI techniques that involve analysis of networking data can also lead to the extraction of sensitive and personally-identifiable information, raising potential privacy concerns and concerns regarding the potential for abuse. For example, AI techniques used to analyze encrypted network traffic with the legitimate goal to protect the network from intrusions and illegitimate attack traffic could be used to infer information about network usage and interactions of network users.  Intelligent data analysis and the need to maintain privacy are in many ways that are contradictory in nature, resulting in an arms race.  Similarly, training ML solutions on real network data is in many cases preferable over using less-realisitic synthetic data sets. However, network data may contain private or sensitive data, the sharing of which may be problematic from a privacy standpoint and even result in legal exposure. The challenge concerns thus how to allow AI techniques to perform legitimate network management functions and provide network owners with operational insights into what is going on in their networks, while prohibiting their potential for abuse for other (illegitimate) purposes.  Challenges related to network data as input to ML algorithms is detailed in <xref target="netData"></xref>.</t>

<t>Finally, networks are already operated thanks to (semi-)automated procedures involving a large number of resources which are synchronized with management or orchestration tools. Adding AI supposes it would be seamlessly integrated within pre-existing processes. Although the goal of these procedures might be solely to provide relevant information to operators through alerts or dashboards in case of monitoring applications, many other applications rely on those procedures to trigger actions on the different resources, which can be local or remote. The use of AI or any other approaches to derive NM actions adds further constraint on them, especially regarding time constraints and synchronization to maintain a coherence over a distributed system.</t>

<t>A related challenge concerns the fact that to be deployed, a solution needs to not only provide a technical solution but to also be acceptable to users - in this case, network administrators and operators.  One challenge with automated solutions concerns that users want to feel “in control” and able to understand what is going on, even more so if ultimately those users are the ones who are held accountable for whether or not the network is running smoothly.  Those same concerns extend to artificially intelligent systems for obvious reasons. To mitigate those concerns, aspects such as the ability to explain actions that are taken - or about to be taken - by AI systems become important.</t>

<t>Beyond reasons of making users more comfortable, there are potentially also legal or regulatory ramifications to ensure that actions taken are properly understood.  For example,agencies such as the FCC may impose fines on network operators when services such as E911 experience outages, as there is a public interest in ensuring highest availability for such services.  In investigating causes for such outages, the underlying behavior of systems has to be properly understood, and even more so the reasons for actions that fall under the realm of network operations. All these aspects about integration and acceptability of the integration of AI in NM processes is detailed in <xref target="acceptability"></xref>.</t>

</section>
<section anchor="AItechniques"><name>AI techniques and network management</name>

<section anchor="problemMapping"><name>Problem type and mapping</name>

<t>In the last few years, an increasing number of different AI techniques have been proposed and applied successfully to a growing variety of different problems in different domains, including network management <xref target="Mus18"/>, <xref target="Xie18"/>. Some of the more recently proposed AI approaches are clearly advancements of older approaches, which they supersede. Many other AI approaches are not predecessors or successors but simply complementary because they are useful for different problems or optimize different metrics. In fact, different AI approaches are useful for different kinds of problem inputs (e.g., tabular data vs. text vs. images vs. time series) and also for different kinds of desired outputs (e.g., a predicted value, a classification, or an action). Similarly, there may be trade-offs between multiple approaches that take the same kind of inputs and desired outputs (e.g., in terms of desired objective, computation complexity, constraints).</t>

<t>Overall, it is a key challenge of using AI for network management to properly understand and map which kind of problems with which inputs, outputs, and objectives are best solved with which kind of AI (or non-AI) approaches. Given the wealth of existing and newly released AI approaches, this is far from a trivial task.</t>

<section anchor="sub-challenge-suitable-approach-for-given-input"><name>Sub-challenge: Suitable Approach for Given Input</name>

<t>Different problems in network management come with widely different problem parameters. For example, security-related problems may have large amounts of text or encrypted data as input, whereas forecasting problems have historical time series data as input. They also vary in the amount of available data.</t>

<t>Both the type and amount of data influences which AI techniques could be useful. On one hand, in scenarios with little data, classical machine learning techniques (e.g., SVM, tree-based approaches, etc.) are often sufficient and even superior to neural networks. On the other hand, neural networks have the advantage of learning complex models from large amounts of data without requiring feature engineering. Here, different neural network architectures are useful for different kinds of problems. The traditional and simplest architecture are (fully connected) multi-layer perceptrons (MLPs), which are useful for structured, tabular data. For images, videos, or other high-dimensional data with correlation between “close” features, convolutional neural networks (CNNs) are useful. Recurrent neural networks (RNNs), especially LSTMs, and attention-based neural networks (transformers) are great for sequential data like time series or text. Finally, Graph Neural Networks (GNNs) can incorporate and consider the graph-structured input, which is very useful in network management, e.g., to represent the network topology.</t>

<t>The aforementioned rough guidelines can help identify a suitable AI approach and neural network architecture. Still, best results are often only achieved with sophisticated combinations of different approaches. For example, multiple elements can be combined into one architecture, e.g., with both CNNs and LSTMs, and multiple separate AI approaches can be used as an ensemble to combine their strengths. Here, simplifying the mapping from problem type and input to suitable AI approaches and architectures is clearly an open challenge. Future work <bcp14>SHOULD</bcp14> address this challenge by providing both clearer guidelines and striving for more general AI approaches that can easily be applied to a large variety of different problem inputs.</t>

</section>
<section anchor="sub-challenge-suitable-approach-for-desired-output"><name>Sub-challenge: Suitable Approach for Desired Output</name>

<t>Similar to the challenge of identifying suitable AI approaches for a given problem input, the desired output for a given problem also affects which AI approach <bcp14>SHOULD</bcp14> be chosen. Here, the format of the desired output (single value, class, action, etc.), the frequency of these outputs and their meaning <bcp14>SHOULD</bcp14> be considered.</t>

<t>Again, there are rough guidelines for identifying a group of suitable AI approaches. For example, if a single numerical value is required (e.g., the amount of resources to allocate to a service instance), then typical supervised regression approaches <bcp14>SHOULD</bcp14> be considered as a first candidate option. If classification (e.g., of malware or another security issue <xref target="Abd10"/>) instead of predicting a value is desired, supervised classification methods <bcp14>SHOULD</bcp14> be used when labeled training data is available. There are also cases where a single class of training data is available, as for example in the context of anomaly detection where the model is fitted to normal data. In that case, one-class supervised techniques <bcp14>SHOULD</bcp14> be considered as a good candidates. Alternatively, unsupervised machine learning can help to cluster given data into separate groups, which can be useful to analyze networking data, e.g., for better understanding different types of traffic or user segments. Furthermore, the quality of the data directly impacts on the robustness of a ML model with the risk of biased models due to over-fitting. As highlighted with these few examples, finding a suitable approach to a problem depends on many factors including the type of problem to handle but also other contextual elements such as the availability and the quality of data.</t>

<t>In addition to these classical supervised and unsupervised methods, reinforcement learning approaches allow active, sequential decisions rather than simple predictions or classifications. This is often useful in network management, e.g., to actively control service scaling and placement as well as flow scheduling and routing. Reinforcement learning agents autonomously select suitable actions in a given environment and are especially useful for self-learning network management. In addition to model-free reinforcement learning, model-based planning approaches (e.g., Monte Carlo Tree Search (MCTS)) also allow choosing suitable actions in a given environment but require full knowledge of the environment dynamics. In contrast, model-free reinforcement learning is ideal for scenarios with unknown environment dynamics, which is often the case in network management.</t>

<t>Similar to the previous sub-challenge, these are just rough guidelines that can help to select a suitable group of AI approaches. Identifying the most suitable approach within the group, e.g., the best out of the many existing reinforcement learning approaches, is still challenging. And, as before, different approaches could be combined to enable even more effective network management (e.g., heuristics + RL, LSTMs + RL, …). Here, further research <bcp14>MAY</bcp14> simplify the mapping from desired problem output to choosing or designing a suitable AI approach.</t>

</section>
<section anchor="tailoringAI"><name>Sub-challenge: Tailoring the AI Approach to the Given Problem</name>

<t>After addressing the two aforementioned sub-challenges, one may have selected a useful kind of AI approach for the given input and output of a network management problem. For example, one may select regression and supervised learning to forecast upcoming network traffic. Or select reinforcement learning to continuously control network and service coordination (scaling, placement, etc.). However, even within each of these fields (regression, reinforcement learning, etc.), there are many possible algorithms and hyperparameters to consider. Selecting a suitable algorithm and parametrizing it with the right hyperparameters is crucial to tailor the AI approach to the given network management problem.</t>

<t>For example, there are many different regression techniques (classical linear, polynomial regression, lasso/ridge regression, SVR, regression trees, neural networks, etc.), each with different benefits and drawbacks and each with its own set of hyperparameters. Choosing a suitable technique depends on the amount and structure of the input data as well as on the desired output. It also depends on the available amount of compute resources and compute time until a prediction is required. If resources and time are not a limiting factor, many hyperparameters can be tuned automatically. In practice, however, the design space of choosing algorithms and hyperparameters is often so large that it cannot be effectively tuned automatically but also requires some initial expertise in selecting suitable AI algorithms and hyperparameters.</t>

<t>This sub-challenge holds for all fields of AI: Supervised learning (regression and classification), self-supervised learning, unsupervised learning, and reinforcement learning, each are broad and rapidly growing fields. Selecting suitable algorithms and hyperparameters to tailor AI approaches to the network management problem is both an opportunity and a challenge. Here, future work should further explore these trade-offs and provide clearer guidelines on how to navigate these trade-offs for different network management tasks.</t>

</section>
</section>
<section anchor="performance-of-produced-models"><name>Performance of produced models</name>

<t>From a general point of view, any AI technique will produce results with a certain level of quality. This leads to two inherent questions: (1) what is the definition of the performance in a context of a NM application? (2) How to measure it? (3) How to ensure the quality of produced results by AI is aligned with NM objectives? How to maintain or improve the quality of produced results?</t>

