<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC7011 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
<!ENTITY RFC8986 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
<!ENTITY RFC9315 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9315.xml">
<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
]>


<rfc ipr="trust200902" docName="draft-irtf-nmrg-ai-challenges-04" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Coupling AI and network management">Research Challenges in Coupling Artificial Intelligence and Network Management</title>

    <author fullname="Jérôme François">
      <organization>University of Luxembourg and Inria</organization>
      <address>
        <postal>
          <street>6 Rue Richard Coudenhove-Kalergi</street>
          <city>Luxembourg</city>
          <country>Luxembourg</country>
        </postal>
        <email>jerome.francois@uni.lu</email>
      </address>
    </author>
    <author fullname="Alexander Clemm">
      <organization>Independent</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>ludwig@clemm.org</email>
      </address>
    </author>
    <author fullname="Dimitri Papadimitriou">
      <organization>3NLab Belgium Reseach Center</organization>
      <address>
        <postal>
          <city>Leuven</city>
          <country>Belgium</country>
        </postal>
        <email>papadimitriou.dimitri.be@gmail.com</email>
      </address>
    </author>
    <author fullname="Stenio Fernandes">
      <organization>Central Bank of Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>stenio.fernandes@ieee.org</email>
      </address>
    </author>
    <author fullname="Stefan Schneider">
      <organization>Digital Railway (DSD) at Deutsche Bahn</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>stefanbschneider@outlook.com</email>
      </address>
    </author>

    <date year="2024" month="November" day="29"/>

    
    <workgroup>Internet Research Task Force</workgroup>
    <keyword>network management</keyword> <keyword>artificial intelligence</keyword> <keyword>machine learning</keyword>

    <abstract>


<t>This document is intended to introduce the challenges to overcome when Network Management (NM) problems may require coupling with Artificial Intelligence (AI) solutions. On the one hand, there are many difficult problems in NM that to this date have no good solutions, or where any solutions come with significant limitations and constraints. Artificial Intelligence may help produce novel solutions to those problems. On the other hand, for several reasons (computational costs of AI solutions, privacy of data), distribution of AI tasks became primordial. It is thus also expected that network are operated efficiently to support those tasks.</t>

<t>To identify the right set of challenges, the document defines a method based on the evolution and nature of NM problems. This will be done in parallel with advances and the nature of existing solutions in AI in order to highlight where AI and NM have been already coupled together or could benefit from a higher integration. So, the method aims at evaluating the gap between NM problems and AI solutions. Challenges are derived accordingly, assuming solving these challenges will help to reduce the gap between NM and AI.</t>

<t>This document is a product of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF).  This document reflects the consensus of the research group.  It is not a candidate for any level of Internet Standard and is published for informational purposes.</t>



    </abstract>



  </front>

  <middle>


<section anchor="intro"><name>Introduction</name>

<t>The functional scope of Network Management (NM) is very large, ranging from monitoring to accounting, from network provisioning to service diagnostics, from usage accounting to security. The taxonomy defined in <xref target="Hoo18"/> extends the traditional Fault, Configuration, Accounting, Performance, Security (FCAPS) domains by considering additional functional areas but above all by promoting additional views. For instance, network management approaches can be classified according to the technologies, methods or paradigms they will rely on. Methods include common approaches as for example mathematical optimization or queuing theory but also techniques which have been widely applied in last decades like game theory, data analysis, data mining and machine learning. In management paradigms, autonomic and cognitive management are listed. As highlighted by this taxonomy, the definition of automated and more intelligent techniques has been promoted to support efficient network management operations. Research in NM and more generally in networking has been very active in the area of applied ML <xref target="Bou18"/>.</t>

<t>However, for maintaining network operational in pre-defined safety bounds, NM still heavily relies on established procedures. Even after several cycles of adding automation, these procedures are still mostly fixed and set offline in the sense that the exact control loop and all possible scenarios are defined in advance. They are so mostly deterministic by nature or at least with sufficient safety margin. Obviously, there have been a lot of propositions to make network smarter or intelligent with the use of Machine Learning (ML) but without large adoption for running real networks because it changes the paradigms towards stochastic methods.</t>

<t>ML includes regression analysis, statistical learning (SVM and variants), deep learning (ANN and variants), reinforcement learning, etc. It is a sub-area of Artificial Intelligence (AI) that concentrates the focus nowadays but AI encompasses other areas including knowledge representation, inductive logic programming, inference rule engine or by extension the techniques that allow to observe and perform actions on a system.</t>

<t>It is thus legitimate to question if ML or AI in general could be helpful for NM in regards to practical deployment. This question is actually tight with the problems the NM aims to address. Independently of NM, ML-based solutions were introduced to solve one type of problems in an approximate way which are very complex in nature, i.e. finding an optimal solution is not possible (in polynomial time). This is the case for NP-hard problems. In those cases, solutions typically rely on heuristics that may not yield optimal results, or algorithms that run into issues with scalability and the ability to produce timely results due to the exponential search space. In NM, those problems exist, for instance allocation of resources in case of Service Function Chaining (SFC) or network slicing  among others are recent examples which have gained interest in our community with SDN. Many propositions consist of modeling the optimization problem as an MILP (Mixed-Integer Linear Programming) and solve it by means of heuristics to reach a satisfactory tradeoff between solution quality (gap to the optimal solution) - computation time and model size/dimensionality. Hence, ML is recognized to be well adapted to progress on this type of problem <xref target="Kaf19"/>.</t>

<t>However, all computational problems of NM are not NP-hard. Due to real-time constraints, some involve very short control loops that require both rapid decisions and the ability to rapidly adapt to new situations and different contexts. So, even in that case, time is critical and approximate solutions are usually more acceptable.  Again, it is where AI can be beneficial. Actually, expert systems are AI systems <xref target="Ste92"/> but this kind of systems are not designed to scale with the volume and heterogeneity of data we can collect in a network today for which the expert system is built thanks to numerous inference rules. In contrast, ML is more efficient to automatically learn abstract representations of the rules, which can be eventually updated.</t>

<t>On one hand another type of common problem in NM is classification. For instance, classifying network flows is helpful for security purposes to detect attack flows, to differentiate QoS among the different flows (e.g. real-time streams which need to be prioritized), etc. On the other hand, ML-based classification algorithms have been widely used in literature with high quality results when properly applied leading to their applications in commercial products. There are many algorithms including decision tress, support vector machine or (deep) neural networks which have been to be proven efficient in many areas and notably for image and natural language processing.</t>

<t>Finally, many problems also still rely on humans in the loop, from support issues such as dealing with trouble tickets to planning activities for the roll-out of new services. This creates operational bottlenecks and is often expensive and error prone. This kind of tasks could be either automated or guided by an AI system to avoid individual human bias. It is worth noting that Ml relying training data generated by human can also suffer indirectly from a collective human bias. Indeed, the balance between human resources and the complexity of problems to deal with is actually very imbalanced and this will continue to increase due to the size of networks, heterogeneity of devices, services, etc. Hence, human-based procedures tend to be simple in comparison to the problems to solve or time-consuming. Notable examples are in security where the network operator should defend against potential unknown threat. As a result, services might be largely affected during hours</t>

<t>Actually, all aforementioned problems are exacerbated by the situation of more complex networks to operate on many dimensions (users, devices, services, connections, etc.). Therefore, AI is expected to enable or simplify the solving of those problems in real networks in the near future <xref target="czb20"/> <xref target="Yan20"/> because those would require reaching unprecedented levels of performance in terms of throughput, latency, mobility, security, etc.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="acronyms"><name>Acronyms</name>

<t><list style="symbols">
  <t>AI: Artificial Intelligence</t>
  <t>FL: Federated Learning</t>
  <t>GAN: Generative Adversarial Network</t>
  <t>GNN: Graph Neural Network</t>
  <t>IBN: Intent-Based Networking</t>
  <t>LSTM: Long Short-Term Memory</t>
  <t>ML: Machine Learning</t>
  <t>MILP: Mixed-Integer Linear Programming</t>
  <t>MLP: Multilayer Perceptron</t>
  <t>NM: Network Management</t>
  <t>RL: Reinforcement Learning</t>
  <t>SFC: Service Function Chaining</t>
  <t>SVM: Support-Vector Machine</t>
  <t>VNF: Virtual Network Function</t>
</list></t>

</section>
<section anchor="pbNM"><name>Difficult problems in network management</name>

<t>As mentioned in introduction, problems to be tackled in NM tend to be complex and exhibit characteristics that make them candidates for solutions that involve AI techniques:</t>

<t><list style="symbols">
  <t>C1: A very large solution space, combinatorially exploding with the size of the problem domain. This makes it impractical to explore and test every solution (again NP-hard problems here)</t>
  <t>C2: Uncertainty and unpredictability along multiple dimensions, including the context in which the solution is applied, behavior of users and traffic, lack of visibility into network state, and more.  In addition, many networks do not exist in isolation but are subjected to myriads of interdependencies, some outside their control.  Accordingly, there are many external parameters that affect the efficiency of the solution to a problem and that cannot be known in advance: user activity, interconnected networks, etc.</t>
  <t>C3: The need to provide answers (i.e. compute solutions, deliver verdicts, make decisions)  in constrained or deterministic time. In many cases, context changes dynamically and decisions need to be made quickly to be of use.</t>
  <t>C4: Data-dependent solutions. To solve a problem accurately, it can be necessary to rely on large volumes of data, having to deal with issues that range from data heterogeneity to incomplete data to general challenges of dealing with high data velocity.</t>
  <t>C5: Need to be integrated with existing automatic and human processes.</t>
  <t>C6: Solutions <bcp14>MUST</bcp14> be cost-effective as resources (bandwidth, CPU, human, etc.) can be limited, notably when part of processing is distributed at the network edge or within the network.</t>
</list></t>

<t>Many decision/optimization problems are affected by multiple criteria. Below is a non-exhaustive list of complex NM problems for which AI and/or non-AI-based approaches have been proposed:</t>

<t><list style="symbols">
  <t>Computation of optimal paths: Packet forwarding is not always based on traditional routing protocols with least cost routing, but on computation of paths that are optimized for certain criteria - for example, to meet certain level objectives, to result in greater resilience, to balance utilization, to optimize energy usage, etc.  Many of those solutions can be found in SDN, where a controller or path computation element computes paths that are subsequently provisioned across the network.  However, such solutions generally do not scale to millions of paths (C1), and cannot be recomputed in sub-second time scales (C3) to take into account dynamically changing network conditions (C2). To compute those paths,  operations research techniques have been extensively used in literature along with AI methods as shown in <xref target="Lop20"/>. As such, this problem can be considered as close to big data problems with some of the different Vs: volume, velocity, variety, value…</t>
  <t>Classification of network traffic: Without loss of generality a common objective of network monitoring for operators is to know the type of traffic going through their networks (web, streaming, gaming, VoIP). By nature, this task analyzes data (C4) which can vary over time (C2) except in very particular scenarios like industrial isolated networks. However, the output of the classification technique is time-constrained only in specific cases where fast decisions <bcp14>MUST</bcp14> be made, for example to reroute traffic. Simple identification based on IANA-assigned TCP/UDP ports numbers were sufficient in the past. However, with applications using dynamic port numbers, signature techniques can be used to match packet payload <xref target="Sen04"/>. To handle applications now encapsulated in encrypted web or VPN traffic, machine-learning has been leveraged <xref target="Bri19"/>.</t>
  <t>Network diagnostics: Disruptions of networking services can have many causes and thus can rely on analyzing many sources of data (C4). Identifying the root cause can be of high importance when what is causing the disruption is not properly understood, so that repair actions can address the root cause versus just working around the symptoms. Such repair actions may involve human actions (C5). Further complicating the matter are scenarios in which disruptions are not “hard” but involve only a degradation of service level, and where disruptions are intermittent, not reproducible, and hard to predict.  Artificial intelligence techniques can offer promising solutions.</t>
  <t>Network observability: having deeper insights of network status can rely on monitoring techniques to gather data from various sources. A major issue is to aggregate all these data in a valuable format. While they are not directly used to automate some actions, the aggregation of the data needs to be presented in an interpretable manner to human operators. In this area, vizualisation techniques are helpful and also rely on AI-related techniques to provide the best outputs by reducing the number of dimensions (C4) and adapting the vizualisation of data to there potential final use in human-handled processes (C5).</t>
  <t>Intent-Based Networking (IBN): Roughly speaking, IBN refers to the ability to manage  networks by articulating desired outcomes without the need to specify a course of actions to achieve those outcomes <xref target="RFC9315"/>.  The ability to determine such courses of actions, in particular in scenarios with multiple interdependencies, conflicting goals, large scale, and highly complex and dynamic environments is a huge and largely unsolved challenge (C1, C2, C3). As an illustration, a major problem with intent is ti interpret them correctly knowing that different intent formats have been proposed including natural language. Without good interpretation of the intent, i.e. the expected outcomes, the derived actions will not be adequate. In case the intent is correctly interpreted, a major problem is to find concrete solutions to realize the intents which implicitly needs to optimize the actions to be taken. Artificial Intelligence techniques can be of help here in multiple ways, from accurately classifying dynamic context to determine matching actions to reframing the expression of intent as a game that can be played (and won) using artificially intelligent techniques.</t>
  <t>VNF (Virtual Network Function) placement and SFC design: VNFs need to be placed on physical resources and Service Function Chains designed in an optimized manner to avoid use of networking resources and minimize energy usage (C1,C6).</t>
  <t>Smart admission control to avoid congestion and oversubscription of network resources: Admission control needs to be set up and performed in ways that ensure service levels are optimized in a manner that is fair and aligned with application needs, congestion avoided or its effects mitigated (C6).</t>
</list></t>

