<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tailhardat-nmop-incident-management-noria-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Knowledge Graphs &amp; Incident Management">Knowledge Graphs for Enhanced Cross-Operator Incident Management and Network Design</title>
    <seriesInfo name="Internet-Draft" value="draft-tailhardat-nmop-incident-management-noria-00"/>
    <author fullname="Lionel Tailhardat">
      <organization>Orange</organization>
      <address>
        <email>lionel.tailhardat@orange.com</email>
      </address>
    </author>
    <author fullname="Raphaël Troncy">
      <organization>EURECOM</organization>
      <address>
        <email>raphael.troncy@eurecom.fr</email>
      </address>
    </author>
    <author fullname="Yoan Chabot">
      <organization>Orange</organization>
      <address>
        <email>yoan.chabot@orange.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="19"/>
    <area>Operations and Management</area>
    <workgroup>Network Management Operations</workgroup>
    <keyword>knowledge graphs</keyword>
    <keyword>incident management</keyword>
    <keyword>anomaly detection</keyword>
    <abstract>
      <?line 183?>

<t>Operational efficiency in incident management on telecom and computer networks requires correlating and interpreting large volumes of heterogeneous technical information.
Knowledge graphs can provide a unified view of complex systems through shared vocabularies.
YANG data models enable describing network configurations and automating their deployment.
However, both approaches face challenges in vocabulary alignment and adoption, hindering knowledge capitalization and sharing on network designs and best practices.
To address this, the concept of a meta-knowledge graph is introduced to leverage existing network infrastructure descriptions in YANG format and enable abstract reasoning on network behaviors.
An experiment is proposed to assess the potential of the meta-knowledge graph in improving network quality and designs.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://genears.github.io/draft-tailhardat-nmop-incident-management-noria/draft-tailhardat-nmop-incident-management-noria.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tailhardat-nmop-incident-management-noria/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Management Operations Working Group mailing list (<eref target="mailto:nmop@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmop/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/nmop/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/genears/draft-tailhardat-nmop-incident-management-noria"/>.</t>
    </note>
  </front>
  <middle>
    <?line 193?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Incident management on telecom and computer networks, whether it is related to infrastructure or cybersecurity issues, requires the ability to simultaneously and quickly correlate and interpret a large number of heterogeneous technical information sources.
Knowledge Graphs (KGs), by structuring heterogeneous data through shared vocabularies, enable providing a unified view of complex technical systems, their ecosystem, and the activities and operations related to them (see <xref target="I-D.marcas-nmop-knowledge-graph-yang"/> and <xref target="NORIA-O-2024"/>).
Using such formal knowledge representation allows for a simplified interpretation of networks and their behavior, both for NetOps &amp; SecOps teams and artificial intelligence (AI) algorithms (e.g. anomaly detection, root cause analysis, diagnostic aid, situation summarization), and paves the way, in line with the Network Digital Twin vision <xref target="I-D.irtf-nmrg-network-digital-twin-arch"/>, for the development of tools for detecting and analyzing complex network incident situations through explainable, actionable, and shareable models (see <xref target="FOLIO-2018"/>, <xref target="SLKG-2023"/>, and <xref target="GPL-2024"/>).</t>
      <t>However, despite potential benefits of using knowledge graphs, these are not mainstream yet in commercial network deployment systems and decision support systems (see <xref target="NORIA-UI-2024"/> for more on the decision support systems perspective).
YANG is a widely used standard among operators for describing network configurations and automating their deployment.
Using YANG representations in the form of a KG, as suggested in <xref target="I-D.marcas-nmop-knowledge-graph-yang"/>, would minimize the effort required to adapt network management tools towards the unified vision and applications evoked above.
The lack of alignment between various YANG models on key concepts (e.g. for describing network topology) is, however, hindering this evolution <xref target="I-D.boucadair-nmop-rfc3535-20years-later"/>.</t>
      <t>Furthermore, although <xref target="I-D.netana-nmop-network-anomaly-lifecycle"/> addresses the capitalization of incident management knowledge through a YANG model, it can be observed that the overall scope of YANG models does not naturally cover the description of the networks' ecosystem (e.g. physical equipment location, operator organization, supervision systems) or the description of network operations from an IT service management (ITSM) perspective (e.g. business processes and design rules used by the company, scheduled modification operations, remediation actions performed during incident handling).