<t>Many metrics have been already defined to evaluate the performance of an AI-based techniques in regards to its NM-level objectives. For example, QoS metrics (throughput, latency) can serve to measure the performance of a routing algorithm along with the computational complexity (memory consumption, size of routing tables). The question is to model and measure these two antagonist types of metrics. Number of true/false positives/negatives are the most basic metrics for network attack detection functions. Although the first two questions are thus already answered even if improvement can be done, question (3) refers to the integration of metrics into AI algorithms. Its objective is to obtain the best results which need to be quantified with these metrics. Depending on the type of algorithm, these metrics are either evaluated in an online manner with a feedback loop (for example with reinforcement learning) or in batch to optimize a model based on a particular context (for example described by a dataset for machine learning).</t>

<t>The problem is two-fold. First, the performance can be measured through multiple metrics of different types (numerical or ordinal for example) and some can be constrained by fixed boundaries (like a maximum latency), making their joint use challenging when creating an AI model to resolve a NM problem. Second, the scale metrics differ from each other in terms of importance or impact and can eventually vary on their domains. It can be hard to precisely assess what is a good or bad value (as it might depend on multiple other ones) and it is even more difficult to integrate in an AI technique, especially for learning algorithms to adjust their models based on the performance. Indeed, learning algorithms run through multiple iterations and rely on internal metrics (MAE or (R)MSE for neural network, gini index or entropy for decision trees, distance to an hyperplane for SVMs, etc) which are not strongly correlated to the final metrics of the NM application. AI-internal metrics such as the loss do not match well the metrics related to the final NM objectives as the significance and impact of the AI errors cannot be easily translated into the NM domain.</t>

<t>For instance, a decision tree algorithm for classification purposes aims at being able to create branches with a maximum of data from the same classes and so avoid mixing classes. It is done thanks to a criterion like the entropy index but this kind of index does not assume any difference between mixing class A and B or A and C. Assuming now that from an operational point of view, if A and B are mixed in the predictions is not critical, the algorithm should have preferred to mix and A and B rather than A and C even if in the first case it will produce more errors. Therefore, the internal functioning of the AI algorithms should be refined, here by defining a particular criterion to replace the entropy as a quality measure when separating two branches. It assumes that the final NM objectives are integrated at this stage.</t>

<t>Another concrete example is traffic predictors which aim at forecasting traffic demands. They only produce an output that is not necessarily simple to be interpreted and used by, e.g., capacity allocation strategies/policies. A traditional traffic prediction that tries to minimize (perfectly symmetric) MAE/MSE treats positive and negative errors in identical ways, hence is agnostic of the diverse meaning (and costs) of under- and over-provisioning. And, such a prediction does not provide any information on, e.g., how to dimension resources/capacity to accommodate the future demand avoiding all underprovisioning (which entails service disruption) while minimizing overprovisioning (i.e., wasting resources). In other words, it forces the operator to guess the overprovisioning by taking (non-informed) safety margins. A more sensible approach here is instead forecasting directly the needed capacity, rather than the traffic <xref target="Beg19"/>.</t>

<t>While the one above is just an example, the high-level challenge is devising forecasting models that minimize the correct objective/loss function for the specific NM task at hand (instead of generic MAE/MSE). In this way, the prediction phase becomes an integral part of the NM, and not just a (limited and hard-to-use) input to it. In ML terms, this maps to solving the loss-metric mismatch in the context of anticipatory NM <xref target="Hua19"/>.</t>

<t>Another issue for statistical learning (from examples/observations) is mainly about extracting an estimator from a finite set of input-output samples drawn from an unknown probability distribution that should be descriptive enough for unseen/new input data. In this context online monitoring and error control of the quality/properties of these point estimators (bias, variance, mean squared error, etc.) is critical for dynamic/uncertain network environments. Similar reasoning/challenge applies for interval estimates, i.e., confidence intervals (frequentist) and credible intervals (Bayesian).</t>

<t>Finally, question (4) refers to the ability of an AI solution to remain efficient and to eventually improve over time. This requires dynamic methods capable to adapt to a changing environment. As already highlighted, the models can be dynamically adjusted based on the errors they produced. In the context of ML, the models can be also updated based on new data, either through a complete re-learning phase, fine-tuning or transfer-learning approaches. This assumes to collect and ingest continuously new data. This leads to set of related challenges related to select or discard some data over a time horizon and to label data real-time. There are ML techniques which helps in that direction such as LSTMs which integrates forget gates in their architectures.</t>

</section>
<section anchor="lightweight-ai"><name>Lightweight AI</name>

<t>Network management and operations often need to be performed under strict time constraints, i.e. at line rate, in particular in the context of autonomic or self-driven networks. Locating NM functions as close as possible where forwarding is achieved is thus an interesting option to avoid additional delays when these operations are performed remotely, for example in a centralized controller. Besides, forwarding devices may offer available resources to supplement or replace edge resources. In case of AI coupled with network management, AI tasks can be offloaded in network devices, or more generally embedded within the network. Obviously, time-critical tasks are the best candidates to be offloaded within the network. Costly learning tasks should be processed in high-end servers but created models can be deployed, configured, modified and tuned in switches.</t>

<t>Recent advances in network programmability ease the programming of specific tasks at data-plane level. P4 <xref target="Bos14"/> is widely used today for many tasks including firewalling <xref target="Dat18"/> or bandwidth management <xref target="Che19"/>. P4 is prone to be agnostic to a specific hardware. Switches actually have particular architectures and the RMT (Reconfigurable Match Table) <xref target="Bos13"/> model is generally accepted to be generic enough to represent limited but essential switch architecture components and functionalities. P4 is inspired by this architecture. The RMT model allows reconfiguring match-action tables where actions can be usual ones (rewrite some headers, forward, drop...). Actions are thus applied on the packets when they are forwarded. Actions can also be more complex programs with some safeguards: no loop, resistivity… The impact on the program development is huge. For example, real number operations are not available by default while they are primordial in many AI algorithms.</t>

<t>In a nutshell, the first challenge to overcome of embedding AI in a network is the capacity of the hardware to support AI operations (architectural limitation). Considering software equipment such as a virtual switch simplifies the problem but does not totally resolve it as, even in that case, strong line-rate requirement limits the type of programs to be executed. For example, BPF (Berkeley Packet Filter) <xref target="Mcc93"/> programs provides a higher control on packet processing in OVS <xref target="Cha18"/> but still have some limitations, as the execution time of these programs are bounded by nature to ensure their termination, an essential requirement assuming the run-to-completion model which permits high throughput.</t>

<t>The second challenge (resource limitation) of network-embedded AI in the network is to allocate enough resources for AI tasks with a limited impact on other tasks of network devices such as forwarding, monitoring, filtering… Approximation and/or optimization of AI tasks are potential directions to help in this area. For instance, many network monitoring proposals rely on sketches and with a proposed  well-tuned implementation for data-plane <xref target="Liu16"/><xref target="Yan18"/>. However, no general optimized AI-programmable abstraction exists to fit all cases and proposals are mostly use-case centric.  Research direction in NM regarding this issue can benefit from propositions in the field of embedded systems that face the same issues. Binarization of neural networks is one example <xref target="Lia18"/>. Besides, distributed processing is a common technique to distribute the load of a single task between multiple entities. AI task decomposition between network elements, edge servers or controllers has been also proposed <xref target="Gup18"/>.</t>

</section>
<section anchor="DistributedAI"><name>Distributed AI</name>

<t>Distributed AI assumes different related tasks and components to be distributed across computational resources which are possibly heterogeneous. For example, with advances in transfer and Federated Learning (FL), models can be learned, partially shared and combined or data can be also shared to either improve a local or global model. By nature, a network and a networked infrastructure is distributed and is thus well adapted to any distributed applications. This is exacerbated with the deployment of fog infrastructure mixing network and computational resources. Hence, network management can directly benefit to the distributed network structure to solve its own particular problems but any other type of AI-based distributed applications also assumes communication technologies to enable interactions between the different entities. This leads to the two sub-challenges described hereafter.</t>

<section anchor="netManFordistributedAI"><name>Network management for efficient distributed AI</name>

<t>Distributed AI relies on exchanging information between different entities and comes with various requirements in terms of volume, frequency, security, etc. This can be  mapped to network requirements such as latency, bandwidth or confidentiality. Therefore, the network needs to provide adequate resources to support the proper execution of the AI distributed application. While this is true for any distributed application, the nature of the problem that is intended to be solved by an AI application and how this would be solved can be considered. For example, with FL, local models can be shared to create a global model. In case of failure of network links or in case of too high latency, some local models might not be appropriately integrated into the global model with a possible impact on AI performance. Depending on the nature of the latter, it might be better to guarantee high performance communications with a few number of nodes or to ensure connectivity between all of them even with lower network performance. Coupling is thus necessary between the network management plane and the distributed AI applications which leads to a set of questions to be addressed about interfaces, data and information models or protocols. While the network can be adapted or eventually adapt itself to the AI distributed applications, AI applications could also adapt themselves to the underlying network conditions. It paves the way to research on methods to support AI application aware-network management or network-aware AI applications or a mix of both.</t>

</section>
<section anchor="distributed-ai-for-network-management"><name>Distributed AI for network management</name>

<t>For network management applications relying on distributed AI, challenges from <xref target="netManFordistributedAI"></xref> are still valid. Furthermore, network management problems also consider network-specific elements like traffic to be analyzed or configuration to be set on distributed network equipments. Co-locating AI processing and these elements (fully or partially) may help to increase performance. For example, precalculation on traffic data can be offloaded on network routers before being further processed in high-end servers in a data-center. Besides, as data is forwarded through multiple routers, decomposition of AI processes along the forward path is possible <xref target="Jos22"/>. In general, distributed AI-based network management decisions could be made at different nodes in the network based on locally available information <xref target="Sch21"/>. Hence, deployment of AI-based solutions for network management can also take into account various network attributes like network topology, routing policies or network device capability. In that case, management of computational and network resources is even more coupled than in <xref target="netManFordistributedAI"></xref> since the network is both part of the AI pipeline resources and the managed object through AI.</t>