</section>
<section anchor="hlchallenges"><name>High-level challenges in adopting AI in NM</name>

<t>As shown in the previous section, AI techniques are good candidates for the difficult NM problems. There have been many propositions but still most of them remain at the level of prototypes or have been only evaluated with simulation and/or emulation. It is thus questionable why our community investigates much research in this direction but has not adopted those solutions to operate real networks. There are different obstacles.</t>

<t>First, AI advances have been historically driven by the image/video, natural language and signal processing communities as well as robotics for many decades. As a result, the most impressive applications are in this area including recently the generalization of home assistants or the large progress in autonomous vehicles. However, the network experts have been focused on building the Internet, especially building protocols to make the world interconnected and with always better performance and services. This trend continues today with the 5G networks in deployment and beyond 5G under definition. Hence, AI was not the primary focus even if increased network automation calls for AI and ML solutions. However, AI is now considered as a core enabler for the future 6G networks which are sometimes qualified as AI-native networks.</t>

<t>While we can see major contributions in AI-based solutions for networking over more than two decades, only a fraction of the community was concerned by AI at that time. Progress as a whole, from a community perspective, was so limited and compensated by relying on the development of AI in the communities as mentioned earlier. Even if our problems share some commonalities, for example on the volume of data to analyze, there are many differences: data types are completely different, networks are by nature heavily distributed, etc. If problems are different, they <bcp14>SHOULD</bcp14> require distinct solutions. In a nutshell, network-tailored AI was overlooked and leads to a first set of challenges described in <xref target="AItechniques"></xref>.</t>

<t>Second, many AI techniques require enough representative data to be applied independently if the algorithms are supervised or unsupervised. NM has produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI techniques and lead so to a mismatch. For example, (deep) learning techniques mostly rely on having vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc)  but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>.</t>

<t>An additional challenge concerns the fact that AI techniques that involve analysis of networking data can also lead to the extraction of sensitive and personally-identifiable information, raising potential privacy concerns and concerns regarding the potential for abuse. For example, AI techniques used to analyze encrypted network traffic with the legitimate goal to protect the network from intrusions and illegitimate attack traffic could be used to infer information about network usage and interactions of network users.  Intelligent data analysis and the need to maintain privacy are in many ways that are contradictory in nature, resulting in an arms race.  Similarly, training ML solutions on real network data is in many cases preferable over using less-realistic synthetic data sets. However, network data may contain private or sensitive data, the sharing of which may be problematic from a privacy standpoint and even result in legal exposure. The challenge concerns thus how to allow AI techniques to perform legitimate network management functions and provide network owners with operational insights into what is going on in their networks, while prohibiting their potential for abuse for other (illegitimate) purposes.  Challenges related to network data as input to ML algorithms is detailed in <xref target="netData"></xref>.</t>

<t>Finally, networks are already operated thanks to (semi-)automated procedures involving a large number of resources which are synchronized with management or orchestration tools. Adding AI supposes it would be seamlessly integrated within pre-existing processes. Although the goal of these procedures might be solely to provide relevant information to operators through alerts or dashboards in case of monitoring applications, many other applications rely on those procedures to trigger actions on the different resources, which can be local or remote. The use of AI or any other approaches to derive NM actions adds further constraint on them, especially regarding time constraints and synchronization to maintain a coherence over a distributed system.</t>

<t>A related challenge concerns the fact that to be deployed, a solution needs to not only provide a technical solution but to also be acceptable to users - in this case, network administrators and operators.  One challenge with automated solutions concerns that users want to feel “in control” and able to understand what is going on, even more so if ultimately those users are the ones who are held accountable for whether or not the network is running smoothly.  Those same concerns extend to artificially intelligent systems for obvious reasons. To mitigate those concerns, aspects such as the ability to explain actions that are taken - or about to be taken - by AI systems become important.</t>

<t>Beyond reasons of making users more comfortable, there are potentially also legal or regulatory ramifications to ensure that actions taken are properly understood.  For example,agencies such as the FCC may impose fines on network operators when services such as E911 experience outages, as there is a public interest in ensuring highest availability for such services.  In investigating causes for such outages, the underlying behavior of systems has to be properly understood, and even more so the reasons for actions that fall under the realm of network operations. All these aspects about integration and acceptability of the integration of AI in NM processes is detailed in <xref target="acceptability"></xref>.</t>

</section>
<section anchor="AItechniques"><name>AI techniques and network management</name>

<section anchor="problemMapping"><name>Problem type and mapping</name>

<t>In the last few years, an increasing number of different AI techniques have been proposed and applied successfully to a growing variety of different problems in different domains, including network management <xref target="Mus18"/>, <xref target="Xie18"/>. Some of the more recently proposed AI approaches are clearly advancements of older approaches, which they supersede. Many other AI approaches are not predecessors or successors but simply complementary because they are useful for different problems or optimize different metrics. In fact, different AI approaches are useful for different kinds of problem inputs (e.g., tabular data vs. text vs. images vs. time series) and also for different kinds of desired outputs (e.g., a predicted value, a classification, or an action). Similarly, there may be trade-offs between multiple approaches that take the same kind of inputs and desired outputs (e.g., in terms of desired objective, computation complexity, constraints).</t>

<t>Overall, it is a key challenge of using AI for network management to properly understand and map which kind of problems with which inputs, outputs, and objectives are best solved with which kind of AI (or non-AI) approaches. Given the wealth of existing and newly released AI approaches, this is far from a trivial task.</t>

<section anchor="sub-challenge-suitable-approach-for-given-input"><name>Sub-challenge: Suitable Approach for Given Input</name>

<t>Different problems in network management come with widely different problem parameters. For example, security-related problems may have large amounts of text or encrypted data as input, whereas forecasting problems have historical time series data as input. They also vary in the amount of available data.</t>

<t>Both the type and amount of data influences which AI techniques could be useful. On one hand, in scenarios with little data, classical machine learning techniques (e.g., SVM, tree-based approaches, etc.) are often sufficient and even superior to neural networks. On the other hand, neural networks have the advantage of learning complex models from large amounts of data without requiring feature engineering. Here, different neural network architectures are useful for different kinds of problems. The traditional and simplest architecture are (fully connected) multi-layer perceptrons (MLPs), which are useful for structured, tabular data. For images, videos, or other high-dimensional data with correlation between “close” features, convolutional neural networks (CNNs) are useful. Recurrent neural networks (RNNs), especially LSTMs, and attention-based neural networks (transformers) are great for sequential data like time series or text. Finally, Graph Neural Networks (GNNs) can incorporate and consider the graph-structured input, which is very useful in network management, e.g., to represent the network topology.</t>

<t>The aforementioned rough guidelines can help identify a suitable AI approach and neural network architecture. Still, best results are often only achieved with sophisticated combinations of different approaches. For example, multiple elements can be combined into one architecture, e.g., with both CNNs and LSTMs, and multiple separate AI approaches can be used as an ensemble to combine their strengths. Here, simplifying the mapping from problem type and input to suitable AI approaches and architectures is clearly an open challenge. Future work <bcp14>SHOULD</bcp14> address this challenge by providing both clearer guidelines and striving for more general AI approaches that can easily be applied to a large variety of different problem inputs.</t>

</section>
<section anchor="sub-challenge-suitable-approach-for-desired-output"><name>Sub-challenge: Suitable Approach for Desired Output</name>

<t>Similar to the challenge of identifying suitable AI approaches for a given problem input, the desired output for a given problem also affects which AI approach <bcp14>SHOULD</bcp14> be chosen. Here, the format of the desired output (single value, class, action, etc.), the frequency of these outputs and their meaning <bcp14>SHOULD</bcp14> be considered.</t>

<t>Again, there are rough guidelines for identifying a group of suitable AI approaches. For example, if a single numerical value is required (e.g., the amount of resources to allocate to a service instance), then typical supervised regression approaches <bcp14>SHOULD</bcp14> be considered as a first candidate option. If classification (e.g., of malware or another security issue <xref target="Abd10"/>) instead of predicting a value is desired, supervised classification methods <bcp14>SHOULD</bcp14> be used when labeled training data is available. There are also cases where a single class of training data is available, as for example in the context of anomaly detection where the model is fitted to normal data. In that case, one-class supervised techniques <bcp14>SHOULD</bcp14> be considered as a good candidates. Alternatively, unsupervised machine learning can help to cluster given data into separate groups, which can be useful to analyze networking data, e.g., for better understanding different types of traffic or user segments. Furthermore, the quality of the data directly impacts on the robustness of a ML model with the risk of biased models due to over-fitting. As highlighted with these few examples, finding a suitable approach to a problem depends on many factors including the type of problem to handle but also other contextual elements such as the availability and the quality of data.</t>

<t>In addition to these classical supervised and unsupervised methods, reinforcement learning approaches allow active, sequential decisions rather than simple predictions or classifications. This is often useful in network management, e.g., to actively control service scaling and placement as well as flow scheduling and routing. Reinforcement learning agents autonomously select suitable actions in a given environment and are especially useful for self-learning network management. In addition to model-free reinforcement learning, model-based planning approaches (e.g., Monte Carlo Tree Search (MCTS)) also allow choosing suitable actions in a given environment but require full knowledge of the environment dynamics. In contrast, model-free reinforcement learning is ideal for scenarios with unknown environment dynamics, which is often the case in network management.</t>

<t>Similar to the previous sub-challenge, these are just rough guidelines that can help to select a suitable group of AI approaches. Identifying the most suitable approach within the group, e.g., the best out of the many existing reinforcement learning approaches, is still challenging. And, as before, different approaches could be combined to enable even more effective network management (e.g., heuristics + RL, LSTMs + RL, …). Here, further research <bcp14>MAY</bcp14> simplify the mapping from desired problem output to choosing or designing a suitable AI approach.</t>

</section>
<section anchor="tailoringAI"><name>Sub-challenge: Tailoring the AI Approach to the Given Problem</name>

<t>After addressing the two aforementioned sub-challenges, one may have selected a useful kind of AI approach for the given input and output of a network management problem. For example, one may select regression and supervised learning to forecast upcoming network traffic. Or select reinforcement learning to continuously control network and service coordination (scaling, placement, etc.). However, even within each of these fields (regression, reinforcement learning, etc.), there are many possible algorithms and hyperparameters to consider. Selecting a suitable algorithm and parametrizing it with the right hyperparameters is crucial to tailor the AI approach to the given network management problem.</t>

<t>For example, there are many different regression techniques (classical linear, polynomial regression, lasso/ridge regression, SVR, regression trees, neural networks, etc.), each with different benefits and drawbacks and each with its own set of hyperparameters. Choosing a suitable technique depends on the amount and structure of the input data as well as on the desired output. It also depends on the available amount of compute resources and compute time until a prediction is required. If resources and time are not a limiting factor, many hyperparameters can be tuned automatically. In practice, however, the design space of choosing algorithms and hyperparameters is often so large that it cannot be effectively tuned automatically but also requires some initial expertise in selecting suitable AI algorithms and hyperparameters.</t>

<t>This sub-challenge holds for all fields of AI: Supervised learning (regression and classification), self-supervised learning, unsupervised learning, and reinforcement learning, each are broad and rapidly growing fields. Selecting suitable algorithms and hyperparameters to tailor AI approaches to the network management problem is both an opportunity and a challenge. Here, future work should further explore these trade-offs and provide clearer guidelines on how to navigate these trade-offs for different network management tasks.</t>

</section>
</section>
<section anchor="performance-of-produced-models"><name>Performance of produced models</name>

<t>From a general point of view, any AI technique will produce results with a certain level of quality. This leads to two inherent questions: (1) what is the definition of the performance in a context of a NM application? (2) How to measure it? (3) How to ensure the quality of produced results by AI is aligned with NM objectives? How to maintain or improve the quality of produced results?</t>