As a consequence, the continuous improvement of network quality &amp; designs requires additional data cross-referencing operations to properly contextualize incidents and learn from remediation actions taken (e.g. analyzing intervention technicians' verbatim, comparing actions performed on similar incidents but occurring on different networks).
As a result of these additional efforts of contextualization, the capitalization of knowledge typically remains confined at the level of each network operator.
This, in turn, hinders the sharing of information within the community of researchers and system designers regarding failure modes and best practices to adopt, considering the concept of overall improvement of IT systems and the Internet.</t>
      <t>Realizing an ITSM knowledge graph for network deployment, anomaly detection and risk management applications has been studied for several years in the Semantic Web community (i.e. knowledge representation and automated reasoning leveraging Web technologies such as <xref target="RDF"/>, <xref target="RDFS"/>, <xref target="OWL"/>, and <xref target="SKOS"/>).
Among other examples: the DevOpsInfra ontology <xref target="DevOpsInfra-2021"/> allows for describing sets of computing resources and how they are allocated for hosting services; the NORIA-O ontology <xref target="NORIA-UI-2024"/> allows for describing a network infrastructure &amp; ecosystem, its events, diagnosis and repair actions performed during incident management.
Assuming the continuous integration into a knowledge graph of data from ticketing systems, network monitoring solutions, and network configuration management databases, we remark that the resulting knowledge graph (<xref target="fig-incident-context"/>) implicitely holds the necessary information to (automatically) learn incident contexts (i.e. the network topology, its set of states and set of events prior to the incident) and remediation procedures (i.e. the set of actions and network configuration changes carried-out to resolve the incident).</t>
      <figure anchor="fig-incident-context">
        <name>Learning an incident signature seen as a classification model that is trained on the relationship of the incident context (i.e. a subgraph centered around a Resource entity concerned by a given TroubleTicket) to the problem class defined at the TroubleTicket entity level. Arrows are for object properties (owl:ObjectProperty), double line edges are for object class relationships (rdf:type).</name>
        <artwork type="ascii-art"><![CDATA[
┌───Incident context────────────────────────────┐
│                 ┌────────────┐                │
│                 │skos:Concept│                │
│                 └─┬┬─────────┘                │
│                  <server>                     │
│                    ▲                          │
│                    │                          │
│                 resourceType                  │
│         ┌────────┐ │                          │      ┌─────────────┐
│         │Resource│ │                          │      │TroubleTicket│
│         └──────┬┬┘ │                          │      └─────┬┬──────┘
│                ││  │                          │            ││
│        <ne_2>──<ne_1>◄──troubleTicketRelatedResource──<incident_01>
│           │      │                            │            │
│           │      │                            │      problemCategory
│<ne_5>──<ne_4>────┼──<ne_3>────<log_2>         │            │
│           │      │    │                       │            ▼
│           │      │    │                       │       <packet-loss>
│       <log_3>    │  <ne_6>                    │            ││
│                  │                            │       ┌────┴┴──────┐
│     logOriginatingManagedObject               │       │skos:Concept│
│                  │                            │       └────────────┘
│                  ▼                            │
│               <log_1>──────┐                  │
│      ┌─────────┴┴┐     dcterms:type           │
│      │EventRecord│         │                  │
│      └───────────┘         ▼                  │
│                    <integrityViolation>       │
│                       ┌────┴┴──────┐          │
│                       │skos:Concept│          │
│                       └────────────┘          │
└───────────────────────────────────────────────┘
]]></artwork>
      </figure>
      <t>By going a step further, we notice that a generic understanding of incident context can be extracted and shared among operators from knowledge graphs.
Indeed, a knowledge graph, being an instantiation of shared vocabularies (e.g. RDFS/OWL ontologies and controlled vocabularies in SKOS syntax), sharing incident signatures can be done without revealing infrastructure details (e.g. hostname, IP address), but rather the abstract representation of the network (i.e. the class of the knowlegde graph entities and relationships, such as "server" or "router", and or "IPoWDM link").</t>
      <t>The remainder of this document is organized as follows.
Firstly, the concept of a <em>meta-knowledge graph</em> is introduced to leverage existing network infrastructure descriptions in YANG format and enable abstract reasoning on network behaviors.