<t>A primary application for distributed AI is for management problems that have a local scope.  One example concerns problems that can be addressed at the edge, involving tasks and control loops that monitor and apply local optimizations to the edge in isolation from activities conducted by other instances across the network.   However, distributed AI can involve techniques in which multiple entities collaborate to solve a global problem. Such solutions lend themselves to problems in which centralized solutions are faced with certain foundational challenges such as security, privacy, and trust:   The need to maintain complete state in a centralized solution may not be practical in some cases due to concerns such as privacy and trust among multiple subdomains which may not want to share all of their data even if they would be willing to collaborate on a problem). Other foundational challenges concern issue related to timeliness, in which distributed solutions may have inherent advanges over centralized solutions as they avoid issues related to delays caused by the need to communicate updates globally and across long distances.</t>

</section>
</section>
<section anchor="ai-for-planning-of-actions"><name>AI for planning of actions</name>

<t>Many tasks in network management revolve around the planning of actions with the purpose of optimizing a network and facilitating the delivery of communication services.  For example, Paths need to be planned and set up in ways that minimize wasted network resources (to optimize cost) while facilitating high network utilization (avoiding bottlenecks and the formation of congestion hotspots) and ensuring resiliency (by making sure that backup paths are not congruent with primary paths).  Other examples were mentioned in <xref target="pbNM"></xref>.</t>

<t>The need for planning only increases with the rise of centralized control planes.  The promise of central control is that decisions can be optimized when made with complete knowledge of relevant context, as opposed to distributed control that needs to rely on local decisions being made with incomplete knowledge while incurring higher overhead to replicate relevant state across multiple systems.  However, as the scale of networks and interconnected systems continues to grow, so does the size of the planning task.  Many problems are NP-hard.  As a result, solutions typically need to rely on heuristics and algorithms that often result in suboptimal outcomes and that are challenging to deploy in a scalable manner.</t>

<t>The emergence of Intent-Based Networking emphasizes the need for automated planning even further.  The concept underlying “intent” is that it should allow users (network operators, not end users of communication services) to articulate desired outcomes without the need to specify how to achieve those outcomes. An Intent-Based System is responsible for translating the intent into courses of action that achieve the desired outcomes and that continue to maintain the outcomes over time. How the necessary courses of action are derived and what planning needs to take place is left open but where the real challenge lies.  Solutions that rely on clever algorithms devised by human developers face the same challenges as any other network management tasks.</t>

<t>These properties (problems with a clearly defined need, whose solution is faced with exploding search spaces and that today rely on algorithms and heuristics that in many cases result only suboptimal outcomes and significant limitations in scale) make automated planning of actions an ideal candidate for the application of AI-based solutions.</t>

<t>AI applications in network management in the past have been largely focusing on classification problems. Examples include analysis by Intrusion Protection Systems of traffic flow patterns to detect suspicious traffic, classification of encrypted traffic for improved QoS treatment based on suspected application type, and prediction of performance parameters based on observations.  In addition, AI has been used for troubleshooting and diagnostics, as well as for automated help and customer support systems.  However, AI-based solutions for the automated planning of actions, including the automated identification of courses of action, have to this point not been explored much.</t>

<t>A much-publicized leap in AI has been the development of AlphaGo <xref target="Sil16"/>.  Instead of using AI to merely solve classification problems, AlphaGo has been successful in automatically deriving winning strategy for board games, specifically the game of Go which features a prohibitively large search space that was long thought to put the ability to play Go at a world class level beyond the reach of problems that AI could solve.   Among the remarkable aspects of Alpha Go is that it is able to identify winning strategies completely on its own, without needing those strategies to be taught or learned by observations assuming the system is aware of rules.</t>

<t>The challenge for AI in network management is hence, where is the equivalent of an Alpha Go that can be applied to network management (and networking) problems?  Specifically, better solutions are needed for solutions that automatically derive plans and courses of actions for network optimization and similar NP-hard problems, such as provided today with only limited effectiveness by controllers and management applications.</t>

<t>Also, the evaluation of AI algorithms to derive courses of actions is more complex than more common regression or classification tasks. Actions need to be applied in order to observe the results it leads to. However, contrary to game playing, solutions need to be applied in the real world, where actions have real effects and consequences. Different orientations can be envisioned. First, incremental application of AI decisions with small steps can allow us to carefully observe and detect unexpected effects. This can be complemented with roll-back techniques. Second, formal verification techniques can be leveraged to verify decisions made by AI are maintained within safety bounds. Third, sandbox environments can be used but they <bcp14>SHOULD</bcp14> be representative enough of the real world. After progress in simulation and emulation, recent research advances lead to the definition of digital twins <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/> which implies a tight coupling between a real system and its digital twin to ensure a parallel but synchronized execution. Alternatively, transfer learning techniques in another promising area to be able to capitalize on ML models applicable on a real word system in a more generic sandbox environment. It is actually also an open problem to make the use of AI more acceptable as highlighted in the dedicated section.</t>

</section>
</section>
<section anchor="netData"><name>Network data as input for ML algorithms</name>

<t>Many applications of AI takes as input data. The quality of the outputs of ML-based techniques are highly dependent on the quality and quantity of data used for learning but also on other parameters. For example, as modern network infrastructures move towards higher speed and scale, they aim to support increasingly more demanding services with strict performance guarantees. These often require resource reconfigurations at run time, in response to emerging network events, so that they can ensure reliable delivery at the expected performance level. Timely observation and detection of events is also of paramount importance for security purposes, and can allow faster execution of remedy actions thus leading to reduced service downtime.</t>

<t>Thus, the challenge of data management is multifaceted as detailed in next subsections.</t>

<section anchor="data-for-ai-based-nm-solutions"><name>Data for AI-based NM solutions</name>

<t>Assuming a network management application, the first problem to address is to define the data to be collected which will be appropriate to obtain accurate results. This data selection can require defining problem-specific data or features (feature engineering).</t>

<t>Firstly, NM has already produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI problems and lead to a mismatch. Indeed, machine learning algorithms only work as desired when data to be analyzed respects properties. Many methods rely on vector-based distances which so supposes that the data encoded into the vector respects the underlying distance semantic. Taking the first n bytes of a packet as vectors and computing distances accordingly is possible but does not embed the semantic of the information carried out in the headers. For example, (deep) learning techniques mostly rely on vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc) but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>. Data to handle can be in a schema-free or eventually text-based format. One example could be the automated annotation of management intents provided in an unstructured textual format (policies descriptions, specifications,) to extract from them management entities and operations. For that purpose, suitable annotation models need to be built using existing NER (Named Entity Recognition) techniques usually applied for NLP. However, this <bcp14>SHALL</bcp14> be carefully crafted or specialized for network management (intent) language which indirectly bounces back to the challenges of AI techniques for NM specified earlier.</t>

<t>Secondly, similar to the problem of mapping AI algorithms with NM problems in section <xref target="problemMapping"></xref>, data to be collected also depends on the NM problem to be solved. The mapping between the data sources and the problem is not straightforward as all dependencies or correlations are not known and some might be expected to be discovered by the AI algorithms themselves. In addition, the types of data to collect can vary over time to maintain the performance of an AI-based application or to adapt it to a new context when learned models are updated dynamically. The problems of collecting relevant data and updating models <bcp14>SHOULD</bcp14> thus be handled conjointly.</t>

<t>Secondly, the behavior of any network is not just derived from the events that can be directly observed, such as network traffic overload, but also from events occurring outside the environment of the network. The information provided by the detectors of such kinds of events, e.g. a natural incident (earthquake, storm), can be used to determine the adaptation of the network to avoid potential problems derived from such events. Those can be provided by big data sources as well as sensors of many kinds. The AI challenge related to this task is to process large amounts of data and associate it with the effects that those events have on the network. It is hard to determine the static and dynamic relation between the data provided by external sources and the specific implications it has in networks. For instance, the effect of a “flash crowd” detected in an external source depends on the relation of a particular network to such an event. This can be addressed by AI and its particular application to network management. The objective is to complement a control-loop, as shown in <xref target="Mar18"/>, by including the specific AI engines into the decision components as well as the processes that close the loop, so the AI engine can receive feedback from the network in order to improve its own behavior. Similar challenges are addressed in other domains, image processing and computer vision, by using artifacts for anticipating movements in object location and identification.</t>

</section>
<section anchor="data-collection"><name>Data collection</name>

<t>Once defined, the second problem to address is the collection of data. Monitoring frameworks have been developed for many years such as IPFIX <xref target="RFC7011"/> and more recently with SDN-based monitoring solutions <xref target="Yu14"/><xref target="Ngu20"/>. However, going towards more AI for actions in network management supposes also to retrieve more than traffic related information. Actually, configuration information such as topologies, routing tables or security policies have been proven to be relevant in specific scenarios. As a result, many different technologies can be used to retrieve meaningful data. To support improved QoE, monitoring of the application layer is helpful but far from being easy with the heterogeneity of end-user applications and the wide use of encrypted channels. Monitoring techniques need to be reinvented through the definition of new techniques to extract knowledge from raw measurement <xref target="Bri19"/> or by involving end-users with crowd-sourcing <xref target="Hir15"/> and distributed monitoring. Also, the data-mesh concept proposes to classify data into three categories: source-aligned, aggregate and consumer-aligned. Source-aligned data are those related to the same operational domain and it is important to correlate or aggregate them with higher planes: management-, control- and forwarding plane. An issue is the difference, not only in the nature of data, but in their volumes and their variety. Some may change rapidly over time (for example network traffic) while other may be quite stable (device state).</t>

<t>The collecting process requirements depend on the kind of processing. We can distinguish two major classes: batch/offline vs real-time/online processing. In particular, real-time monitoring tools are key in enabling dynamic resource management functions to operate on short reconfiguration cycles. However, maintaining an accurate view of the network state requires a vast amount of information to be collected and processed. While efficient mechanisms that extract raw measurement data at line rate have been recently developed, the processing of collected data is still a costly operation. This involves potentially sampling, evaluating and aggregating a vast amount of state information as a response to a diverse set of monitoring queries, before generating accurate reports. One difficult problem resides also in the availability of data as real-time data from different sources to be aggregated may not arrive at the same time requiring so some buffering techniques. Machine learning methods, e.g. based on regression, can be used to intelligently filter the raw measurements and thus reduce the volume of data to process. For example, in <xref target="Tan20"/> the authors proposed an approach in which the classifiers derived for this purpose (according to measurements on traffic properties) can achieve a threefold improvement in the query processing capability. A residual question is the storage of raw measurements. In fact, predicting the lifetime of data is challenging because their analysis may not be planned and triggered by a particular event (for example, an anomaly or attack). As a result, the provisioning of storage capacity can be hard.</t>