<t>Many metrics have been already defined to evaluate the performance of an AI-based techniques in regards to its NM-level objectives. For example, QoS metrics (throughput, latency) can serve to measure the performance of a routing algorithm along with the computational complexity (memory consumption, size of routing tables). The question is to model and measure these two antagonist types of metrics. Number of true/false positives/negatives are the most basic metrics for network attack detection functions. Although the first two questions are thus already answered even if improvement can be done, question (3) refers to the integration of metrics into AI algorithms. Its objective is to obtain the best results which need to be quantified with these metrics. Depending on the type of algorithm, these metrics are either evaluated in an online manner with a feedback loop (for example with reinforcement learning) or in batch to optimize a model based on a particular context (for example described by a dataset for machine learning).</t>

<t>The problem is two-fold. First, the performance can be measured through multiple metrics of different types (numerical or ordinal for example) and some can be constrained by fixed boundaries (like a maximum latency), making their joint use challenging when creating an AI model to resolve a NM problem. Second, the scale metrics differ from each other in terms of importance or impact and can eventually vary on their domains. It can be hard to precisely assess what is a good or bad value (as it might depend on multiple other ones) and it is even more difficult to integrate in an AI technique, especially for learning algorithms to adjust their models based on the performance. Indeed, learning algorithms run through multiple iterations and rely on internal metrics (MAE or (R)MSE for neural network, gini index or entropy for decision trees, distance to an hyperplane for SVMs, etc) which are not strongly correlated to the final metrics of the NM application. AI-internal metrics such as the loss do not match well the metrics related to the final NM objectives as the significance and impact of the AI errors cannot be easily translated into the NM domain.</t>

<t>For instance, a decision tree algorithm for classification purposes aims at being able to create branches with a maximum of data from the same classes and so avoid mixing classes. It is done thanks to a criterion like the entropy index but this kind of index does not assume any difference between mixing class A and B or A and C. Assuming now that from an operational point of view, if A and B are mixed in the predictions is not critical, the algorithm should have preferred to mix and A and B rather than A and C even if in the first case it will produce more errors. Therefore, the internal functioning of the AI algorithms should be refined, here by defining a particular criterion to replace the entropy as a quality measure when separating two branches. It assumes that the final NM objectives are integrated at this stage.</t>

<t>Another concrete example is traffic predictors which aim at forecasting traffic demands. They only produce an output that is not necessarily simple to be interpreted and used by, e.g., capacity allocation strategies/policies. A traditional traffic prediction that tries to minimize (perfectly symmetric) MAE/MSE treats positive and negative errors in identical ways, hence is agnostic of the diverse meaning (and costs) of under- and over-provisioning. And, such a prediction does not provide any information on, e.g., how to dimension resources/capacity to accommodate the future demand avoiding all underprovisioning (which entails service disruption) while minimizing overprovisioning (i.e., wasting resources). In other words, it forces the operator to guess the overprovisioning by taking (non-informed) safety margins. A more sensible approach here is instead forecasting directly the needed capacity, rather than the traffic <xref target="Beg19"/>.</t>

<t>While the one above is just an example, the high-level challenge is devising forecasting models that minimize the correct objective/loss function for the specific NM task at hand (instead of generic MAE/MSE). In this way, the prediction phase becomes an integral part of the NM, and not just a (limited and hard-to-use) input to it. In ML terms, this maps to solving the loss-metric mismatch in the context of anticipatory NM <xref target="Hua19"/>.</t>

<t>Another issue for statistical learning (from examples/observations) is mainly about extracting an estimator from a finite set of input-output samples drawn from an unknown probability distribution that should be descriptive enough for unseen/new input data. In this context online monitoring and error control of the quality/properties of these point estimators (bias, variance, mean squared error, etc.) is critical for dynamic/uncertain network environments. Similar reasoning/challenge applies for interval estimates, i.e., confidence intervals (frequentist) and credible intervals (Bayesian).</t>

<t>Finally, question (4) refers to the ability of an AI solution to remain efficient and to eventually improve over time. This requires dynamic methods capable to adapt to a changing environment. As already highlighted, the models can be dynamically adjusted based on the errors they produced. In the context of ML, the models can be also updated based on new data, either through a complete re-learning phase, fine-tuning or transfer-learning approaches. This assumes to collect and ingest continuously new data. This leads to set of related challenges related to select or discard some data over a time horizon and to label data real-time. There are ML techniques which helps in that direction such as LSTMs which integrates forget gates in their architectures.</t>

</section>
<section anchor="lightweight-ai"><name>Lightweight AI</name>

<t>Network management and operations often need to be performed under strict time constraints, i.e. at line rate, in particular in the context of autonomic or self-driven networks. Locating NM functions as close as possible where forwarding is achieved is thus an interesting option to avoid additional delays when these operations are performed remotely, for example in a centralized controller. Besides, forwarding devices may offer available resources to supplement or replace edge resources. In case of AI coupled with network management, AI tasks can be offloaded in network devices, or more generally embedded within the network. Obviously, time-critical tasks are the best candidates to be offloaded within the network. Costly learning tasks should be processed in high-end servers but created models can be deployed, configured, modified and tuned in switches.</t>

<t>Recent advances in network programmability ease the programming of specific tasks at data-plane level. P4 <xref target="Bos14"/> is widely used today for many tasks including firewalling <xref target="Dat18"/> or bandwidth management <xref target="Che19"/>. P4 is prone to be agnostic to a specific hardware. Switches actually have particular architectures and the RMT (Reconfigurable Match Table) <xref target="Bos13"/> model is generally accepted to be generic enough to represent limited but essential switch architecture components and functionalities. P4 is inspired by this architecture. The RMT model allows reconfiguring match-action tables where actions can be usual ones (rewrite some headers, forward, drop...). Actions are thus applied on the packets when they are forwarded. Actions can also be more complex programs with some safeguards: no loop, resistivity… The impact on the program development is huge. For example, real number operations are not available by default while they are primordial in many AI algorithms.</t>

<t>In a nutshell, the first challenge to overcome of embedding AI in a network is the capacity of the hardware to support AI operations (architectural limitation). Considering software equipment such as a virtual switch simplifies the problem but does not totally resolve it as, even in that case, strong line-rate requirement limits the type of programs to be executed. For example, BPF (Berkeley Packet Filter) <xref target="Mcc93"/> programs provides a higher control on packet processing in OVS <xref target="Cha18"/> but still have some limitations, as the execution time of these programs are bounded by nature to ensure their termination, an essential requirement assuming the run-to-completion model which permits high throughput.</t>

<t>The second challenge (resource limitation) of network-embedded AI in the network is to allocate enough resources for AI tasks with a limited impact on other tasks of network devices such as forwarding, monitoring, filtering… Approximation and/or optimization of AI tasks are potential directions to help in this area. For instance, many network monitoring proposals rely on sketches and with a proposed  well-tuned implementation for data-plane <xref target="Liu16"/><xref target="Yan18"/>. However, no general optimized AI-programmable abstraction exists to fit all cases and proposals are mostly use-case centric.  Research direction in NM regarding this issue can benefit from propositions in the field of embedded systems that face the same issues. Binarization of neural networks is one example <xref target="Lia18"/>. Besides, distributed processing is a common technique to distribute the load of a single task between multiple entities. AI task decomposition between network elements, edge servers or controllers has been also proposed <xref target="Gup18"/>.</t>

</section>
<section anchor="DistributedAI"><name>Distributed AI</name>

<t>Distributed AI assumes different related tasks and components to be distributed across computational resources which are possibly heterogeneous. For example, with advances in transfer and Federated Learning (FL), models can be learned, partially shared and combined or data can be also shared to either improve a local or global model. By nature, a network and a networked infrastructure is distributed and is thus well adapted to any distributed applications. This is exacerbated with the deployment of fog infrastructure mixing network and computational resources. Hence, network management can directly benefit to the distributed network structure to solve its own particular problems but any other type of AI-based distributed applications also assumes communication technologies to enable interactions between the different entities. This leads to the two sub-challenges described hereafter.</t>

<section anchor="netManFordistributedAI"><name>Network management for efficient distributed AI</name>

<t>Distributed AI relies on exchanging information between different entities and comes with various requirements in terms of volume, frequency, security, etc. This can be  mapped to network requirements such as latency, bandwidth or confidentiality. Therefore, the network needs to provide adequate resources to support the proper execution of the AI distributed application. While this is true for any distributed application, the nature of the problem that is intended to be solved by an AI application and how this would be solved can be considered. For example, with FL, local models can be shared to create a global model. In case of failure of network links or in case of too high latency, some local models might not be appropriately integrated into the global model with a possible impact on AI performance. Depending on the nature of the latter, it might be better to guarantee high performance communications with a few number of nodes or to ensure connectivity between all of them even with lower network performance. Coupling is thus necessary between the network management plane and the distributed AI applications which leads to a set of questions to be addressed about interfaces, data and information models or protocols. While the network can be adapted or eventually adapt itself to the AI distributed applications, AI applications could also adapt themselves to the underlying network conditions. It paves the way to research on methods to support AI application aware-network management or network-aware AI applications or a mix of both.</t>

</section>
<section anchor="distributed-ai-for-network-management"><name>Distributed AI for network management</name>

<t>For network management applications relying on distributed AI, challenges from <xref target="netManFordistributedAI"></xref> are still valid. Furthermore, network management problems also consider network-specific elements like traffic to be analyzed or configuration to be set on distributed network equipments. Co-locating AI processing and these elements (fully or partially) may help to increase performance. For example, precalculation on traffic data can be offloaded on network routers before being further processed in high-end servers in a data-center. Besides, as data is forwarded through multiple routers, decomposition of AI processes along the forward path is possible <xref target="Jos22"/>. In general, distributed AI-based network management decisions could be made at different nodes in the network based on locally available information <xref target="Sch21"/>. Hence, deployment of AI-based solutions for network management can also take into account various network attributes like network topology, routing policies or network device capability. In that case, management of computational and network resources is even more coupled than in <xref target="netManFordistributedAI"></xref> since the network is both part of the AI pipeline resources and the managed object through AI.</t>

<t>A primary application for distributed AI is for management problems that have a local scope.  One example concerns problems that can be addressed at the edge, involving tasks and control loops that monitor and apply local optimizations to the edge in isolation from activities conducted by other instances across the network.   However, distributed AI can involve techniques in which multiple entities collaborate to solve a global problem. Such solutions lend themselves to problems in which centralized solutions are faced with certain foundational challenges such as security, privacy, and trust:   The need to maintain complete state in a centralized solution may not be practical in some cases due to concerns such as privacy and trust among multiple subdomains which may not want to share all of their data even if they would be willing to collaborate on a problem). Other foundational challenges concern issue related to timeliness, in which distributed solutions may have inherent advanges over centralized solutions as they avoid issues related to delays caused by the need to communicate updates globally and across long distances.</t>

</section>
</section>
<section anchor="ai-for-planning-of-actions"><name>AI for planning of actions</name>

<t>Many tasks in network management revolve around the planning of actions with the purpose of optimizing a network and facilitating the delivery of communication services.  For example, Paths need to be planned and set up in ways that minimize wasted network resources (to optimize cost) while facilitating high network utilization (avoiding bottlenecks and the formation of congestion hotspots) and ensuring resiliency (by making sure that backup paths are not congruent with primary paths).  Other examples were mentioned in <xref target="pbNM"></xref>.</t>

<t>The need for planning only increases with the rise of centralized control planes.  The promise of central control is that decisions can be optimized when made with complete knowledge of relevant context, as opposed to distributed control that needs to rely on local decisions being made with incomplete knowledge while incurring higher overhead to replicate relevant state across multiple systems.  However, as the scale of networks and interconnected systems continues to grow, so does the size of the planning task.  Many problems are NP-hard.  As a result, solutions typically need to rely on heuristics and algorithms that often result in suboptimal outcomes and that are challenging to deploy in a scalable manner.</t>

<t>The emergence of Intent-Based Networking emphasizes the need for automated planning even further.  The concept underlying “intent” is that it should allow users (network operators, not end users of communication services) to articulate desired outcomes without the need to specify how to achieve those outcomes. An Intent-Based System is responsible for translating the intent into courses of action that achieve the desired outcomes and that continue to maintain the outcomes over time. How the necessary courses of action are derived and what planning needs to take place is left open but where the real challenge lies.  Solutions that rely on clever algorithms devised by human developers face the same challenges as any other network management tasks.</t>

<t>These properties (problems with a clearly defined need, whose solution is faced with exploding search spaces and that today rely on algorithms and heuristics that in many cases result only suboptimal outcomes and significant limitations in scale) make automated planning of actions an ideal candidate for the application of AI-based solutions.</t>