Secondly, an experiment is proposed to assess the potential of the meta-knowledge graph in improving network quality and designs.
In addition to the main parts of the proposal, the document also covers data integration and data federation architectures in the Security Considerations section. This section specifically addresses the handling of event data streams and the provision of a unified view for different stakeholders.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="a-meta-knowledge-graph-to-align-operator-specificities-and-share-behavioral-models-of-technical-architectures">
      <name>A meta-knowledge graph to align operator-specificities and share behavioral models of technical architectures</name>
      <t>TODO Introduce and develop the following topics.</t>
      <t>Topics:</t>
      <ul spacing="normal">
        <li>
          <t>Principles for implicit learning of incident characteristics and resolution methods through a graph and activity tracing.
          </t>
          <ul spacing="normal">
            <li>
              <t>Aligning operator-specificities with a multi-faceted knowledge graph.</t>
            </li>
            <li>
              <t>Learning and sharing behavioral models.</t>
            </li>
            <li>
              <t>Relation to the Network Anomaly Lifecycle experiment <xref target="I-D.netana-nmop-network-anomaly-lifecycle"/>.</t>
            </li>
            <li>
              <t>Relation to the Digital Map concept <xref target="I-D.havel-nmop-digital-map-concept"/>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Meta-KG construction
          </t>
          <ul spacing="normal">
            <li>
              <t>Integrating Service and Network topology data from YANG data models, such as Network Topologies <xref target="RFC8345"/> and Service Assurance <xref target="RFC9418"/>}.</t>
            </li>
            <li>
              <t>Relation to the NORIA-O ontology <xref target="NORIA-O-2024"/>.</t>
            </li>
            <li>
              <t>Trends towards some Yang to OWL / Yang to RDF data transformation tool.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Experiments towards the meta-KG proposal.</t>
        </li>
      </ul>
      <section anchor="aligning-operator-specificities-with-a-multi-faceted-knowledge-graph">
        <name>Aligning operator-specificities with a multi-faceted knowledge graph</name>
        <t>TODO Meta-KG construction</t>
        <t>TODO Relate the Meta-KG construction part to the following REQ-DM-SCALES related considerations.</t>
        <t>The following figures illustrate different scenarios for constructing a meta-KG through an Extract-Transform-Load (ETL) data integration pipeline.
From the perspective of the Digital Map Requirements (<xref target="sec-digital-map"/>), the <xref target="fig-stream-mixed"/>, <xref target="fig-stream-mixed-kr"/> and <xref target="fig-multi-store"/> particularly address the REQ-DM-SCALES requirement.</t>
        <figure anchor="fig-stream-kg-only">
          <name>KG-only data integration architecture for event data streams</name>
          <artwork type="ascii-art"><![CDATA[
          ┌──────┐  ┌─────────┐  ┌──────┐  ┌────────┐  ┌──────┐
┌──────┐  │      │  │ Stream  │  │      │  │ Stream │  │┌────┐│
│Events├─►│E.S.B.├─►│ mapping ├─►│S.S.B.├─►│ loader ├─►││K.G.││
└──────┘  │      │  │         │  │      │  │        │  │└────┘│
          └──────┘  └─────────┘  └──┬───┘  └────────┘  └──────┘
                                    │
                ┌───────────────────┴──────────────────────┐
                │(event/LOG_login_03)=>(object/RES/router1)│
                └─┌──────────────────────────────────────────┐
                  │(event/LOG_login_03)=>(object/RES/router1)│
                  └─┌──────────────────────────────────────────┐
                    │(event/LOG_login_03)=>(object/RES/router1)│
                    └──────────────────────────────────────────┘
]]></artwork>
        </figure>
        <figure anchor="fig-stream-kg-only-kr">
          <name>Resulting knowledge representation for the KG-only data integration architecture for event data streams</name>
          <artwork type="ascii-art"><![CDATA[
                         <object/RES_router3>