<t>In parallel to the continuously increasing dynamicity of networks and complexity of traffic, there is a trend towards more user traffic processing customization <xref target="RFC8986"/><xref target="Li19"/>. As a result, fine grained information about network element states is expected and new propositions have emerged to collect on-path data or in-band network telemetry information <xref target="Tan20b"/>. These new approaches have been designed by introducing much flexibility and customization and could be helpful to be used in conjunction with AI applications. However, the seamless coupling of telemetry processes with packet forwarding requires careful definition of solutions to limit the overhead and the impact of the throughput while providing the necessary level of details. This shares commonalities with the lightweight AI challenge.</t>

</section>
<section anchor="usable-data"><name>Usable data</name>

<t>Although all agree on the necessity to have more shared datasets, it is quite uncommon in practice. Data contains private or sensitive information and may not be shared because of the criticality of data (which can be used by ill-intentioned adversaries) or due to laws or regulations, even within the same company. To solve this issue, anonymization techniques <xref target="Dij19"/> can be enhanced to optimize the trade-off between valuable data vs sensitive information (potential) leakage or reconstruction.
Whatever the final user of data, regulations and laws impose rules on data management with potentially costly impact if they are not respected voluntarily or not. Defining a new monitoring framework should always consider security and privacy aspects, for example to let any user/customer or access/remove its own data with General Data Protection Regulation (GDPR) in EU. The challenge resides here in the capacity of qualifying what is critical or private information and the capacity for an adversary to reconstruct it from other sources of data. Hence AI/ML based solutions will require more data but also more administrative, legal and ethical procedures. Those can last long and so slow down the deployment of a new solution. In addition, this requires interaction with experts from different domains (e.g. AI engineer and a lawyer). The integration of these non-technical constraints should be considered when defining new data to be collected or a new technique to collect data. However, knowing the final use of data is most of the time necessary for ethical and legal assessment which assumes that those considerations <bcp14>SHOULD</bcp14>  be integrated from the early design of new AI-based solutions.</t>

<t>For supervised or semi-supervised training, having a labeled dataset is a prerequisite. It constitutes a major challenge as well. One one hand, collectors are able to retrieve data. On the other hand, those network data are typically unlabeled. This limits application of ML to unsupervised learning tasks (learning from data). Because manual labeling is a tedious task. one option is to leverage AI to guide humans. This may also support a better generalization of a learned model. Indeed, an underlying challenge is the genericity or coverage of the datasets. Labels encode values of an objective function, the challenge posed by the design of such tools is tremendous since for involving a M:N relationship: 1 data type may be associated to M objective function values and N data types may be associated to 1 objective function. As a result, most datasets used for research encodes a single label for a particular application like attack label for datasets to be used in the context of intrusion detection or application type for network traffic used for classification where the value of a single dataset could be capitalized in several applications.</t>

<t>Again, researchers need empirical (or at least realistic) datasets to validate their solutions. Unfortunately, as highlighted above, having such data from real deployments for various reasons (business secrets, privacy concerns, concerns that vulnerabilities are revealed by accident, raw unlabeled data, etc.) is tough. Even if such a dataset is available it might not be enough to convincingly validate a new algorithm.
Instead of falling back to artificial testbed experiments or simulation, it would be useful to have the capability to generate datasets with characteristics that are not 100% identical but similar to the characteristics of one or more real datasets. Such synthetic networks can be used to validate new management algorithms, intrusion detection systems, etc.
The usage of AI (for example GANs) in this area <xref target="Hui22"/> is not yet widespread and there are still many concerns that deter researchers, e.g. the fear of leaking sensitive information from the original dataset into the synthetic dataset.</t>

</section>
</section>
<section anchor="acceptability"><name>Acceptability of AI</name>

<t>Networks are critical infrastructures. On one hand, they <bcp14>SHOULD</bcp14> be operated without interruption and must be interoperable. Networks, except in a lab, are not isolated which slow down innovation in general. For example, changing Internet routing protocols <bcp14>SHOULD</bcp14> be accepted by multiples entities such as operators of interconnected networks. The same applies for protocols. Even if there have been several versions of major protocols in use like TCP or DNS, there are still some security issues which cannot be patched with 100% guarantee. On the other hand, results provided by AI solutions are uncertain by nature. The same technique applied in different environments can produce different results. AI techniques need some effort (time and human) to be properly configured or to be stabilized. For instance, reinforcement learning needs several iterations before being able to produce acceptable results. These properties of AI techniques are thus a bit antagonist with the criticality of network infrastructures. With that in mind, acceptability of AI by network operators is clearly an obstacle for its larger adoption.</t>

<section anchor="explainability"><name>Explainability of Network-AI products</name>

<t>A common issue across many Machine Learning (ML) applications is their lack to provide human-understandable reasoning processes. This means that, after training, the knowledge acquired by ML models is unintelligible to humans. As a result, offering hard guarantees on performance is a very challenging issue. In addition, complex ML models like neural networks -that often have more than hundreds of thousands of parameters- are very hard to debug or troubleshoot in case of failure.</t>

<t>While this is a common issue for all applications of AI, many areas work well with uncertainty and the black-box behavior of AI-based solutions. For instance, users accept an inherent error in recommender systems or computer vision solutions.</t>

<t>The networking field has already produced a set of well-established network management algorithms and methods, with clear performance guarantees and troubleshooting mechanisms <xref target="Rex06"/><xref target="Kr14"/>. As such, improving debugging, troubleshooting and guarantees on AI-based solutions for networking is a must.</t>

<t>AI researchers and practitioners are devoting large research efforts to improve this aspect of ML models, which is commonly known as explainability <xref target="XAI"/>.</t>

<t>This set of techniques provides insights and, in some cases, guarantees on the performance and behavior of ML-based solutions. Understanding such techniques, researching and applying them to network AI is critical for the success of the field.</t>

<t>There exist several ML-based methods that are human-understandable, although not widely used today. For instance, <xref target="Mar20"/> shows a method for building anticipation models (prediction) that provide explanations while determining some actions for tuning some parameters of the network. There are other challenges that <bcp14>SHOULD</bcp14> be addressed, such as providing explanations for other ML methods that are quite extended. For instance, xNN/SVM models can be accompanied by Digital Twins of the network that are reversely explored to explain some output from the ML model (e.g., xNN/SVM). In this context, there already exist several methods <xref target="Zil20"/><xref target="Puj21"/> that produce human-readable interpretations of trained NN models, by analyzing their neural activations on different inputs. (As an aside, it should be noted that Digital Twins are not considered per se an AI approach; they merely serve to provide a digital representation of a network that can serve as its proxy and offer a layer of indirection between management applications and actual network resources. That being said, it is conceivable that AI-based management applications can be combined and operate in conjunction with Digital Twin technology, for example to use a Digital Twins as an experimentation sandbox or staging ground for AI-driven applciations.)</t>

</section>
<section anchor="ai-based-products-and-algorithms-in-production-systems"><name>AI-based products and algorithms in production systems</name>

<t>AI-based network management and optimization algorithms are first trained, then the resulting model is used to produce relevant inferences in operation, either in management or optimization scenarios. A relevant question for the success of AI-based solutions is: where does this training occur?</t>

<t>Traditionally, AI-based models have been trained in the same scenario where they operate<xref target="Val17"/><xref target="Xu18"/>, this is the customer network. However this presents critical drawbacks. First, training an AI model for management and operation typically requires generating network configurations and scenarios that can break the network. This is because training requires seeing a broad spectrum of scenarios. Thus, training in production networks is very challenging. Second, customer networks may not be equipped with the monitoring infrastructure required to collect the data used in the training process (e.g., performance metrics). Actually, performing learning directly into a production network is possible assuming imperfect models and the need of several step of refinement before it gets stable. For non-critical management task, such assumption can hold and additional safe-guarding mechanisms <bcp14>SHOULD</bcp14> be considered in order to keep outputs of ML algorithms (such as decisions) within acceptable boundaries.</t>

<t>A more sensible approach is to train the AI-based product in a lab, for instance in the vendor’s premises. In the lab, AI models can be trained in a controlled testbed, with any configuration, even ones that break the network. However, the main challenge here arises from the fundamental differences between the lab’s network and the customer networks. For instance, the topology of the lab’s network might be smaller, etc. As a result, there is a need for models that are able to generalize. In this context, generalization means that models should be able to operate in other scenarios not seen during training, with different topologies, routing configurations, scheduling policies, etc.</t>

<t>In order to address this generalization problem, multiple complementary approaches are possible: 
One approach is training on diverse data that represents large parts of the expected problem space. For example, training with various different traffic patterns will help improve generalization to unseen but comparable traffic patterns.
Another approach is to leverage AI designs or architectures that facilitate generalization. One example are Graph Neural Networks (GNN) <xref target="gnn1"/><xref target="gnn2"/>. GNNs are a rather novel type of neural network able to operate and generalize over graphs. Indeed, networks are fundamentally represented as graphs: topology, routing, etc. With GNNs, vendors can train the AI model in a lab with a certain topology and then directly use the resulting model in different customer networks, even with different network topologies.
Finally, another approach is Transfer Learning <xref target="tl1"/>. With this technique, the knowledge gained in the lab’s training  is used to operate in the customer network. Transfer Learning still requires that some data from the customer is used to re-train and fine-tune the model (e.g., accurate performance measurements). This means that, for each customer network, re-training is required. This may be problematic since it requires added cost and access to customer data.</t>

<t>In addition to the challenge of generalizing from training to production environment, there are also challenges in terms of interoperability between different AI approaches and different deployment environments.
As mentioned above, AI approaches may be deployed in diverse environments, e.g., for training and production, but also for local development, for testing, and for validation or in different part of the production systems.
These environments may differ in available compute resources, network topology, operating systems, cloud providers, etc. (single node machine, single cluster, many distributed clusters, ...). Deploying the same AI solutions in these different environments can lead to various challenges in terms of interoperability. Common AI frameworks support scaling across networks of different size. Yet, many frameworks are often combined, e.g., for data collection, processing, predictions, validation, etc. Again, ensuring interoperability between these frameworks can be tedious.</t>