<t>AI applications in network management in the past have been largely focusing on classification problems. Examples include analysis by Intrusion Protection Systems of traffic flow patterns to detect suspicious traffic, classification of encrypted traffic for improved QoS treatment based on suspected application type, and prediction of performance parameters based on observations.  In addition, AI has been used for troubleshooting and diagnostics, as well as for automated help and customer support systems.  However, AI-based solutions for the automated planning of actions, including the automated identification of courses of action, have to this point not been explored much.</t>

<t>A much-publicized leap in AI has been the development of AlphaGo <xref target="Sil16"/>.  Instead of using AI to merely solve classification problems, AlphaGo has been successful in automatically deriving winning strategy for board games, specifically the game of Go which features a prohibitively large search space that was long thought to put the ability to play Go at a world class level beyond the reach of problems that AI could solve.   Among the remarkable aspects of Alpha Go is that it is able to identify winning strategies completely on its own, without needing those strategies to be taught or learned by observations assuming the system is aware of rules.</t>

<t>The challenge for AI in network management is hence, where is the equivalent of an Alpha Go that can be applied to network management (and networking) problems?  Specifically, better solutions are needed for solutions that automatically derive plans and courses of actions for network optimization and similar NP-hard problems, such as provided today with only limited effectiveness by controllers and management applications.</t>

<t>Also, the evaluation of AI algorithms to derive courses of actions is more complex than more common regression or classification tasks. Actions need to be applied in order to observe the results it leads to. However, contrary to game playing, solutions need to be applied in the real world, where actions have real effects and consequences. Different orientations can be envisioned. First, incremental application of AI decisions with small steps can allow us to carefully observe and detect unexpected effects. This can be complemented with roll-back techniques. Second, formal verification techniques can be leveraged to verify decisions made by AI are maintained within safety bounds. Third, sandbox environments can be used but they <bcp14>SHOULD</bcp14> be representative enough of the real world. After progress in simulation and emulation, recent research advances lead to the definition of digital twins which implies a tight coupling between a real system and its digital twin to ensure a parallel but synchronized execution. Alternatively, transfer learning techniques in another promising area to be able to capitalize on ML models applicable on a real word system in a more generic sandbox environment. It is actually also an open problem to make the use of AI more acceptable as highlighted in the dedicated section.</t>

</section>
</section>
<section anchor="netData"><name>Network data as input for ML algorithms</name>

<t>Many applications of AI takes as input data. The quality of the outputs of ML-based techniques are highly dependent on the quality and quantity of data used for learning but also on other parameters. For example, as modern network infrastructures move towards higher speed and scale, they aim to support increasingly more demanding services with strict performance guarantees. These often require resource reconfigurations at run time, in response to emerging network events, so that they can ensure reliable delivery at the expected performance level. Timely observation and detection of events is also of paramount importance for security purposes, and can allow faster execution of remedy actions thus leading to reduced service downtime.</t>

<t>Thus, the challenge of data management is multifaceted as detailed in next subsections.</t>

<section anchor="data-for-ai-based-nm-solutions"><name>Data for AI-based NM solutions</name>

<t>Assuming a network management application, the first problem to address is to define the data to be collected which will be appropriate to obtain accurate results. This data selection can require defining problem-specific data or features (feature engineering).</t>

<t>Firstly, NM has already produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI problems and lead to a mismatch. Indeed, machine learning algorithms only work as desired when data to be analyzed respects properties. Many methods rely on vector-based distances which so supposes that the data encoded into the vector respects the underlying distance semantic. Taking the first n bytes of a packet as vectors and computing distances accordingly is possible but does not embed the semantic of the information carried out in the headers. For example, (deep) learning techniques mostly rely on vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc) but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>. Data to handle can be in a schema-free or eventually text-based format. One example could be the automated annotation of management intents provided in an unstructured textual format (policies descriptions, specifications,) to extract from them management entities and operations. For that purpose, suitable annotation models need to be built using existing NER (Named Entity Recognition) techniques usually applied for NLP. However, this <bcp14>SHALL</bcp14> be carefully crafted or specialized for network management (intent) language which indirectly bounces back to the challenges of AI techniques for NM specified earlier.</t>

<t>Secondly, similar to the problem of mapping AI algorithms with NM problems in section <xref target="problemMapping"></xref>, data to be collected also depends on the NM problem to be solved. The mapping between the data sources and the problem is not straightforward as all dependencies or correlations are not known and some might be expected to be discovered by the AI algorithms themselves. In addition, the types of data to collect can vary over time to maintain the performance of an AI-based application or to adapt it to a new context when learned models are updated dynamically. The problems of collecting relevant data and updating models <bcp14>SHOULD</bcp14> thus be handled conjointly.</t>

<t>Secondly, the behavior of any network is not just derived from the events that can be directly observed, such as network traffic overload, but also from events occurring outside the environment of the network. The information provided by the detectors of such kinds of events, e.g. a natural incident (earthquake, storm), can be used to determine the adaptation of the network to avoid potential problems derived from such events. Those can be provided by big data sources as well as sensors of many kinds. The AI challenge related to this task is to process large amounts of data and associate it with the effects that those events have on the network. It is hard to determine the static and dynamic relation between the data provided by external sources and the specific implications it has in networks. For instance, the effect of a “flash crowd” detected in an external source depends on the relation of a particular network to such an event. This can be addressed by AI and its particular application to network management. The objective is to complement a control-loop, as shown in <xref target="Mar18"/>, by including the specific AI engines into the decision components as well as the processes that close the loop, so the AI engine can receive feedback from the network in order to improve its own behavior. Similar challenges are addressed in other domains, image processing and computer vision, by using artifacts for anticipating movements in object location and identification.</t>

</section>
<section anchor="data-collection"><name>Data collection</name>

<t>Once defined, the second problem to address is the collection of data. Monitoring frameworks have been developed for many years such as IPFIX <xref target="RFC7011"/> and more recently with SDN-based monitoring solutions <xref target="Yu14"/><xref target="Ngu20"/>. However, going towards more AI for actions in network management supposes also to retrieve more than traffic related information. Actually, configuration information such as topologies, routing tables or security policies have been proven to be relevant in specific scenarios. As a result, many different technologies can be used to retrieve meaningful data. To support improved QoE, monitoring of the application layer is helpful but far from being easy with the heterogeneity of end-user applications and the wide use of encrypted channels. Monitoring techniques need to be reinvented through the definition of new techniques to extract knowledge from raw measurement <xref target="Bri19"/> or by involving end-users with crowd-sourcing <xref target="Hir15"/> and distributed monitoring. Also, the data-mesh concept proposes to classify data into three categories: source-aligned, aggregate and consumer-aligned. Source-aligned data are those related to the same operational domain and it is important to correlate or aggregate them with higher planes: management-, control- and forwarding plane. An issue is the difference, not only in the nature of data, but in their volumes and their variety. Some may change rapidly over time (for example network traffic) while other may be quite stable (device state).</t>

<t>The collecting process requirements depend on the kind of processing. We can distinguish two major classes: batch/offline vs real-time/online processing. In particular, real-time monitoring tools are key in enabling dynamic resource management functions to operate on short reconfiguration cycles. However, maintaining an accurate view of the network state requires a vast amount of information to be collected and processed. While efficient mechanisms that extract raw measurement data at line rate have been recently developed, the processing of collected data is still a costly operation. This involves potentially sampling, evaluating and aggregating a vast amount of state information as a response to a diverse set of monitoring queries, before generating accurate reports. One difficult problem resides also in the availability of data as real-time data from different sources to be aggregated may not arrive at the same time requiring so some buffering techniques. Machine learning methods, e.g. based on regression, can be used to intelligently filter the raw measurements and thus reduce the volume of data to process. For example, in <xref target="Tan20"/> the authors proposed an approach in which the classifiers derived for this purpose (according to measurements on traffic properties) can achieve a threefold improvement in the query processing capability. A residual question is the storage of raw measurements. In fact, predicting the lifetime of data is challenging because their analysis may not be planned and triggered by a particular event (for example, an anomaly or attack). As a result, the provisioning of storage capacity can be hard.</t>

<t>In parallel to the continuously increasing dynamicity of networks and complexity of traffic, there is a trend towards more user traffic processing customization <xref target="RFC8986"/><xref target="Li19"/>. As a result, fine grained information about network element states is expected and new propositions have emerged to collect on-path data or in-band network telemetry information <xref target="Tan20b"/>. These new approaches have been designed by introducing much flexibility and customization and could be helpful to be used in conjunction with AI applications. However, the seamless coupling of telemetry processes with packet forwarding requires careful definition of solutions to limit the overhead and the impact of the throughput while providing the necessary level of details. This shares commonalities with the lightweight AI challenge.</t>

</section>
<section anchor="usable-data"><name>Usable data</name>

<t>Although all agree on the necessity to have more shared datasets, it is quite uncommon in practice. Data contains private or sensitive information and may not be shared because of the criticality of data (which can be used by ill-intentioned adversaries) or due to laws or regulations, even within the same company. To solve this issue, anonymization techniques <xref target="Dij19"/> can be enhanced to optimize the trade-off between valuable data and sensitive information (potential) leakage or reconstruction.
Whatever the final user of data, regulations and laws impose rules on data management with potentially costly impact if they are not respected voluntarily or not. Defining a new monitoring framework should always consider security and privacy aspects, for example to let any user/customer or access/remove its own data with General Data Protection Regulation (GDPR) in EU. The challenge resides here in the capacity of qualifying what is critical or private information and the capacity for an adversary to reconstruct it from other sources of data. Hence AI/ML based solutions will require more data but also more administrative, legal and ethical procedures. Those can last long and so slow down the deployment of a new solution. In addition, this requires interaction with experts from different domains (e.g. AI engineer and a lawyer). The integration of these non-technical constraints should be considered when defining new data to be collected or a new technique to collect data. However, knowing the final use of data is most of the time necessary for ethical and legal assessment which assumes that those considerations <bcp14>SHOULD</bcp14>  be integrated from the early design of new AI-based solutions.</t>

<t>For supervised or semi-supervised training, having a labeled dataset is a prerequisite. It constitutes a major challenge as well. One one hand, collectors are able to retrieve data. On the other hand, those network data are typically unlabeled. This limits application of ML to unsupervised learning tasks (learning from data). Because manual labeling is a tedious task. one option is to leverage AI to guide humans. This may also support a better generalization of a learned model. Indeed, an underlying challenge is the genericity or coverage of the datasets. Labels encode values of an objective function, the challenge posed by the design of such tools is tremendous since for involving a M:N relationship: 1 data type may be associated to M objective function values and N data types may be associated to 1 objective function. As a result, most datasets used for research encodes a single label for a particular application like attack label for datasets to be used in the context of intrusion detection or application type for network traffic used for classification where the value of a single dataset could be capitalized in several applications.</t>

<t>Again, researchers need empirical (or at least realistic) datasets to validate their solutions. Unfortunately, as highlighted above, having such data from real deployments for various reasons (business secrets, privacy concerns, concerns that vulnerabilities are revealed by accident, raw unlabeled data, etc.) is tough. Even if such a dataset is available it might not be enough to convincingly validate a new algorithm.
Instead of falling back to artificial testbed experiments or simulation, it would be useful to have the capability to generate datasets with characteristics that are not 100% identical but similar to the characteristics of one or more real datasets. Such synthetic networks can be used to validate new management algorithms, intrusion detection systems, etc.
The usage of AI (for example GANs) in this area <xref target="Hui22"/> is not yet widespread and there are still many concerns that deter researchers, e.g. the fear of leaking sensitive information from the original dataset into the synthetic dataset.</t>

</section>
</section>
<section anchor="acceptability"><name>Acceptability of AI</name>

<t>Networks are critical infrastructures. On one hand, they <bcp14>SHOULD</bcp14> be operated without interruption and must be interoperable. Networks, except in a lab, are not isolated which slow down innovation in general. For example, changing Internet routing protocols <bcp14>SHOULD</bcp14> be accepted by multiples entities such as operators of interconnected networks. The same applies for protocols. Even if there have been several versions of major protocols in use like TCP or DNS, there are still some security issues which cannot be patched with 100% guarantee. On the other hand, results provided by AI solutions are uncertain by nature. The same technique applied in different environments can produce different results. AI techniques need some effort (time and human) to be properly configured or to be stabilized. For instance, reinforcement learning needs several iterations before being able to produce acceptable results. These properties of AI techniques are thus a bit antagonist with the criticality of network infrastructures. With that in mind, acceptability of AI by network operators is clearly an obstacle for its larger adoption.</t>

<section anchor="explainability"><name>Explainability of Network-AI products</name>