<object/RES_router2>          │
               │              │            ┌────────┐
             <object/RES_router1>─rdf:type─┤Resource│
                       │                   └────────┘
                       │
          logOriginatingManagedObject
                       │
             <event/LOG_login_01>             ┌───────────┐
               <event/LOG_login_02>──rdf:type─┤EventRecord│
                 <event/LOG_login_03>         └───────────┘
]]></artwork>
        </figure>
        <figure anchor="fig-stream-mixed">
          <name>Mixed KG/non-KG data integration architecture for event data streams</name>
          <artwork type="ascii-art"><![CDATA[
                  ┌────────────┐
                  │  Complex   │
                  │   Event    │
                  │ Processing │
                  └────┬──┬────┘
          ┌──────┐  ┌──┴──┴───┐  ┌──────┐  ┌────────┐  ┌──────┐
┌──────┐  │      │  │ Stream  │  │      │  │ Stream │  │┌────┐│
│Events├─►│E.S.B.├─►│ mapping ├─►│S.S.B.├─►│ loader ├─►││K.G.││
└──────┘  │      │  │         │  │      │  │        │  │└────┘│
          └──┬───┘  └─────────┘  └──┬───┘  └────────┘  └──────┘
             │                      │
             │  ┌───────────────────┴──────────────────────┐
             │  │(event/AIS_login_01)=>(object/RES/router1)│
             │  └──────────────────────────────────────────┘
             │                             ┌────────┐  ┌──────┐
             │                             │ Stream │  │┌────┐│
             └────────────────────────────►│ loader ├─►││TSDB││
                                           │        │  │└────┘│
                                           └────────┘  └──────┘
]]></artwork>
        </figure>
        <figure anchor="fig-stream-mixed-kr">
          <name>Resulting knowledge representation for the mixed KG/non-KG data integration architecture for event data streams</name>
          <artwork type="ascii-art"><![CDATA[
                                <object/RES_router3>
       <object/RES_router2>          │
                      │              │            ┌────────┐
                    <object/RES_router1>─rdf:type─┤Resource│
                              │                   └────────┘
                 logOriginatingManagedObject
                              │                    ┌───────────┐
┌──────────────────►<event/AIS_login_01>──rdf:type─┤EventRecord│
│                    │             │  \            └───────────┘
│                duration          │   \
│                    │             │ dcterms:type
│  "P0Y0M0DT0H3M30S"^^xsd:duration │     \
│                                  │   <Notification/
│                          loggingTime   EventType/inferredAlert>
│                                  │                   │
│        "2024-02-07T16:22:42Z"^^xsd:dateTime       rdf:type
│                                                ┌─────┴──────┐
│                                                │skos:Concept│
│  KG knowledge representation                   └────────────┘
│  ==============================================================
│  Time series database (TSDB) data representation
│
│  Timestamp             Origin                Event
│  2024-02-07T16:22:42Z  <object/RES_router1>  Login Attempt
│  2024-02-07T16:23:13Z  <object/RES_router1>  Login Attempt
│  2024-02-07T16:26:12Z  <object/RES_router1>  Login Attempt
│                                 ▲
└──shared─identifier──────────────┘
]]></artwork>
        </figure>
        <figure anchor="fig-multi-store">
          <name>Unified access to data distributed across various technological platforms</name>
          <artwork type="ascii-art"><![CDATA[
  ───On-premise────────────────────────────  ┌─┐  Scope-based querying
  ┌Dom.─A─┐                                  │ │
  │┌─────┐│  ┌──────┐           ┌─────────┐  │ │           ┌───────────┐
─►││ KG  ││◄─┤KGDBMS├───────────┤SPARQL EP├─►│ ├─Network &─┤  NetOps   │
  │└─────┘│  └──────┘           └─────────┘  │ ├─Usage─────┤Application│
  └UG.─2──┘                                  │ │           └───────────┘
  ┌Dom. B─┐                                  │ │           ┌───────────┐
  │┌─────┐│  ┌──────┐           ┌─────────┐  │ ├─Network &─┤  SecOps   │