<t>This shares some  with problems described in <xref target="DistributedAI"></xref> and particularly emphasizes the need for network environments to provide interfaces and descriptions suitable for AI solutions to be properly instantiated and configured.</t>

<t>One approach to address these interoperability challenges is through meta-frameworks that interface with most available AI frameworks. These meta-frameworks provide a higher level of abstraction and often allow seamless deployment across different environments (e.g., on-premise or at different cloud providers) <xref target="Mor18"/>.</t>

</section>
<section anchor="ai-with-humans-in-the-loop"><name>AI with humans in the loop</name>

<t>Depending on the network management task, AI can automate and replace manual human control or it can complement human experts and keep them in the loop. Keeping humans in the loop will be an important step of building trust in AI approaches and help ensure the desired outcomes.
There are various ways of keeping humans in the loop in the different fields of AI, which could be useful for different aspects of network management.</t>

<t>In classification tasks (e.g., detecting security breaches, malware or detecting anomalies), trained AI models provide a confidence score in addition to the predicted class. If the confidence is high, the prediction is used directly. If the confidence is too low, a human expert may jump in and make the decision - thereby also providing valuable training data to improve the AI model. Such approaches are already being used in industry, e.g., to automatically label datasets (AWS SageMake). Similar approaches could also be used for other supervised learning tasks, e.g., regression. Still, it is an open challenge to keep humans in the loop in all phases of the learning process.</t>

<t>Another field of AI is reinforcement learning, which is useful for taking continuous control decisions in network management, e.g., controlling service scaling and placement as well as flow scheduling and routing over time. Reinforcement learning agents typically interact with the environment (i.e., the simulated or real network) completely autonomously without human feedback. However, there is a growing number of approaches to put human experts back into the loop. One approach is offline reinforcement learning, where the training data does not come from the reinforcement learning agent’s own exploration but from pre-recorded traces of human experts (e.g., placement decisions that were made by humans before). Another approach is to reward the reinforcement learning agent based on human feedback rather than a pre-defined reward function <xref target="Lee21"/>. Again, while there are first promising approaches, more work is required in this area.
Overall, it is an open challenge to both leverage the benefits of AI but keep human experts in the loop where it is useful.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security considerations</name>

<t>This document introduces the challenges of coupling AI and NM. Since the aim of this document is not to address a particular NM problem by defining a solution and because many possible ones can be developed further to address the proposed challenge, it is not possible at this stage to define security concerns specific to a solution. However, examples of applications mentioned and cited in the different sections may face their own security concerns. In this section, our objective is to highlight high-level security considerations to be considered when coupling AI and NM. Those concerns serves as the common basis to be refined according when a particular NM application is developped.</t>

<section anchor="ai-based-security-solutions"><name>AI-based security solutions</name>

<t>The first security consideration refers to the use of AI for NM problem related to security of the managed networked systems. There are multiple scenarios where AI can be leveraged: to perform traffic filtering, to detect anomalies or to decide on target moving defence strategies. In these cases, the performance of the AI algorithms impacts on the security performance (e.g. detection or mitigation effectiveness) like any other non-AI system. However, AI methods generally tends to obfuscate how predictions are made and decisions taken. Explainability of AI is thus highly important. This is why this concern is addressed globally in this document in section <xref target="explainability"></xref> as it is a general problem that can impact on any other type of NM applications.</t>

<t>Assuming a ML trained model, there is always an uncertainty regarding reachable performance on the wild once the solution is deployed as it can suffer from a poor generalization due to different reasons. There are two major problems which are well known in the ML field: overfitting or under-fitting.  In the first case, the learned model is too specific to the training data while in the second case the model does not infer any valuable knowledge from data. To avoid these issues, hyper-parameter fine-tuning is necessary. For example, the number of iterations is an essential hyper-parameter to be adjusted to learn a neural network model. If it is too low, the learning does not converge to a representative model of the training data (underfitting). With a high value, there is a risk that the model is too close to the training data (overfitting). In general, finding the right hyper-parameters is helpful to find a good ML algorithm configurations. There are different techniques ranging from grid-search to bayesian optimization falling into the AI area of Hyper-Parameter Optimization (HPO) <xref target="Bis23"/>. This consideration goes beyond the sole problem of hyper-parameters settings but as a full analysis pipeline also assumes the ML algorithm to be selected or the data pre-processing to be configured. This reflects challenges from the AI research area covered by AutoMl technique. In this document, this is also referred in section <xref target="tailoringAI"></xref> when considered in the context of NM. As highlighted in the aforementioned section, some expertise or area-specific knowledge can help guiding automated configuration processes.</t>

<t>Besides, machine learning assumes to have representative training data. The quality of dataset for learning is a vast problem. Additionally, the representation of data needs to be addressed carefully to be properly analyzed by AI models, for example with pre-processing techniques to normalize data, balance classes or encode categorical features depending on the type of algorithms. Actually, <xref target="netData"></xref> of this document fully addresses the concerns related to data in regards to NM problems.</t>

</section>
<section anchor="security-of-ai"><name>Security of AI</name>

<t>Although ensuring a good performance of AI algorithms is already challenging, assuming an attacker aiming at compromising it emphasizes the problem. Adversarial AI and notably adversarial ML have attracted a lot of attention over the last year. Adversarial AI and ML relates to both attack and defences. While this is out of scope of the document, evaluating threats against an ML system before deploying it is an important aspect. This supposes to assess what types of information the attacker can access (training data, trained model, algorithm configuration...) and the performable malicious actions (inject false training data, test the system, poison a model,  etc.) to evaluate the magnitude of the impact of possible attacks.</t>

<t>For illustration purposes, we refer hereafter to some examples. In the case of an intrusion detector, an attacker may try to compromise training data by providing adversarial samples to ensure that the detector will miss-classify the future attacks <xref target="Jmi22"/>. In a white-box approach where the model is known from the attacker, the attack can be carefully crafted to avoid being properly labeled. For instance, packet sizes and timings can be easily modified to bypass ML-based traffic classification system <xref target="Nas21"/>. In a black-box model, the attacker ignores the functioning or training data of the ML systems but can try to infer some information. For example, the attacker can try to reconstruct sensitive information which have been used for training. This type of attack qualified as model inversion <xref target="Fre15"/> raises concern regarding privacy.</t>

<t>All these threats are exacerbated in the context of solutions relying on distributed AI involving multiple entities that are not necessarily controlled by the same authority. Once the threats are assessed, solutions needs to be developed and deployed which can be either proactive by providing some guarantees regarding the involved entities using authentication or trust mechanisms but also reactive by validating data processing through voting mechanisms or knowledge proofs. Other solutions include defensive techniques to rate limit or filter queries to a particular deployed model. All these examples are for illustration purposes and are not exhaustive.</t>

</section>
<section anchor="relevance-of-ai-based-outputs"><name> Relevance of AI-based outputs</name>

<t>Security breaches can be created by an AI-driven application. Actually,any system that will be use to guide or advice on actions to be perform on network raise the same issue. For example, if an AI algorithm decide to change the filtering tables in a network it may compromise access control policies. Irrelevant results could be also produced. In the area of QoS, an AI system could allocate a bandwidth to a flow higher to the real link capacity. As shown from these two examples, an AI can produce decisions or values which are out of bounds of normal operations. To avoid such issues, safeguards can be added to discard or correct irrelevant outputs. Detecting such type of outputs can be also challenging in complex and distributed systems such as a network. Formal verification methods or testing techniques are helpful in that context.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC7011;
&RFC8986;
&RFC9315;
&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References'>