<t>A common issue across many Machine Learning (ML) applications is their lack to provide human-understandable reasoning processes. This means that, after training, the knowledge acquired by ML models is unintelligible to humans. As a result, offering hard guarantees on performance is a very challenging issue. In addition, complex ML models like neural networks -that often have more than hundreds of thousands of parameters- are very hard to debug or troubleshoot in case of failure.</t>

<t>While this is a common issue for all applications of AI, many areas work well with uncertainty and the black-box behavior of AI-based solutions. For instance, users accept an inherent error in recommender systems or computer vision solutions.</t>

<t>The networking field has already produced a set of well-established network management algorithms and methods, with clear performance guarantees and troubleshooting mechanisms <xref target="Rex06"/><xref target="Kr14"/>. As such, improving debugging, troubleshooting and guarantees on AI-based solutions for networking is a must.</t>

<t>AI researchers and practitioners are devoting large research efforts to improve this aspect of ML models, which is commonly known as explainability <xref target="XAI"/>.</t>

<t>This set of techniques provides insights and, in some cases, guarantees on the performance and behavior of ML-based solutions. Understanding such techniques, researching and applying them to network AI is critical for the success of the field.</t>

<t>There exist several ML-based methods that are human-understandable, although not widely used today. For instance, <xref target="Mar20"/> shows a method for building anticipation models (prediction) that provide explanations while determining some actions for tuning some parameters of the network. There are other challenges that <bcp14>SHOULD</bcp14> be addressed, such as providing explanations for other ML methods that are quite extended. For instance, xNN/SVM models can be accompanied by Digital Twins of the network that are reversely explored to explain some output from the ML model (e.g., xNN/SVM). In this context, there already exist several methods <xref target="Zil20"/><xref target="Puj21"/> that produce human-readable interpretations of trained NN models, by analyzing their neural activations on different inputs. (As an aside, it should be noted that Digital Twins are not considered per se an AI approach; they merely serve to provide a digital representation of a network that can serve as its proxy and offer a layer of indirection between management applications and actual network resources. That being said, it is conceivable that AI-based management applications can be combined and operate in conjunction with Digital Twin technology, for example to use a Digital Twins as an experimentation sandbox or staging ground for AI-driven applciations.)</t>

</section>
<section anchor="ai-based-products-and-algorithms-in-production-systems"><name>AI-based products and algorithms in production systems</name>

<t>AI-based network management and optimization algorithms are first trained, then the resulting model is used to produce relevant inferences in operation, either in management or optimization scenarios. A relevant question for the success of AI-based solutions is: where does this training occur?</t>

<t>Traditionally, AI-based models have been trained in the same scenario where they operate<xref target="Val17"/><xref target="Xu18"/>, this is the customer network. However this presents critical drawbacks. First, training an AI model for management and operation typically requires generating network configurations and scenarios that can break the network. This is because training requires seeing a broad spectrum of scenarios. Thus, training in production networks is very challenging. Second, customer networks may not be equipped with the monitoring infrastructure required to collect the data used in the training process (e.g., performance metrics). Actually, performing learning directly into a production network is possible assuming imperfect models and the need of several step of refinement before it gets stable. For non-critical management task, such assumption can hold and additional safe-guarding mechanisms <bcp14>SHOULD</bcp14> be considered in order to keep outputs of ML algorithms (such as decisions) within acceptable boundaries.</t>

<t>A more sensible approach is to train the AI-based product in a lab, for instance in the vendor’s premises. In the lab, AI models can be trained in a controlled testbed, with any configuration, even ones that break the network. However, the main challenge here arises from the fundamental differences between the lab’s network and the customer networks. For instance, the topology of the lab’s network might be smaller, etc. As a result, there is a need for models that are able to generalize. In this context, generalization means that models should be able to operate in other scenarios not seen during training, with different topologies, routing configurations, scheduling policies, etc.</t>

<t>In order to address this generalization problem, multiple complementary approaches are possible: 
One approach is training on diverse data that represents large parts of the expected problem space. For example, training with various different traffic patterns will help improve generalization to unseen but comparable traffic patterns.
Another approach is to leverage AI designs or architectures that facilitate generalization. One example are Graph Neural Networks (GNN) <xref target="gnn1"/><xref target="gnn2"/>. GNNs are a rather novel type of neural network able to operate and generalize over graphs. Indeed, networks are fundamentally represented as graphs: topology, routing, etc. With GNNs, vendors can train the AI model in a lab with a certain topology and then directly use the resulting model in different customer networks, even with different network topologies.
Finally, another approach is Transfer Learning <xref target="tl1"/>. With this technique, the knowledge gained in the lab’s training  is used to operate in the customer network. Transfer Learning still requires that some data from the customer is used to re-train and fine-tune the model (e.g., accurate performance measurements). This means that, for each customer network, re-training is required. This may be problematic since it requires added cost and access to customer data.</t>

<t>In addition to the challenge of generalizing from training to production environment, there are also challenges in terms of interoperability between different AI approaches and different deployment environments.
As mentioned above, AI approaches may be deployed in diverse environments, e.g., for training and production, but also for local development, for testing, and for validation or in different part of the production systems.
These environments may differ in available compute resources, network topology, operating systems, cloud providers, etc. (single node machine, single cluster, many distributed clusters, ...). Deploying the same AI solutions in these different environments can lead to various challenges in terms of interoperability. Common AI frameworks support scaling across networks of different size. Yet, many frameworks are often combined, e.g., for data collection, processing, predictions, validation, etc. Again, ensuring interoperability between these frameworks can be tedious.</t>

<t>This shares some  with problems described in <xref target="DistributedAI"></xref> and particularly emphasizes the need for network environments to provide interfaces and descriptions suitable for AI solutions to be properly instantiated and configured.</t>

<t>One approach to address these interoperability challenges is through meta-frameworks that interface with most available AI frameworks. These meta-frameworks provide a higher level of abstraction and often allow seamless deployment across different environments (e.g., on-premise or at different cloud providers) <xref target="Mor18"/>.</t>

</section>
<section anchor="ai-with-humans-in-the-loop"><name>AI with humans in the loop</name>

<t>Depending on the network management task, AI can automate and replace manual human control or it can complement human experts and keep them in the loop. Keeping humans in the loop will be an important step of building trust in AI approaches and help ensure the desired outcomes.
There are various ways of keeping humans in the loop in the different fields of AI, which could be useful for different aspects of network management.</t>

<t>In classification tasks (e.g., detecting security breaches, malware or detecting anomalies), trained AI models provide a confidence score in addition to the predicted class. If the confidence is high, the prediction is used directly. If the confidence is too low, a human expert may jump in and make the decision - thereby also providing valuable training data to improve the AI model. Such approaches are already being used in industry, e.g., to automatically label datasets (AWS SageMake). Similar approaches could also be used for other supervised learning tasks, e.g., regression. Still, it is an open challenge to keep humans in the loop in all phases of the learning process.</t>

<t>Another field of AI is reinforcement learning, which is useful for taking continuous control decisions in network management, e.g., controlling service scaling and placement as well as flow scheduling and routing over time. Reinforcement learning agents typically interact with the environment (i.e., the simulated or real network) completely autonomously without human feedback. However, there is a growing number of approaches to put human experts back into the loop. One approach is offline reinforcement learning, where the training data does not come from the reinforcement learning agent’s own exploration but from pre-recorded traces of human experts (e.g., placement decisions that were made by humans before). Another approach is to reward the reinforcement learning agent based on human feedback rather than a pre-defined reward function <xref target="Lee21"/>. Again, while there are first promising approaches, more work is required in this area.
Overall, it is an open challenge to both leverage the benefits of AI but keep human experts in the loop where it is useful.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security considerations</name>

<t>This document introduces the challenges of coupling AI and NM. Since the aim of this document is not to address a particular NM problem by defining a solution and because many possible ones can be developed further to address the proposed challenge, it is not possible at this stage to define security concerns specific to a solution. However, examples of applications mentioned and cited in the different sections may face their own security concerns. In this section, our objective is to highlight high-level security considerations to be considered when coupling AI and NM. Those concerns serves as the common basis to be refined according when a particular NM application is developed.</t>

<section anchor="ai-based-security-solutions"><name>AI-based security solutions</name>

<t>The first security consideration refers to the use of AI for NM problem related to security of the managed networked systems. There are multiple scenarios where AI can be leveraged: to perform traffic filtering, to detect anomalies or to decide on target moving defence strategies. In these cases, the performance of the AI algorithms impacts on the security performance (e.g. detection or mitigation effectiveness) like any other non-AI system. However, AI methods generally tends to obfuscate how predictions are made and decisions taken. Explainability of AI is thus highly important. This is why this concern is addressed globally in this document in section <xref target="explainability"></xref> as it is a general problem that can impact on any other type of NM applications.</t>

<t>Assuming a ML trained model, there is always an uncertainty regarding reachable performance on the wild once the solution is deployed as it can suffer from a poor generalization due to different reasons. There are two major problems which are well known in the ML field: overfitting or under-fitting.  In the first case, the learned model is too specific to the training data while in the second case the model does not infer any valuable knowledge from data. To avoid these issues, hyper-parameter fine-tuning is necessary. For example, the number of iterations is an essential hyper-parameter to be adjusted to learn a neural network model. If it is too low, the learning does not converge to a representative model of the training data (underfitting). With a high value, there is a risk that the model is too close to the training data (overfitting). In general, finding the right hyper-parameters is helpful to find a good ML algorithm configurations. There are different techniques ranging from grid-search to bayesian optimization falling into the AI area of Hyper-Parameter Optimization (HPO) <xref target="Bis23"/>. This consideration goes beyond the sole problem of hyper-parameters settings but as a full analysis pipeline also assumes the ML algorithm to be selected or the data pre-processing to be configured. This reflects challenges from the AI research area covered by AutoML technique. In this document, this is also referred in section <xref target="tailoringAI"></xref> when considered in the context of NM. As highlighted in the aforementioned section, some expertise or area-specific knowledge can help guiding automated configuration processes.</t>

<t>Besides, machine learning assumes to have representative training data. The quality of dataset for learning is a vast problem. Additionally, the representation of data needs to be addressed carefully to be properly analyzed by AI models, for example with pre-processing techniques to normalize data, balance classes or encode categorical features depending on the type of algorithms. Actually, <xref target="netData"></xref> of this document fully addresses the concerns related to data in regards to NM problems.</t>

</section>
<section anchor="security-of-ai"><name>Security of AI</name>

<t>Although ensuring a good performance of AI algorithms is already challenging, assuming an attacker aiming at compromising it emphasizes the problem. Adversarial AI and notably adversarial ML have attracted a lot of attention over the last year. Adversarial AI and ML relates to both attack and defences. While this is out of scope of the document, evaluating threats against an ML system before deploying it is an important aspect. This supposes to assess what types of information the attacker can access (training data, trained model, algorithm configuration...) and the performable malicious actions (inject false training data, test the system, poison a model,  etc.) to evaluate the magnitude of the impact of possible attacks.</t>

<t>For illustration purposes, we refer hereafter to some examples. In the case of an intrusion detector, an attacker may try to compromise training data by providing adversarial samples to ensure that the detector will miss-classify the future attacks <xref target="Jmi22"/>. In a white-box approach where the model is known from the attacker, the attack can be carefully crafted to avoid being properly labeled. For instance, packet sizes and timings can be easily modified to bypass ML-based traffic classification system <xref target="Nas21"/>. In a black-box model, the attacker ignores the functioning or training data of the ML systems but can try to infer some information. For example, the attacker can try to reconstruct sensitive information which have been used for training. This type of attack qualified as model inversion <xref target="Fre15"/> raises concern regarding privacy.</t>

<t>All these threats are exacerbated in the context of solutions relying on distributed AI involving multiple entities that are not necessarily controlled by the same authority. Once the threats are assessed, solutions needs to be developed and deployed which can be either proactive by providing some guarantees regarding the involved entities using authentication or trust mechanisms but also reactive by validating data processing through voting mechanisms or knowledge proofs. Other solutions include defensive techniques to rate limit or filter queries to a particular deployed model. All these examples are for illustration purposes and are not exhaustive.</t>

</section>
<section anchor="relevance-of-ai-based-outputs"><name> Relevance of AI-based outputs</name>

<t>Security breaches can be created by an AI-driven application. Actually,any system that will be use to guide or advice on actions to be perform on network raise the same issue. For example, if an AI algorithm decide to change the filtering tables in a network it may compromise access control policies. Irrelevant results could be also produced. In the area of QoS, an AI system could allocate a bandwidth to a flow higher to the real link capacity. As shown from these two examples, an AI can produce decisions or values which are out of bounds of normal operations. To avoid such issues, safeguards can be added to discard or correct irrelevant outputs. Detecting such type of outputs can be also challenging in complex and distributed systems such as a network. Formal verification methods or testing techniques are helpful in that context.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>