&I-D.irtf-nmrg-network-digital-twin-arch;
<reference anchor="Mcc93" >
  <front>
    <title>The BSD packet filter: a new architecture for user-level packet capture</title>
    <author initials="S." surname="McCanne" fullname="Steve McCanne">
      <organization></organization>
    </author>
    <author initials="V." surname="Jacobson" fullname="Van Jacobson">
      <organization></organization>
    </author>
    <date year="1993"/>
  </front>
<annotation>USENIX Winter Conference</annotation></reference>
<reference anchor="Ste92" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="D." surname="Stern" fullname="Daniel Stern">
      <organization></organization>
    </author>
    <author initials="P." surname="Chemouil" fullname="Prosper Chemouil">
      <organization></organization>
    </author>
    <date year="1992"/>
  </front>
<annotation>Networks, Kobe, Japan</annotation></reference>
<reference anchor="Abd10" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="K. A." surname="Jalil" fullname="Kamarularifin Abd Jalil">
      <organization></organization>
    </author>
    <author initials="M. H." surname="Kamarudin" fullname="Muhammad Hilmi Kamarudin">
      <organization></organization>
    </author>
    <author initials="M. N." surname="Masrek" fullname="Mohamad Noorman Masrek">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>IEEE international conference on networking and information technology</annotation></reference>
<reference anchor="Beg19" >
  <front>
    <title>DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning</title>
    <author initials="D." surname="Bega" fullname="D. Bega">
      <organization></organization>
    </author>
    <author initials="M." surname="Gramaglia" fullname="M. Gramaglia">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <author initials="A." surname="Banchs" fullname="A. Banchs">
      <organization></organization>
    </author>
    <author initials="X." surname="Costa-Perez" fullname="X. Costa-Perez">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="Bos13" >
  <front>
    <title>Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="H.-S." surname="Kim" fullname="Hun-Seok Kim">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="F." surname="Mujica" fullname="Fernando Mujica">
      <organization></organization>
    </author>
    <author initials="M." surname="Horowitz" fullname="Mark Horowitz">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Bos14" >
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="D." surname="Daly" fullname="Dan Daly">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard-" fullname="Martin Izzard-">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
      <organization></organization>
    </author>
    <author initials="D." surname="Talayco" fullname="Dan Talayco">
      <organization></organization>
    </author>
    <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="D." surname="Walker" fullname="David Walker">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>SIGCOMM Comput. Commun. Rev. 44</annotation></reference>
<reference anchor="Dat18" >
  <front>
    <title>P4Guard: Designing P4 Based Firewall</title>
    <author initials="R." surname="Datta" fullname="R. Datta">
      <organization></organization>
    </author>
    <author initials="S." surname="Choi" fullname="S. Choi">
      <organization></organization>
    </author>
    <author initials="A." surname="Chowdhary" fullname="A. Chowdhary">
      <organization></organization>
    </author>
    <author initials="Y." surname="Park," fullname="Y. Park,">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Military Communications Conference (MILCOM)</annotation></reference>
<reference anchor="Che19" >
  <front>
    <title>P4-Enabled Bandwidth Management</title>
    <author initials="Y." surname="Chen" fullname="Y. Chen">
      <organization></organization>
    </author>
    <author initials="L." surname="Yen" fullname="L. Yen">
      <organization></organization>
    </author>
    <author initials="W." surname="Wang" fullname="W. Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Chuang" fullname="C. Chuang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Y. Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Tseng" fullname="C. Tseng">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>Asia-Pacific Network Operations and Management Symposium (APNOMS)</annotation></reference>
<reference anchor="Cha18" >
  <front>
    <title>Oko: Extending Open vSwitch with Stateful Filters</title>
    <author initials="P." surname="Chaignon" fullname="Paul Chaignon">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="T." surname="Delmas" fullname="Thibault Delmas">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM Symposium on SDN Research (SOSR)</annotation></reference>
<reference anchor="czb20" >
  <front>
    <title>Network Management 2030: Operations and Control of Network 2030 Services</title>
    <author initials="A." surname="Clemm" fullname="A. Clemm">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Zhani" fullname="M. F. Zhani">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Springer Journal of Network and Systems Management (JNSM)</annotation></reference>
<reference anchor="Hua19" >
  <front>
    <title>Addressing the Loss-Metric Mismatch with Adaptive Loss Alignment</title>
    <author initials="C." surname="Huang" fullname="Chen Huang">
      <organization></organization>
    </author>
    <author initials="S." surname="Zhai" fullname="Shuangfei Zhai">
      <organization></organization>
    </author>
    <author initials="W." surname="Talbott" fullname="Walter Talbott">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Bautista" fullname="Miguel Angel Bautista">
      <organization></organization>
    </author>
    <author initials="S.-Y." surname="Sun" fullname="Shih-Yu Sun">
      <organization></organization>
    </author>
    <author initials="C." surname="Guestrin" fullname="Carlos Guestrin">
      <organization></organization>
    </author>
    <author initials="J." surname="Susskind" fullname="Josh Susskind">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ICRL</annotation></reference>
<reference anchor="Jos22" >
  <front>
    <title>NetREC Network-wide in-network REal-value Computation.</title>
    <author initials="M." surname="Jose" fullname="Matthews Jose">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE International Conference on Network Softwarization (NetSoft)</annotation></reference>
<reference anchor="Lee21" >
  <front>
    <title>Feedback-efficient interactive reinforcement learning via relabeling experience and unsupervised pre-training</title>
    <author initials="K." surname="Lee" fullname="K. Lee">
      <organization></organization>
    </author>
    <author initials="L." surname="Smith" fullname="L. Smith">
      <organization></organization>
    </author>
    <author initials="P." surname="Abbeel" fullname="P. Abbeel">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>arXiv preprint arXiv:2106.05091</annotation></reference>
<reference anchor="Lia18" >
  <front>
    <title>FP-BNN: Binarized neural network on FPGA</title>
    <author initials="S." surname="Liang" fullname="Shuang Liang">
      <organization></organization>
    </author>
    <author initials="S." surname="Yin" fullname="Shouyi Yin">
      <organization></organization>
    </author>
    <author initials="L." surname="Liu" fullname="Leibo Liu">
      <organization></organization>
    </author>
    <author initials="W." surname="Luk" fullname="Wayne Luk">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Shaojun Wei">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Neurocomputing, Volume 275</annotation></reference>
<reference anchor="Liu16" >
  <front>
    <title>One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon</title>
    <author initials="Z." surname="Liu" fullname="Zaoxing Liu">
      <organization></organization>
    </author>
    <author initials="A." surname="Manousis" fullname="Antonis Manousis">
      <organization></organization>
    </author>
    <author initials="G." surname="Vorsanger" fullname="Gregory Vorsanger">
      <organization></organization>
    </author>
    <author initials="V." surname="Sekar" fullname="Vyas Sekar">
      <organization></organization>
    </author>
    <author initials="V." surname="Braverman" fullname="Vladimir Braverman">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Yan18" >
  <front>
    <title>Elastic sketch: adaptive and fast network-wide measurements</title>
    <author initials="T." surname="Yang" fullname="Tong Yang">
      <organization></organization>
    </author>
    <author initials="J." surname="Jiang" fullname="Jie Jiang">
      <organization></organization>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization></organization>
    </author>
    <author initials="Q." surname="Huang" fullname="Qun Huang">
      <organization></organization>
    </author>
    <author initials="J." surname="Gong" fullname="Junzhi Gong">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhou" fullname="Yang Zhou">
      <organization></organization>
    </author>
    <author initials="R." surname="Miao" fullname="Rui Miao">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xiaoming Li">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="Steve Uhlig">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Gup18" >
  <front>
    <title>Sonata: query-driven streaming network telemetry</title>
    <author initials="A." surname="Gupta" fullname="Arpit Gupta">
      <organization></organization>
    </author>
    <author initials="R." surname="Harrison" fullname="Rob Harrison">
      <organization></organization>
    </author>
    <author initials="M." surname="Canini" fullname="Marco Canini">
      <organization></organization>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="W." surname="Willinger" fullname="Walter Willinger">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Mar18" >
  <front>
    <title>Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Harai" fullname="Hiroaki Harai">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, Vol. 15, N. 2,</annotation></reference>
<reference anchor="Mar20" >
  <front>
    <title>Explained Intelligent Management Decisions in Virtual Networks and Network Slices</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Asaeda" fullname="H. Asaeda">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</annotation></reference>
<reference anchor="Mus18" >
  <front>
    <title>An overview on application of machine learning techniques in optical networks</title>
    <author initials="F." surname="Musumeci" fullname="F. Musumeci">
      <organization></organization>
    </author>
    <author initials="C." surname="Rottondi" fullname="C. Rottondi">
      <organization></organization>
    </author>
    <author initials="A." surname="Nag" fullname="A. Nag">
      <organization></organization>
    </author>
    <author initials="I." surname="Macaluso" fullname="I. Macaluso">
      <organization></organization>
    </author>
    <author initials="D." surname="Zibar" fullname="D. Zibar">
      <organization></organization>
    </author>
    <author initials="M." surname="Ruffini" fullname="M. Ruffini">
      <organization></organization>
    </author>
    <author initials="M." surname="Tornatore" fullname="M. Tornatore">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 21(2), 1383-1408.</annotation></reference>
<reference anchor="Ngu20" >
  <front>
    <title>Efficient SDN-based traffic monitoring in IoT networks with double deep Q-network</title>
    <author initials="T. G." surname="Nguyen" fullname="T. G. Nguyen">
      <organization></organization>
    </author>
    <author initials="T. V." surname="Phan" fullname="T. V. Phan">
      <organization></organization>
    </author>
    <author initials="D. T." surname="Hoang" fullname="D. T. Hoang">
      <organization></organization>
    </author>
    <author initials="T. N." surname="Nguyen" fullname="T. N. Nguyen">
      <organization></organization>
    </author>
    <author initials="C." surname="So-In" fullname="C. So-In">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>International conference on computational data and social networks, Springer</annotation></reference>
<reference anchor="Tan20" >
  <front>
    <title>Classification-assisted Query Processing for Network Telemetry</title>
    <author initials="G." surname="Tangari" fullname="G. Tangari">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="M. Charalambides">
      <organization></organization>
    </author>
    <author initials="G." surname="Pavlou" fullname="G. Pavlou">
      <organization></organization>
    </author>
    <author initials="C." surname="Grazian" fullname="C. Grazian">
      <organization></organization>
    </author>
    <author initials="D." surname="Tuncer" fullname="D. Tuncer">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Network Traffic Measurement and Analysis Conference (TMA)</annotation></reference>
<reference anchor="Tan20b" >
  <front>
    <title>In-band Network Telemetry: A Survey</title>
    <author initials="T." surname="Lizhuang" fullname="Tan, Lizhuang">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Su, Wei">
      <organization></organization>
    </author>