&RFC7011;
&RFC8986;
&RFC9315;
&RFC2119;
&RFC8174;


    </references>

    <references title='Informative References'>

<reference anchor="Mcc93" >
  <front>
    <title>The BSD packet filter: a new architecture for user-level packet capture</title>
    <author initials="S." surname="McCanne" fullname="Steve McCanne">
      <organization></organization>
    </author>
    <author initials="V." surname="Jacobson" fullname="Van Jacobson">
      <organization></organization>
    </author>
    <date year="1993"/>
  </front>
<annotation>USENIX Winter Conference</annotation></reference>
<reference anchor="Ste92" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="D." surname="Stern" fullname="Daniel Stern">
      <organization></organization>
    </author>
    <author initials="P." surname="Chemouil" fullname="Prosper Chemouil">
      <organization></organization>
    </author>
    <date year="1992"/>
  </front>
<annotation>Networks, Kobe, Japan</annotation></reference>
<reference anchor="Abd10" >
  <front>
    <title>A Diagnosis Expert System for Network Traffic Management</title>
    <author initials="K. A." surname="Jalil" fullname="Kamarularifin Abd Jalil">
      <organization></organization>
    </author>
    <author initials="M. H." surname="Kamarudin" fullname="Muhammad Hilmi Kamarudin">
      <organization></organization>
    </author>
    <author initials="M. N." surname="Masrek" fullname="Mohamad Noorman Masrek">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>IEEE international conference on networking and information technology</annotation></reference>
<reference anchor="Beg19" >
  <front>
    <title>DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning</title>
    <author initials="D." surname="Bega" fullname="D. Bega">
      <organization></organization>
    </author>
    <author initials="M." surname="Gramaglia" fullname="M. Gramaglia">
      <organization></organization>
    </author>
    <author initials="M." surname="Fiore" fullname="M. Fiore">
      <organization></organization>
    </author>
    <author initials="A." surname="Banchs" fullname="A. Banchs">
      <organization></organization>
    </author>
    <author initials="X." surname="Costa-Perez" fullname="X. Costa-Perez">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="Bos13" >
  <front>
    <title>Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="H.-S." surname="Kim" fullname="Hun-Seok Kim">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="F." surname="Mujica" fullname="Fernando Mujica">
      <organization></organization>
    </author>
    <author initials="M." surname="Horowitz" fullname="Mark Horowitz">
      <organization></organization>
    </author>
    <date year="2013"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Bos14" >
  <front>
    <title>P4: programming protocol-independent packet processors</title>
    <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
      <organization></organization>
    </author>
    <author initials="D." surname="Daly" fullname="Dan Daly">
      <organization></organization>
    </author>
    <author initials="G." surname="Gibb" fullname="Glen Gibb">
      <organization></organization>
    </author>
    <author initials="M." surname="Izzard" fullname="Martin Izzard">
      <organization></organization>
    </author>
    <author initials="N." surname="McKeown" fullname="Nick McKeown">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
      <organization></organization>
    </author>
    <author initials="D." surname="Talayco" fullname="Dan Talayco">
      <organization></organization>
    </author>
    <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
      <organization></organization>
    </author>
    <author initials="G." surname="Varghese" fullname="George Varghese">
      <organization></organization>
    </author>
    <author initials="D." surname="Walker" fullname="David Walker">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>SIGCOMM Comput. Commun. Rev. 44</annotation></reference>
<reference anchor="Dat18" >
  <front>
    <title>P4Guard: Designing P4 Based Firewall</title>
    <author initials="R." surname="Datta" fullname="R. Datta">
      <organization></organization>
    </author>
    <author initials="S." surname="Choi" fullname="S. Choi">
      <organization></organization>
    </author>
    <author initials="A." surname="Chowdhary" fullname="A. Chowdhary">
      <organization></organization>
    </author>
    <author initials="Y." surname="Park," fullname="Y. Park,">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Military Communications Conference (MILCOM)</annotation></reference>
<reference anchor="Che19" >
  <front>
    <title>P4-Enabled Bandwidth Management</title>
    <author initials="Y." surname="Chen" fullname="Y. Chen">
      <organization></organization>
    </author>
    <author initials="L." surname="Yen" fullname="L. Yen">
      <organization></organization>
    </author>
    <author initials="W." surname="Wang" fullname="W. Wang">
      <organization></organization>
    </author>
    <author initials="C." surname="Chuang" fullname="C. Chuang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Y. Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Tseng" fullname="C. Tseng">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>Asia-Pacific Network Operations and Management Symposium (APNOMS)</annotation></reference>
<reference anchor="Cha18" >
  <front>
    <title>Oko: Extending Open vSwitch with Stateful Filters</title>
    <author initials="P." surname="Chaignon" fullname="Paul Chaignon">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="T." surname="Delmas" fullname="Thibault Delmas">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM Symposium on SDN Research (SOSR)</annotation></reference>
<reference anchor="czb20" >
  <front>
    <title>Network Management 2030: Operations and Control of Network 2030 Services</title>
    <author initials="A." surname="Clemm" fullname="A. Clemm">
      <organization></organization>
    </author>
    <author initials="M. F." surname="Zhani" fullname="M. F. Zhani">
      <organization></organization>
    </author>
    <author initials="R." surname="Boutaba" fullname="R. Boutaba">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Springer Journal of Network and Systems Management (JNSM)</annotation></reference>
<reference anchor="Hua19" >
  <front>
    <title>Addressing the Loss-Metric Mismatch with Adaptive Loss Alignment</title>
    <author initials="C." surname="Huang" fullname="Chen Huang">
      <organization></organization>
    </author>
    <author initials="S." surname="Zhai" fullname="Shuangfei Zhai">
      <organization></organization>
    </author>
    <author initials="W." surname="Talbott" fullname="Walter Talbott">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Bautista" fullname="Miguel Angel Bautista">
      <organization></organization>
    </author>
    <author initials="S.-Y." surname="Sun" fullname="Shih-Yu Sun">
      <organization></organization>
    </author>
    <author initials="C." surname="Guestrin" fullname="Carlos Guestrin">
      <organization></organization>
    </author>
    <author initials="J." surname="Susskind" fullname="Josh Susskind">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ICRL</annotation></reference>
<reference anchor="Jos22" >
  <front>
    <title>NetREC Network-wide in-network REal-value Computation.</title>
    <author initials="M." surname="Jose" fullname="Matthews Jose">
      <organization></organization>
    </author>
    <author initials="K." surname="Lazri" fullname="Kahina Lazri">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="O." surname="Festor" fullname="Olivier Festor">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>IEEE International Conference on Network Softwarization (NetSoft)</annotation></reference>
<reference anchor="Lee21" >
  <front>
    <title>Feedback-efficient interactive reinforcement learning via relabeling experience and unsupervised pre-training</title>
    <author initials="K." surname="Lee" fullname="K. Lee">
      <organization></organization>
    </author>
    <author initials="L." surname="Smith" fullname="L. Smith">
      <organization></organization>
    </author>
    <author initials="P." surname="Abbeel" fullname="P. Abbeel">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>arXiv preprint arXiv:2106.05091</annotation></reference>
<reference anchor="Lia18" >
  <front>
    <title>FP-BNN: Binarized neural network on FPGA</title>
    <author initials="S." surname="Liang" fullname="Shuang Liang">
      <organization></organization>
    </author>
    <author initials="S." surname="Yin" fullname="Shouyi Yin">
      <organization></organization>
    </author>
    <author initials="L." surname="Liu" fullname="Leibo Liu">
      <organization></organization>
    </author>
    <author initials="W." surname="Luk" fullname="Wayne Luk">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Shaojun Wei">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Neurocomputing, Volume 275</annotation></reference>
<reference anchor="Liu16" >
  <front>
    <title>One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon</title>
    <author initials="Z." surname="Liu" fullname="Zaoxing Liu">
      <organization></organization>
    </author>
    <author initials="A." surname="Manousis" fullname="Antonis Manousis">
      <organization></organization>
    </author>
    <author initials="G." surname="Vorsanger" fullname="Gregory Vorsanger">
      <organization></organization>
    </author>
    <author initials="V." surname="Sekar" fullname="Vyas Sekar">
      <organization></organization>
    </author>
    <author initials="V." surname="Braverman" fullname="Vladimir Braverman">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Yan18" >
  <front>
    <title>Elastic sketch: adaptive and fast network-wide measurements</title>
    <author initials="T." surname="Yang" fullname="Tong Yang">
      <organization></organization>
    </author>
    <author initials="J." surname="Jiang" fullname="Jie Jiang">
      <organization></organization>
    </author>
    <author initials="P." surname="Liu" fullname="Peng Liu">
      <organization></organization>
    </author>
    <author initials="Q." surname="Huang" fullname="Qun Huang">
      <organization></organization>
    </author>
    <author initials="J." surname="Gong" fullname="Junzhi Gong">
      <organization></organization>
    </author>
    <author initials="Y." surname="Zhou" fullname="Yang Zhou">
      <organization></organization>
    </author>
    <author initials="R." surname="Miao" fullname="Rui Miao">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xiaoming Li">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="Steve Uhlig">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Gup18" >
  <front>
    <title>Sonata: query-driven streaming network telemetry</title>
    <author initials="A." surname="Gupta" fullname="Arpit Gupta">
      <organization></organization>
    </author>
    <author initials="R." surname="Harrison" fullname="Rob Harrison">
      <organization></organization>
    </author>
    <author initials="M." surname="Canini" fullname="Marco Canini">
      <organization></organization>
    </author>
    <author initials="N." surname="Feamster" fullname="Nick Feamster">
      <organization></organization>
    </author>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <author initials="W." surname="Willinger" fullname="Walter Willinger">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>ACM SIGCOMM Conference</annotation></reference>
<reference anchor="Mar18" >
  <front>
    <title>Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Harai" fullname="Hiroaki Harai">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, Vol. 15, N. 2,</annotation></reference>
<reference anchor="Mar20" >
  <front>
    <title>Explained Intelligent Management Decisions in Virtual Networks and Network Slices</title>
    <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
      <organization></organization>
    </author>
    <author initials="H." surname="Asaeda" fullname="H. Asaeda">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</annotation></reference>
<reference anchor="Mus18" >
  <front>
    <title>An overview on application of machine learning techniques in optical networks</title>
    <author initials="F." surname="Musumeci" fullname="F. Musumeci">
      <organization></organization>
    </author>
    <author initials="C." surname="Rottondi" fullname="C. Rottondi">
      <organization></organization>
    </author>
    <author initials="A." surname="Nag" fullname="A. Nag">
      <organization></organization>
    </author>
    <author initials="I." surname="Macaluso" fullname="I. Macaluso">
      <organization></organization>
    </author>
    <author initials="D." surname="Zibar" fullname="D. Zibar">
      <organization></organization>
    </author>
    <author initials="M." surname="Ruffini" fullname="M. Ruffini">
      <organization></organization>
    </author>
    <author initials="M." surname="Tornatore" fullname="M. Tornatore">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials, 21(2), 1383-1408.</annotation></reference>
<reference anchor="Ngu20" >
  <front>
    <title>Efficient SDN-based traffic monitoring in IoT networks with double deep Q-network</title>
    <author initials="T. G." surname="Nguyen" fullname="T. G. Nguyen">
      <organization></organization>
    </author>
    <author initials="T. V." surname="Phan" fullname="T. V. Phan">
      <organization></organization>
    </author>
    <author initials="D. T." surname="Hoang" fullname="D. T. Hoang">
      <organization></organization>
    </author>
    <author initials="T. N." surname="Nguyen" fullname="T. N. Nguyen">
      <organization></organization>
    </author>
    <author initials="C." surname="So-In" fullname="C. So-In">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>International conference on computational data and social networks, Springer</annotation></reference>
<reference anchor="Tan20" >
  <front>
    <title>Classification-assisted Query Processing for Network Telemetry</title>
    <author initials="G." surname="Tangari" fullname="G. Tangari">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="M. Charalambides">
      <organization></organization>
    </author>
    <author initials="G." surname="Pavlou" fullname="G. Pavlou">
      <organization></organization>
    </author>
    <author initials="C." surname="Grazian" fullname="C. Grazian">
      <organization></organization>
    </author>
    <author initials="D." surname="Tuncer" fullname="D. Tuncer">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Network Traffic Measurement and Analysis Conference (TMA)</annotation></reference>
<reference anchor="Tan20b" >
  <front>
    <title>In-band Network Telemetry: A Survey</title>
    <author initials="T." surname="Lizhuang" fullname="Tan, Lizhuang">
      <organization></organization>
    </author>
    <author initials="S." surname="Wei" fullname="Su, Wei">
      <organization></organization>
    </author>
    <author initials="Z." surname="Zhenyi" fullname="Zhang, Zhenyi">
      <organization></organization>
    </author>
    <author initials="M." surname="Jingying" fullname="Miao, Jingying">
      <organization></organization>
    </author>
    <author initials="L." surname="Xiaoxi" fullname="Liu, Xiaoxi">
      <organization></organization>
    </author>
    <author initials="L." surname="Na" fullname="Li, Na">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>Computer Networks. 186. 10.1016</annotation></reference>
<reference anchor="Val17" >
  <front>
    <title>Learning to route</title>
    <author initials="V." surname="A." fullname="Valadarsky, A.">
      <organization></organization>
    </author>
    <author initials="S." surname="M." fullname="Schapira, M.">
      <organization></organization>
    </author>
    <author initials="S." surname="D." fullname="Shahaf, D.">
      <organization></organization>
    </author>
    <author initials="T." surname="A." fullname="Tamar, A.">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>ACM HotNets</annotation></reference>
<reference anchor="Xu18" >
  <front>
    <title>Experience-driven networking: A deep reinforcement learning based approach</title>
    <author initials="X." surname="Z." fullname="Xu, Z.">
      <organization></organization>
    </author>
    <author initials="T." surname="J." fullname="Tang J.">
      <organization></organization>
    </author>
    <author initials="M." surname="J." fullname="Meng, J.">
      <organization></organization>
    </author>
    <author initials="Z." surname="W." fullname="Zhang, W.">
      <organization></organization>
    </author>
    <author initials="W." surname="Y." fullname="Wang, Y.">
      <organization></organization>
    </author>
    <author initials="L. C." surname="H." fullname="Liu, C. H.">
      <organization></organization>
    </author>
    <author initials="Y." surname="D." fullname="Yang, D.">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE INFOCOM</annotation></reference>
<reference anchor="tl1" >
  <front>
    <title>Transfer learning</title>
    <author initials="L." surname="Torrey" fullname="Lisa Torrey">
      <organization></organization>
    </author>
    <author initials="J." surname="Shavlik" fullname="Jude Shavlik">
      <organization></organization>
    </author>
    <date year="2010"/>
  </front>
<annotation>Handbook of research on machine learning applications and trends: algorithms, methods, and techniques</annotation></reference>
<reference anchor="gnn1" >
  <front>
    <title>Relational inductive biases, deep learning, and graph networks</title>
    <author initials="P. W." surname="Battaglia" fullname="Peter W. Battaglia">
      <organization></organization>
    </author>
    <author initials="E." surname="al" fullname="Et. al">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>arXiv preprint arXiv:1806.01261</annotation></reference>
<reference anchor="gnn2" >
  <front>
    <title>Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN</title>
    <author initials="K." surname="Rusek" fullname="K. Rusek">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="J. Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="A." surname="Mestres" fullname="A. Mestres">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="P. Barlet-Ros">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM Symposium on SDN Research</annotation></reference>
<reference anchor="Rex06" >
  <front>
    <title>Route optimization in IP networks</title>
    <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
      <organization></organization>
    </author>
    <date year="2006"/>
  </front>
<annotation>Handbook of Optimization in Telecommunications (pp. 679-700), Springer</annotation></reference>
<reference anchor="Kr14" >
  <front>
    <title>Software-defined networking: A comprehensive survey</title>
    <author initials="D." surname="Kreutz" fullname="D. Kreutz">
      <organization></organization>
    </author>
    <author initials="F. M." surname="Ramos" fullname="F. M. Ramos">
      <organization></organization>
    </author>
    <author initials="P. E." surname="Verissimo" fullname="P. E. Verissimo">
      <organization></organization>
    </author>
    <author initials="C. E." surname="Rothenberg" fullname="C. E. Rothenberg">
      <organization></organization>
    </author>
    <author initials="S." surname="Azodolmolky" fullname="S. Azodolmolky">
      <organization></organization>
    </author>
    <author initials="S." surname="Uhlig" fullname="S. Uhlig">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76</annotation></reference>
<reference anchor="XAI" >
  <front>
    <title>Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models</title>
    <author initials="W." surname="Samek" fullname="Wojciech Samek">
      <organization></organization>
    </author>
    <author initials="T." surname="Wiegand" fullname="Thomas Wiegand">
      <organization></organization>
    </author>
    <author initials="K.-R." surname="Müller" fullname="Klaus-Robert Müller">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>arXiv preprint arXiv:1708.08296</annotation></reference>
<reference anchor="Zil20" >
  <front>
    <title>Interpreting Deep Learning-Based Networking Systems</title>
    <author initials="Z." surname="Meng" fullname="Zili Meng">
      <organization></organization>
    </author>
    <author initials="M." surname="Wang" fullname="Minhu Wang">
      <organization></organization>
    </author>
    <author initials="J." surname="Bai" fullname="Jiasong Bai">
      <organization></organization>
    </author>
    <author initials="M." surname="Xu" fullname="Mingwei Xu">
      <organization></organization>
    </author>
    <author initials="H." surname="Mao" fullname="Hongzi Mao">
      <organization></organization>
    </author>
    <author initials="H." surname="Hu" fullname="Hongxin Hu">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>ACM SIGCOMM</annotation></reference>
<reference anchor="Mor18" >
  <front>
    <title>Ray: A Distributed Framework for Emerging AI Applications</title>
    <author initials="P." surname="Moritz" fullname="Philipp Moritz">
      <organization></organization>
    </author>
    <author initials="R." surname="Nishihara" fullname="Robert Nishihara">
      <organization></organization>
    </author>
    <author initials="S." surname="Wang" fullname="Stephanie Wang">
      <organization></organization>
    </author>
    <author initials="A." surname="Tumanov" fullname="Alexey Tumanov">
      <organization></organization>
    </author>
    <author initials="R." surname="Liaw" fullname="Richard Liaw">
      <organization></organization>
    </author>
    <author initials="E." surname="Liang" fullname="Eric Liang">
      <organization></organization>
    </author>
    <author initials="M." surname="Elibol" fullname="Melih Elibol">
      <organization></organization>
    </author>
    <author initials="Z." surname="Yang" fullname="Zongheng Yang">
      <organization></organization>
    </author>
    <author initials="W." surname="Paul" fullname="William Paul">
      <organization></organization>
    </author>
    <author initials="M." surname="Jordan" fullname="Michael Jordan">
      <organization></organization>
    </author>
    <author initials="I." surname="Stoica" fullname="Ion Stoica">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>USENIX Symposium on Operating Systems Design and Implementation (OSDI)</annotation></reference>
<reference anchor="Puj21" >
  <front>
    <title>NetXplain: Real-time explainability of Graph Neural Networks applied to Computer Networks</title>
    <author initials="D." surname="Pujol-Perich" fullname="David Pujol-Perich">
      <organization></organization>
    </author>
    <author initials="J." surname="Suárez-Varela" fullname="José Suárez-Varela">
      <organization></organization>
    </author>
    <author initials="S." surname="Xiao" fullname="Shihan Xiao">
      <organization></organization>
    </author>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization></organization>
    </author>
    <author initials="A." surname="Cabello" fullname="Albert Cabello">
      <organization></organization>
    </author>
    <author initials="P." surname="Barlet-Ros" fullname="Pere Barlet-Ros">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>MLSys workshop on Graph Neural Networks and Systems (GNNSys)</annotation></reference>
<reference anchor="Li19" >
  <front>
    <title>A Framework for Qualitative Communications Using Big Packet Protocol</title>
    <author initials="R." surname="Li" fullname="Richard Li">
      <organization></organization>
    </author>
    <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
      <organization></organization>
    </author>
    <author initials="H." surname="Yousefi" fullname="Hamed Yousefi">
      <organization></organization>
    </author>
    <author initials="C." surname="Westphal" fullname="Cedric Westphal">
      <organization></organization>
    </author>
    <author initials="L." surname="Dong" fullname="Lijun Dong">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck." fullname="Filip De Turck.">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>ACM SIGCOMM Workshop on Networking for Emerging Applications and Technologies (NEAT)</annotation></reference>
<reference anchor="Hir15" >
  <front>
    <title>Crowdsourced network measurements: Benefits and best practices</title>
    <author initials="M." surname="Hirth" fullname="Matthias Hirth">
      <organization></organization>
    </author>
    <author initials="T." surname="Hossfeld" fullname="Tobias Hossfeld">
      <organization></organization>
    </author>
    <author initials="M." surname="Mellia" fullname="Marco Mellia">
      <organization></organization>
    </author>
    <author initials="C." surname="Schwartz" fullname="Christian Schwartz">
      <organization></organization>
    </author>
    <author initials="F." surname="Lehrieder" fullname="Frank Lehrieder">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>Computer Networks. 90</annotation></reference>
<reference anchor="Bri19" >
  <front>
    <title>Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic</title>
    <author initials="P.-O." surname="Brissaud" fullname="Pierre-Olivier Brissaud">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
      <organization></organization>
    </author>
    <author initials="T." surname="Cholez" fullname="Thibault Cholez">
      <organization></organization>
    </author>
    <author initials="O." surname="Bettan" fullname="Olivier Bettan">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Transactions on Network and Service Management, 16 (3)</annotation></reference>
<reference anchor="Hoo18" >
  <front>
    <title>Updated Taxonomy for the Network and Service Management Research Field</title>
    <author initials="J. V. D." surname="Hooft" fullname="Jeroen Van Der Hooft">
      <organization></organization>
    </author>
    <author initials="M." surname="Claeys" fullname="Maxim Claeys">
      <organization></organization>
    </author>
    <author initials="N." surname="Bouten" fullname="Niels Bouten">
      <organization></organization>
    </author>
    <author initials="T." surname="Wauters" fullname="Tim Wauters">
      <organization></organization>
    </author>
    <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
      <organization></organization>
    </author>
    <author initials="A. P. B." surname="Stiller" fullname="Aiko Pras, Burkhard Stiller">
      <organization></organization>
    </author>
    <author initials="M." surname="Charalambides" fullname="Marinos Charalambides">
      <organization></organization>
    </author>
    <author initials="R." surname="Badonnel" fullname="Rémi Badonnel">
      <organization></organization>
    </author>
    <author initials="J." surname="Serrat" fullname="Joan Serrat">
      <organization></organization>
    </author>
    <author initials="C. R. P. D." surname="Santos" fullname="Carlos Raniery Paula Dos Santos">
      <organization></organization>
    </author>
    <author initials="F. D." surname="Turck" fullname="Filip De Turck">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Network System Managemen (JNSM) 26, 790–808</annotation></reference>
<reference anchor="Bou18" >
  <front>
    <title>A comprehensive survey on machine learning for networking: evolution, applications and research opportunities</title>
    <author initials="R." surname="Boutaba" fullname="Raouf Boutaba">
      <organization></organization>
    </author>
    <author initials="M. A." surname="Salahuddin" fullname="Mohammad A. Salahuddin">
      <organization></organization>
    </author>
    <author initials="N." surname="Limam" fullname="Noura Limam">
      <organization></organization>
    </author>
    <author initials="S." surname="Ayoubi" fullname="Sara Ayoubi">
      <organization></organization>
    </author>
    <author initials="N." surname="Shahriar" fullname="Nashid Shahriar">
      <organization></organization>
    </author>
    <author initials="F." surname="Estrada-Solano" fullname="Felipe Estrada-Solano">
      <organization></organization>
    </author>
    <author initials="O. M." surname="Caicedo" fullname="Oscar M. Caicedo">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>Journal of Internet Services and Applications 9, 16</annotation></reference>
<reference anchor="Kaf19" >
  <front>
    <title>Automation of 5G Network Slice Control Functions with Machine Learning</title>
    <author initials="V. P." surname="Kafle" fullname="V. P. Kafle">
      <organization></organization>
    </author>
    <author initials="P." surname="Martinez-Julia" fullname="P. Martinez-Julia">
      <organization></organization>
    </author>
    <author initials="T." surname="Miyazawa" fullname="T. Miyazawa">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IEEE Communications Standards Magazine, vol. 3, no. 3, pp. 54-62</annotation></reference>
<reference anchor="Yan20" >
  <front>
    <title>Artificial-Intelligence-Enabled Intelligent 6G Networks</title>
    <author initials="H." surname="Yang" fullname="H. Yang">
      <organization></organization>
    </author>
    <author initials="A." surname="Alphones" fullname="A. Alphones">