    <author initials="Z." surname="Zhenyi" fullname="Zhang, Zhenyi">
      <organization></organization>
    </author>
    <author initials="M." surname="Jingying" fullname="Miao, Jingying">
      <organization></organization>
    </author>
    <author initials="L." surname="Xiaoxi" fullname="Liu, Xiaoxi">
      <organization></organization>
    </author>
    <author initials="L." surname="Na" fullname="Li, Na">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Computer Networks. 186. 10.1016</annotation></reference>
<reference anchor="Val17" >
  <front>
    <title>Learning to route</title>
    <author initials="V." surname="A." fullname="Valadarsky, A.">
      <organization></organization>
    </author>
    <author initials="S." surname="M." fullname="Schapira, M.">
      <organization></organization>
    </author>
    <author initials="S." surname="D." fullname="Shahaf, D.">
      <organization></organization>
    </author>
    <author initials="T." surname="A." fullname="Tamar, A.">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>ACM HotNets</annotation></reference>
<reference anchor="Xu18" >
  <front>
    <title>Experience-driven networking: A deep reinforcement learning based approach</title>
    <author initials="X." surname="Z." fullname="Xu, Z.">
      <organization></organization>
    </author>
    <author initials="T." surname="J." fullname="Tang J.">
      <organization></organization>
    </author>
    <author initials="M." surname="J." fullname="Meng, J.">
      <organization></organization>
    </author>
    <author initials="Z." surname="W." fullname="Zhang, W.">
      <organization></organization>
    </author>
    <author initials="W." surname="Y." fullname="Wang, Y.">
      <organization></organization>
    </author>
    <author initials="L. C." surname="H." fullname="Liu, C. H.">
      <organization></organization>
    </author>
    <author initials="Y." surname="D." fullname="Yang, D.">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="tl1" >
  <front>
    <title>Transfer learning</title>
    <author initials="L." surname="Torrey" fullname="Lisa Torrey">
      <organization></organization>
    </author>
    <author initials="J." surname="Shavlik" fullname="Jude Shavlik">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>Handbook of research on machine learning applications and trends: algorithms, methods, and techniques</annotation></reference>
<reference anchor="gnn1" >
  <front>
    <title>Relational inductive biases, deep learning, and graph networks</title>
    <author initials="P. W." surname="Battaglia" fullname="Peter W. Battaglia">
      <organization></organization>
    </author>
    <author initials="E." surname="al" fullname="Et. al">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>arXiv preprint arXiv:1806.01261</annotation></reference>
<reference anchor="gnn2" >
  <front>
    <title>Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN</title>
    <author initials="K." surname="Rusek" fullname="K. Rusek">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="J. Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="A." surname="Mestres" fullname="A. Mestres">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="P. Barlet-Ros">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM Symposium on SDN Research</annotation></reference>
<reference anchor="Rex06" >
  <front>
    <title>Route optimization in IP networks</title>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<annotation>Handbook of Optimization in Telecommunications (pp. 679-700), Springer</annotation></reference>
<reference anchor="Kr14" >
  <front>
    <title>Software-defined networking: A comprehensive survey</title>
    <author initials="D." surname="Kreutz" fullname="D. Kreutz">
      <organization></organization>
    </author>
    <author initials="F. M." surname="Ramos" fullname="F. M. Ramos">
      <organization></organization>
    </author>
    <author initials="P. E." surname="Verissimo" fullname="P. E. Verissimo">
      <organization></organization>
    </author>
    <author initials="C. E." surname="Rothenberg" fullname="C. E. Rothenberg">
      <organization></organization>
    </author>
    <author initials="S." surname="Azodolmolky" fullname="S. Azodolmolky">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="S. Uhlig">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76</annotation></reference>
<reference anchor="XAI" >
  <front>
    <title>Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models</title>
    <author initials="W." surname="Samek" fullname="Wojciech Samek">
      <organization></organization>
    </author>
    <author initials="T." surname="Wiegand" fullname="Thomas Wiegand">
      <organization></organization>
    </author>
    <author initials="K.-R." surname="Müller" fullname="Klaus-Robert Müller">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>arXiv preprint arXiv:1708.08296</annotation></reference>
<reference anchor="Zil20" >
  <front>
    <title>Interpreting Deep Learning-Based Networking Systems</title>
    <author initials="Z." surname="Meng" fullname="Zili Meng">
      <organization></organization>
    </author>
    <author initials="M." surname="Wang" fullname="Minhu Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Bai" fullname="Jiasong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Xu" fullname="Mingwei Xu">
      <organization></organization>
    </author>
    <author initials="H." surname="Mao" fullname="Hongzi Mao">
      <organization></organization>
    </author>
    <author initials="H." surname="Hu" fullname="Hongxin Hu">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Mor18" >
  <front>
    <title>Ray: A Distributed Framework for Emerging AI Applications</title>
    <author initials="P." surname="Moritz" fullname="Philipp Moritz">
      <organization></organization>
    </author>
    <author initials="R." surname="Nishihara" fullname="Robert Nishihara">
      <organization></organization>
    </author>
    <author initials="S." surname="Wang" fullname="Stephanie Wang">
      <organization></organization>
    </author>
    <author initials="A." surname="Tumanov" fullname="Alexey Tumanov">
      <organization></organization>
    </author>
    <author initials="R." surname="Liaw" fullname="Richard Liaw">
      <organization></organization>
    </author>
    <author initials="E." surname="Liang" fullname="Eric Liang">
      <organization></organization>
    </author>
    <author initials="M." surname="Elibol" fullname="Melih Elibol">
      <organization></organization>
    </author>
    <author initials="Z." surname="Yang" fullname="Zongheng Yang">
      <organization></organization>
    </author>
    <author initials="W." surname="Paul" fullname="William Paul">
      <organization></organization>
    </author>
    <author initials="M." surname="Jordan" fullname="Michael Jordan">
      <organization></organization>
    </author>
    <author initials="I." surname="Stoica" fullname="Ion Stoica">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>USENIX Symposium on Operating Systems Design and Implementation (OSDI)</annotation></reference>
<reference anchor="Puj21" >
  <front>
    <title>NetXplain: Real-time explainability of Graph Neural Networks applied to Computer Networks</title>
    <author initials="D." surname="Pujol-Perich" fullname="David Pujol-Perich">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="José Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="S." surname="Xiao" fullname="Shihan Xiao">
      <organization></organization>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabello" fullname="Albert Cabello">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="Pere Barlet-Ros">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>MLSys workshop on Graph Neural Networks and Systems (GNNSys)</annotation></reference>
<reference anchor="Li19" >
  <front>
    <title>A Framework for Qualitative Communications Using Big Packet Protocol</title>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization></organization>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization></organization>
    </author>
    <author initials="H." surname="Yousefi" fullname="Hamed Yousefi">
      <organization></organization>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization></organization>
    </author>
    <author initials="L." surname="Dong" fullname="Lijun Dong">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck." fullname="Filip De Turck.">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM SIGCOMM Workshop on Networking for Emerging Applications and Technologies (NEAT)</annotation></reference>
<reference anchor="Hir15" >
  <front>
    <title>Crowdsourced network measurements: Benefits and best practices</title>
    <author initials="M." surname="Hirth" fullname="Matthias Hirth">
      <organization></organization>
    </author>
    <author initials="T." surname="Hossfeld" fullname="Tobias Hossfeld">
      <organization></organization>
    </author>
    <author initials="M." surname="Mellia" fullname="Marco Mellia">
      <organization></organization>
    </author>
    <author initials="C." surname="Schwartz" fullname="Christian Schwartz">
      <organization></organization>
    </author>
    <author initials="F." surname="Lehrieder" fullname="Frank Lehrieder">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Computer Networks. 90</annotation></reference>
<reference anchor="Bri19" >
  <front>
    <title>Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic</title>
    <author initials="P.-O." surname="Brissaud" fullname="Pierre-Olivier Brissaud">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
      <organization></organization>
    </author>
    <author initials="T." surname="Cholez" fullname="Thibault Cholez">
      <organization></organization>
    </author>
    <author initials="O." surname="Bettan" fullname="Olivier Bettan">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 16 (3)</annotation></reference>
<reference anchor="Hoo18" >
  <front>
    <title>Updated Taxonomy for the Network and Service Management Research Field</title>
    <author initials="J. V. D." surname="Hooft" fullname="Jeroen Van Der Hooft">
      <organization></organization>
    </author>
    <author initials="M." surname="Claeys" fullname="Maxim Claeys">
      <organization></organization>
    </author>
    <author initials="N." surname="Bouten" fullname="Niels Bouten">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
      <organization></organization>
    </author>
    <author initials="A. P. B." surname="Stiller" fullname="Aiko Pras, Burkhard Stiller">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="Marinos Charalambides">
      <organization></organization>
    </author>
    <author initials="R." surname="Badonnel" fullname="Rémi Badonnel">
      <organization></organization>
    </author>
    <author initials="J." surname="Serrat" fullname="Joan Serrat">
      <organization></organization>
    </author>
    <author initials="C. R. P. D." surname="Santos" fullname="Carlos Raniery Paula Dos Santos">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck" fullname="Filip De Turck">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Network System Managemen (JNSM) 26, 790–808</annotation></reference>
<reference anchor="Bou18" >
  <front>
    <title>A comprehensive survey on machine learning for networking: evolution, applications and research opportunities</title>
    <author initials="R." surname="Boutaba" fullname="Raouf Boutaba">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Salahuddin" fullname="Mohammad A. Salahuddin">
      <organization></organization>
    </author>
    <author initials="N." surname="Limam" fullname="Noura Limam">
      <organization></organization>
    </author>
    <author initials="S." surname="Ayoubi" fullname="Sara Ayoubi">
      <organization></organization>
    </author>
    <author initials="N." surname="Shahriar" fullname="Nashid Shahriar">
      <organization></organization>
    </author>
    <author initials="F." surname="Estrada-Solano" fullname="Felipe Estrada-Solano">
      <organization></organization>
    </author>
    <author initials="O. M." surname="Caicedo" fullname="Oscar M. Caicedo">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Internet Services and Applications 9, 16</annotation></reference>
<reference anchor="Kaf19" >
  <front>
    <title>Automation of 5G Network Slice Control Functions with Machine Learning</title>
    <author initials="V. P." surname="Kafle" fullname="V. P. Kafle">
      <organization></organization>
    </author>
    <author initials="P." surname="Martinez-Julia" fullname="P. Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="T." surname="Miyazawa" fullname="T. Miyazawa">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Communications Standards Magazine, vol. 3, no. 3, pp. 54-62</annotation></reference>
<reference anchor="Yan20" >
  <front>
    <title>Artificial-Intelligence-Enabled Intelligent 6G Networks</title>
    <author initials="H." surname="Yang" fullname="H. Yang">
      <organization></organization>
    </author>
    <author initials="A." surname="Alphones" fullname="A. Alphones">
      <organization></organization>
    </author>
    <author initials="Z." surname="Xiong" fullname="Z. Xiong">
      <organization></organization>
    </author>