      <organization></organization>
    </author>
    <author initials="Z." surname="Xiong" fullname="Z. Xiong">
      <organization></organization>
    </author>
    <author initials="D." surname="Niyato" fullname="D. Niyato">
      <organization></organization>
    </author>
    <author initials="J." surname="Zhao" fullname="J. Zhao">
      <organization></organization>
    </author>
    <author initials="K." surname="Wu," fullname="K. Wu,">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE Network, vol. 34, no. 6, pp. 272-280</annotation></reference>
<reference anchor="Lop20" >
  <front>
    <title>Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches</title>
    <author initials="J." surname="López" fullname="J. López">
      <organization></organization>
    </author>
    <author initials="M." surname="Labonne" fullname="M. Labonne">
      <organization></organization>
    </author>
    <author initials="C." surname="Poletti" fullname="C. Poletti">
      <organization></organization>
    </author>
    <author initials="D." surname="Belabed" fullname="D. Belabed">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Symposium on Network Computing and Applications (NCA)</annotation></reference>
<reference anchor="Sen04" >
  <front>
    <title>Accurate, scalable in-network identification of p2p traffic using application signatures</title>
    <author initials="S." surname="Sen" fullname="Subhabrata Sen">
      <organization></organization>
    </author>
    <author initials="O." surname="Spatscheck" fullname="Oliver Spatscheck">
      <organization></organization>
    </author>
    <author initials="D." surname="Wang" fullname="Dongmei Wang">
      <organization></organization>
    </author>
    <date year="2004"/>
  </front>
<annotation>ACM International conference on World Wide Web (WWW)</annotation></reference>
<reference anchor="Rin17" >
  <front>
    <title>IP2Vec: Learning Similarities Between IP Addresses</title>
    <author initials="M." surname="Ring" fullname="M. Ring">
      <organization></organization>
    </author>
    <author initials="A." surname="Dallmann" fullname="A. Dallmann">
      <organization></organization>
    </author>
    <author initials="D." surname="Landes" fullname="D. Landes">
      <organization></organization>
    </author>
    <author initials="A." surname="Hotho" fullname="A. Hotho">
      <organization></organization>
    </author>
    <date year="2017"/>
  </front>
<annotation>IEEE International Conference on Data Mining Workshops (ICDMW)</annotation></reference>
<reference anchor="Evr19" >
  <front>
    <title>port2dist: Semantic Port Distances for Network Analytics</title>
    <author initials="L." surname="Evrard" fullname="Laurent Evrard">
      <organization></organization>
    </author>
    <author initials="J." surname="François" fullname="Jérôme François">
      <organization></organization>
    </author>
    <author initials="J.-N." surname="Colin" fullname="Jean-Noël Colin">
      <organization></organization>
    </author>
    <author initials="F." surname="Beck" fullname="Frédéric Beck">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
<annotation>IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</annotation></reference>
<reference anchor="Sol20" >
  <front>
    <title>A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks</title>
    <author initials="H. M." surname="Soliman" fullname="Hazem M. Soliman">
      <organization></organization>
    </author>
    <author initials="G." surname="Salmon" fullname="Geoff Salmon">
      <organization></organization>
    </author>
    <author initials="D." surname="Sovilij" fullname="Dusan Sovilij">
      <organization></organization>
    </author>
    <author initials="M." surname="Rao" fullname="Mohan Rao">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
<annotation>IEEE International Conference on Cloud Networking (CloudNet)</annotation></reference>
<reference anchor="Sco11" >
  <front>
    <title>On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses</title>
    <author initials="S. E." surname="Coull" fullname="Scott E. Coull">
      <organization></organization>
    </author>
    <author initials="F." surname="Monrose" fullname="Fabian Monrose">
      <organization></organization>
    </author>
    <author initials="M." surname="Bailey" fullname="Michael Bailey">
      <organization></organization>
    </author>
    <date year="2011"/>
  </front>
<annotation>NDSS</annotation></reference>
<reference anchor="Xie18" >
  <front>
    <title>A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges</title>
    <author initials="J." surname="Xie" fullname="Junfeng Xie">
      <organization></organization>
    </author>
    <author initials="F. R." surname="Yu" fullname="F. Richard Yu">
      <organization></organization>
    </author>
    <author initials="T." surname="Huang" fullname="Tao Huang">
      <organization></organization>
    </author>
    <author initials="R." surname="Xie" fullname="Renchao Xie">
      <organization></organization>
    </author>
    <author initials="J." surname="Liu" fullname="Jiang Liu">
      <organization></organization>
    </author>
    <author initials="C." surname="Wang" fullname="Chenmeng Wang">
      <organization></organization>
    </author>
    <author initials="Y." surname="Liu" fullname="Yunjie Liu">
      <organization></organization>
    </author>
    <date year="2018"/>
  </front>
<annotation>IEEE Communications Surveys &amp; Tutorials</annotation></reference>
<reference anchor="Yu14" >
  <front>
    <title>Distributed and collaborative traffic monitoring in software defined networks</title>
    <author initials="Y." surname="Yu" fullname="Ye Yu">
      <organization></organization>
    </author>
    <author initials="C." surname="Qian" fullname="Chen Qian">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Hot topics in software defined networking</annotation></reference>
<reference anchor="Dij19" >
  <front>
    <title>A Survey of Network Traffic Anonymisation Techniques and Implementations</title>
    <author initials="N. V." surname="Dijkhuizen" fullname="Niels Van Dijkhuizen">
      <organization></organization>
    </author>
    <author initials="J. V. D." surname="Ham" fullname="Jeroen Van Der Ham">
      <organization></organization>
    </author>
    <author initials="X." surname="Li" fullname="Xin Li">
      <organization></organization>
    </author>
    <date year="2014"/>
  </front>
<annotation>ACM Comput. Surv. 51, 3, Article 52</annotation></reference>
<reference anchor="Sch21" >
  <front>
    <title>Distributed Online Service Coordination Using Deep Reinforcement Learning</title>
    <author initials="S." surname="Schneider" fullname="Stefan Schneider">
      <organization></organization>
    </author>
    <author initials="H." surname="Qarawlus" fullname="Haydar Qarawlus">
      <organization></organization>
    </author>
    <author initials="H." surname="Karl" fullname="Holger Karl">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>IEEE International Conference on Distributed Computing Systems (ICDCS)</annotation></reference>
<reference anchor="Hui22" >
  <front>
    <title>Knowledge Enhanced GAN for IoT Traffic Generation</title>
    <author initials="S." surname="Hui" fullname="Shuodi Hui">
      <organization></organization>
    </author>
    <author initials="H." surname="Wang" fullname="Huandong Wang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Wang" fullname="Zhenhua Wang">
      <organization></organization>
    </author>
    <author initials="X." surname="Yang" fullname="Xinghao Yang">
      <organization></organization>
    </author>
    <author initials="Z." surname="Liu" fullname="Zhongjin Liu">
      <organization></organization>
    </author>
    <author initials="D." surname="Jin" fullname="Depeng Jin">
      <organization></organization>
    </author>
    <author initials="Y." surname="Li" fullname="Yong Li">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>ACM Web Conference 2022 (WWW)</annotation></reference>
<reference anchor="Sil16" >
  <front>
    <title>Mastering the game of Go with deep neural networks and tree search</title>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="A." surname="Huang" fullname="Aja Huang">
      <organization></organization>
    </author>
    <author initials="C. J." surname="Maddison" fullname="Christopher J. Maddison">
      <organization></organization>
    </author>
    <author initials="A." surname="Guez" fullname="Arthur Guez">
      <organization></organization>
    </author>
    <author initials="L." surname="Sifre" fullname="Laurent Sifre">
      <organization></organization>
    </author>
    <author initials="G. V. D." surname="Driessche" fullname="George Van Den Driessche">
      <organization></organization>
    </author>
    <author initials="J." surname="Schrittwieser" fullname="Julian Schrittwieser">
      <organization></organization>
    </author>
    <author initials="I." surname="Antonoglou" fullname="Ioannis Antonoglou">
      <organization></organization>
    </author>
    <author initials="V." surname="Panneershelvam" fullname="Veda Panneershelvam">
      <organization></organization>
    </author>
    <author initials="M." surname="Lanctot" fullname="Marc Lanctot">
      <organization></organization>
    </author>
    <author initials="S." surname="Dieleman" fullname="Sander Dieleman">
      <organization></organization>
    </author>
    <author initials="D." surname="Grewe" fullname="Dominik Grewe">
      <organization></organization>
    </author>
    <author initials="J." surname="Nham" fullname="John Nham">
      <organization></organization>
    </author>
    <author initials="D." surname="Silver" fullname="David Silver">
      <organization></organization>
    </author>
    <author initials="I." surname="Sutskever" fullname="Ilya Sutskever">
      <organization></organization>
    </author>
    <author initials="T." surname="Lillicrap" fullname="Timothy Lillicrap">
      <organization></organization>
    </author>
    <author initials="M." surname="Leach" fullname="Madeleine Leach">
      <organization></organization>
    </author>
    <author initials="K." surname="Kavukcuoglu" fullname="Koray Kavukcuoglu">
      <organization></organization>
    </author>
    <author initials="T." surname="Graepel" fullname="Thore Graepel">
      <organization></organization>
    </author>
    <author initials="D." surname="Hassabis" fullname="Demis Hassabis">
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
<annotation>Nature, vol. 529 (2016), pp. 484-503</annotation></reference>
<reference anchor="Nas21" >
  <front>
    <title>Defeating DNN-Based Traffic Analysis Systems inReal-Time With Blind Adversarial Perturbations</title>
    <author initials="M." surname="Nasr" fullname="M. Nasr">
      <organization></organization>
    </author>
    <author initials="A." surname="Bahramali" fullname="A. Bahramali">
      <organization></organization>
    </author>
    <author initials="A." surname="Houmansadr" fullname="A. Houmansadr">
      <organization></organization>
    </author>
    <date year="2021"/>
  </front>
<annotation>USENIX Security Symposium</annotation></reference>
<reference anchor="Jmi22" >
  <front>
    <title>Adversarial machine learning for network intrusion detection: A comparative study</title>
    <author initials="H." surname="Jmila" fullname="H. Jmila">
      <organization></organization>
    </author>
    <author initials="M. I." surname="Khedher" fullname="M. I. Khedher">
      <organization></organization>
    </author>
    <date year="2022"/>
  </front>
<annotation>Computer Networks</annotation></reference>
<reference anchor="Fre15" >
  <front>
    <title>Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures</title>
    <author initials="M." surname="Fredrikson" fullname="M. Fredrikson">
      <organization></organization>
    </author>
    <author initials="M. S." surname="Jha" fullname="M. S. Jha">
      <organization></organization>
    </author>
    <author initials="T." surname="Ristenpart" fullname="T. Ristenpart">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
<annotation>ACM SIGSAC Conference on Computer and Communications Security</annotation></reference>
<reference anchor="Bis23" >
  <front>
    <title>Hyperparameter optimization: Foundations, algorithms, best practices, and open challenges</title>
    <author initials="B." surname="Bischl" fullname="B. Bischl">
      <organization></organization>
    </author>
    <author initials="M." surname="Binder" fullname="M. Binder">
      <organization></organization>
    </author>
    <author initials="M." surname="Lang" fullname="M. Lang">
      <organization></organization>
    </author>
    <author initials="T." surname="Pielok" fullname="T. Pielok">
      <organization></organization>
    </author>
    <author initials="J." surname="Richter" fullname="J. Richter">
      <organization></organization>
    </author>
    <author initials="S." surname="Coors" fullname="S. Coors">
      <organization></organization>
    </author>
    <author initials="J." surname="Thomas" fullname="J. Thomas">
      <organization></organization>
    </author>
    <author initials="T." surname="Ullmann" fullname="T. Ullmann">
      <organization></organization>
    </author>
    <author initials="M." surname="Becker" fullname="M. Becker">
      <organization></organization>
    </author>
    <author initials="A.-L." surname="Boulesteix" fullname="A.-L. Boulesteix">
      <organization></organization>
    </author>
    <author initials="D." surname="Deng" fullname="D. Deng">
      <organization></organization>
    </author>
    <author initials="M." surname="Lindauer" fullname="M. Lindauer">
      <organization></organization>
    </author>
    <date year="2023"/>
  </front>
<annotation>Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 13(2)</annotation></reference>


    </references>


<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This document is the result of a collective work. Authors of this document are the main contributors and the editors but contributions have been also received from the following people we acknowledge: Laurent Ciavaglia, Felipe Alencar Lopes, Abdelkader Lahamdi, Albert Cabellos, José Suárez-Varela, Marinos Charalambides, Ramin Sadre, Pedro Martinez-Julia and Flavio Esposito</t>

<t>This document is also partially supported by project AI@EDGE, funded from the European Union's Horizon 2020 H2020-ICT-52 call for projects, under grant agreement no. 101015922.</t>

<t>The views expressed in this document do not necessarily reflect those of the Bank of Canada's Governing Council.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