    <author initials="D." surname="Niyato" fullname="D. Niyato">
      <organization></organization>
    </author>
    <author initials="J." surname="Zhao" fullname="J. Zhao">
      <organization></organization>
    </author>
    <author initials="K." surname="Wu," fullname="K. Wu,">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE Network, vol. 34, no. 6, pp. 272-280</annotation></reference>
<reference anchor="Lop20" >
  <front>
    <title>Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches</title>
    <author initials="J." surname="López" fullname="J. López">
      <organization></organization>
    </author>
    <author initials="M." surname="Labonne" fullname="M. Labonne">
      <organization></organization>
    </author>
    <author initials="C." surname="Poletti" fullname="C. Poletti">
      <organization></organization>
    </author>
    <author initials="D." surname="Belabed" fullname="D. Belabed">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Symposium on Network Computing and Applications (NCA)</annotation></reference>
<reference anchor="Sen04" >
  <front>
    <title>Accurate, scalable in-network identification of p2p traffic using application signatures</title>
    <author initials="S." surname="Sen" fullname="Subhabrata Sen">
      <organization></organization>
    </author>
    <author initials="O." surname="Spatscheck" fullname="Oliver Spatscheck">
      <organization></organization>
    </author>
    <author initials="D." surname="Wang" fullname="Dongmei Wang">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
<annotation>ACM International conference on World Wide Web (WWW)</annotation></reference>
<reference anchor="Rin17" >
  <front>
    <title>IP2Vec: Learning Similarities Between IP Addresses</title>
    <author initials="M." surname="Ring" fullname="M. Ring">
      <organization></organization>
    </author>
    <author initials="A." surname="Dallmann" fullname="A. Dallmann">
      <organization></organization>
    </author>
    <author initials="D." surname="Landes" fullname="D. Landes">
      <organization></organization>
    </author>
    <author initials="A." surname="Hotho" fullname="A. Hotho">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>IEEE International Conference on Data Mining Workshops (ICDMW)</annotation></reference>
<reference anchor="Evr19" >
  <front>
    <title>port2dist: Semantic Port Distances for Network Analytics</title>
    <author initials="L." surname="Evrard" fullname="Laurent Evrard">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="J.-N." surname="Colin" fullname="Jean-Noël Colin">
      <organization></organization>
    </author>
    <author initials="F." surname="Beck" fullname="Frédéric Beck">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</annotation></reference>
<reference anchor="Sol20" >
  <front>
    <title>A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks</title>
    <author initials="H. M." surname="Soliman" fullname="Hazem M. Soliman">
      <organization></organization>
    </author>
    <author initials="G." surname="Salmon" fullname="Geoff Salmon">
      <organization></organization>
    </author>
    <author initials="D." surname="Sovilij" fullname="Dusan Sovilij">
      <organization></organization>
    </author>
    <author initials="M." surname="Rao" fullname="Mohan Rao">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Conference on Cloud Networking (CloudNet)</annotation></reference>
<reference anchor="Sco11" >
  <front>
    <title>On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses</title>
    <author initials="S. E." surname="Coull" fullname="Scott E. Coull">
      <organization></organization>
    </author>
    <author initials="F." surname="Monrose" fullname="Fabian Monrose">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<annotation>NDSS</annotation></reference>
<reference anchor="Xie18" >
  <front>
    <title>A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges</title>
    <author initials="J." surname="Xie" fullname="Junfeng Xie">
      <organization></organization>
    </author>
    <author initials="F. R." surname="Yu" fullname="F. Richard Yu">
      <organization></organization>
    </author>
    <author initials="T." surname="Huang" fullname="Tao Huang">
      <organization></organization>
    </author>
    <author initials="R." surname="Xie" fullname="Renchao Xie">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jiang Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Wang" fullname="Chenmeng Wang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Yunjie Liu">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials</annotation></reference>
<reference anchor="Yu14" >
  <front>
    <title>Distributed and collaborative traffic monitoring in software defined networks</title>
    <author initials="Y." surname="Yu" fullname="Ye Yu">
      <organization></organization>
    </author>
    <author initials="C." surname="Qian" fullname="Chen Qian">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Hot topics in software defined networking</annotation></reference>
<reference anchor="Dij19" >
  <front>
    <title>A Survey of Network Traffic Anonymisation Techniques and Implementations</title>
    <author initials="N. V." surname="Dijkhuizen" fullname="Niels Van Dijkhuizen">
      <organization></organization>
    </author>
    <author initials="J. V. D." surname="Ham" fullname="Jeroen Van Der Ham">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Comput. Surv. 51, 3, Article 52</annotation></reference>
<reference anchor="Sch21" >
  <front>
    <title>Distributed Online Service Coordination Using Deep Reinforcement Learning</title>
    <author initials="S." surname="Schneider" fullname="Stefan Schneider">
      <organization></organization>
    </author>
    <author initials="H." surname="Qarawlus" fullname="Haydar Qarawlus">
      <organization></organization>
    </author>
    <author initials="H." surname="Karl" fullname="Holger Karl">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE International Conference on Distributed Computing Systems (ICDCS)</annotation></reference>
<reference anchor="Hui22" >
  <front>
    <title>Knowledge Enhanced GAN for IoT Traffic Generation</title>
    <author initials="S." surname="Hui" fullname="Shuodi Hui">
      <organization></organization>
    </author>
    <author initials="H." surname="Wang" fullname="Huandong Wang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Wang" fullname="Zhenhua Wang">
      <organization></organization>
    </author>
    <author initials="X." surname="Yang" fullname="Xinghao Yang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhongjin Liu">
      <organization></organization>
    </author>
    <author initials="D." surname="Jin" fullname="Depeng Jin">
      <organization></organization>
    </author>
    <author initials="Y." surname="Li" fullname="Yong Li">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>ACM Web Conference 2022 (WWW)</annotation></reference>
<reference anchor="Sil16" >
  <front>
    <title>Mastering the game of Go with deep neural networks and tree search</title>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="A." surname="Huang" fullname="Aja Huang">
      <organization></organization>
    </author>
    <author initials="C. J." surname="Maddison" fullname="Christopher J. Maddison">
      <organization></organization>
    </author>
    <author initials="A." surname="Guez" fullname="Arthur Guez">
      <organization></organization>
    </author>
    <author initials="L." surname="Sifre" fullname="Laurent Sifre">
      <organization></organization>
    </author>
    <author initials="G. V. D." surname="Driessche" fullname="George Van Den Driessche">
      <organization></organization>
    </author>
    <author initials="J." surname="Schrittwieser" fullname="Julian Schrittwieser">
      <organization></organization>
    </author>
    <author initials="I." surname="Antonoglou" fullname="Ioannis Antonoglou">
      <organization></organization>
    </author>
    <author initials="V." surname="Panneershelvam" fullname="Veda Panneershelvam">
      <organization></organization>
    </author>
    <author initials="M." surname="Lanctot" fullname="Marc Lanctot">
      <organization></organization>
    </author>
    <author initials="S." surname="Dieleman" fullname="Sander Dieleman">
      <organization></organization>
    </author>
    <author initials="D." surname="Grewe" fullname="Dominik Grewe">
      <organization></organization>
    </author>
    <author initials="J." surname="Nham" fullname="John Nham">
      <organization></organization>
    </author>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="I." surname="Sutskever" fullname="Ilya Sutskever">
      <organization></organization>
    </author>
    <author initials="T." surname="Lillicrap" fullname="Timothy Lillicrap">
      <organization></organization>
    </author>
    <author initials="M." surname="Leach" fullname="Madeleine Leach">
      <organization></organization>
    </author>
    <author initials="K." surname="Kavukcuoglu" fullname="Koray Kavukcuoglu">
      <organization></organization>
    </author>
    <author initials="T." surname="Graepel" fullname="Thore Graepel">
      <organization></organization>
    </author>
    <author initials="D." surname="Hassabis" fullname="Demis Hassabis">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>Nature, vol. 529 (2016), pp. 484-503</annotation></reference>
<reference anchor="Nas21" >
  <front>
    <title>Defeating DNN-Based Traffic Analysis Systems inReal-Time With Blind Adversarial Perturbations</title>
    <author initials="M." surname="Nasr" fullname="M. Nasr">
      <organization></organization>
    </author>
    <author initials="A." surname="Bahramali" fullname="A. Bahramali">
      <organization></organization>
    </author>
    <author initials="A." surname="Houmansadr" fullname="A. Houmansadr">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>USENIX Security Symposium</annotation></reference>
<reference anchor="Jmi22" >
  <front>
    <title>Adversarial machine learning for network intrusion detection: A comparative study</title>
    <author initials="H." surname="Jmila" fullname="H. Jmila">
      <organization></organization>
    </author>
    <author initials="M. I." surname="Khedher" fullname="M. I. Khedher">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Computer Networks</annotation></reference>
<reference anchor="Fre15" >
  <front>
    <title>Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures</title>
    <author initials="M." surname="Fredrikson" fullname="M. Fredrikson">
      <organization></organization>
    </author>
    <author initials="M. S." surname="Jha" fullname="M. S. Jha">
      <organization></organization>
    </author>
    <author initials="T." surname="Ristenpart" fullname="T. Ristenpart">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>ACM SIGSAC Conference on Computer and Communications Security</annotation></reference>
<reference anchor="Bis23" >
  <front>
    <title>Hyperparameter optimization: Foundations, algorithms, best practices, and open challenges</title>
    <author initials="B." surname="Bischl" fullname="B. Bischl">
      <organization></organization>
    </author>
    <author initials="M." surname="Binder" fullname="M. Binder">
      <organization></organization>
    </author>
    <author initials="M." surname="Lang" fullname="M. Lang">
      <organization></organization>
    </author>
    <author initials="T." surname="Pielok" fullname="T. Pielok">
      <organization></organization>
    </author>
    <author initials="J." surname="Richter" fullname="J. Richter">
      <organization></organization>
    </author>
    <author initials="S." surname="Coors" fullname="S. Coors">
      <organization></organization>
    </author>
    <author initials="J." surname="Thomas" fullname="J. Thomas">
      <organization></organization>
    </author>
    <author initials="T." surname="Ullmann" fullname="T. Ullmann">
      <organization></organization>
    </author>
    <author initials="M." surname="Becker" fullname="M. Becker">
      <organization></organization>
    </author>
    <author initials="A.-L." surname="Boulesteix" fullname="A.-L. Boulesteix">
      <organization></organization>
    </author>
    <author initials="D." surname="Deng" fullname="D. Deng">
      <organization></organization>
    </author>
    <author initials="M." surname="Lindauer" fullname="M. Lindauer">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 13(2)</annotation></reference>


    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document is the result of a collective work. Authors of this document are the main contributors and the editors but contributions have been also received from the following people we acknowledge: Laurent Ciavaglia, Felipe Alencar Lopes, Abdelkader Lahamdi, Albert Cabellos, José Suárez-Varela, Marinos Charalambides, Ramin Sadre, Pedro Martinez-Julia and Flavio Esposito</t>

<t>This document is also partially supported by project AI@EDGE, funded from the European Union's Horizon 2020 H2020-ICT-52 call for projects, under grant agreement no. 101015922.</t>

<t>The views expressed in this document do not necessarily reflect those of the Bank of Canada's Governing Council.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