─►││ KG  ││◄─┤KGDBMS├───────────┤SPARQL EP├─►│ ├─Security──┤Application│
  │└─────┘│  └──────┘           └─────────┘  │F│           └───────────┘
  └UG.─1┬─┘                                  │E│
        └────────────────────────────────────│D│─────────────┐
  ───On-premise / public-cloud─────────────  │E│             │
  ┌Dom.─C─┐                                  │R│             ▼  Usage
  │┌─────┐│  ┌──────┐ ┌───┐     ┌─────────┐  │A│           ┌────scope──┐
─►││ RDB ││◄─┤RDBMS ├─┤VKG├─────┤SPARQL EP├─►│T│           │*          │
  │└─────┘│  └──────┘ └───┘     └─────────┘  │E│   Network │   *  *    │
  └UG.─1&2┘                                  │D│   scope───│────────┐  │
  ┌Dom.─D─┐                                  │ │       │   │ *  *   │  │
  │┌─────┐│  ┌──────┐ ┌───┐     ┌─────────┐  │Q│       │  *└───────────┘
─►││NoSQL││◄─┤RDBMS ├─┤VKG├─────┤SPARQL EP├─►│U│       │  ┌───────────┐
  │└─────┘│  └──────┘ └───┘     └─────────┘  │E│       │* │ *  *    │ │
  └UG.─1──┘                                  │R│       └──│─────────┘ │
  ┌Dom.─E─┐                                  │I│        ▲ │     *     │
  │┌─────┐│  ┌──────┐ ┌───────┐ ┌─────────┐  │E│        │ │ *       * │
─►││ LPG ││◄─┤GDBMS ├─┤QL tlt.├─┤SPARQL EP├─►│S│        │ └──Security─┘
  │└─────┘│  └──────┘ └───────┘ └─────────┘  │ │        │    scope ▲
  └UG.┬2──┘                                  │ │        │          │
      └──────────────────────────────────────│ │────────┼──────────┘
                                             │ │        │
  ───Public-cloud──────────────────────────  │ │        │
  ┌Dom.─F─┐                                  │ │        │
  │┌─────┐│  ┌──────┐           ┌─────────┐  │ │        │
─►││ KG  ││◄─┤KGDBMS├───────────┤SPARQL EP├─►│ │        │
  │└─────┘│  └──────┘           └─────────┘  │ │        │
  └UG.┬1&2┘                                  └─┘        │
      └─────────────────────────────────────────────────┘
]]></artwork>
        </figure>
      </section>
      <section anchor="learning-and-sharing-behavioral-models">
        <name>Learning and sharing behavioral models</name>
        <t>TODO NetOps perspective</t>
        <t>TODO SecOps perspective</t>
      </section>
      <section anchor="sec-digital-map">
        <name>Relation to the Digital Map</name>
        <t>Similar to the concept of <em>meta-knowledge graph</em> (meta-KG) discussed here, the concept of <em>Digital Map</em> discussed in <xref target="I-D.havel-nmop-digital-map-concept"/> emphasizes the need to structure heterogeneous data describing networks in order to simplify network management operations through unified access to this data.
The meta-knowledge graph extends the Digital Map concept by adding information about the lifecycle of infrastructures and services, as well as the context of their usage. These additional pieces of information are considered essential for learning shareable activity models of systems.</t>
        <t>To clarify this positioning, the following lists reflect the compliance of the meta-KG concept with the Digital Map Requirements defined in <xref target="I-D.havel-nmop-digital-map-concept"/>.
A symbol to the right of each requirement name indicates the nature of compliance: <strong>+</strong> for compatibility, <strong>/</strong> for partial satisfaction, <strong>-</strong> for non-compliance with the requirement.
A comment is provided as necessary.</t>
        <section anchor="core-requirements">
          <name>Core Requirements</name>
          <dl>
            <dt><strong>+</strong> REQ-BASIC-MODEL-SUPPORT:</dt>
            <dd>
              <t>nothing to report (n.t.r.)</t>
            </dd>
            <dt><strong>+</strong> REQ-LAYERED-MODEL:</dt>
            <dd>
              <t>n.t.r.</t>
            </dd>
            <dt><strong>/</strong> REQ-PROG-OPEN-MODEL:</dt>
            <dd>
              <t>Partially satifying the requirement as the concept of meta-KG mainly relate to the knowledge representation topic rather than to the platform running the Digital Map service on top of the meta-knowledge graph.</t>
            </dd>
            <dt><strong>/</strong> REQ-STD-API-BASED:</dt>
            <dd>
              <t>Same remark as for REQ-PROG-OPEN-MODEL.</t>
            </dd>
            <dt><strong>+</strong> REQ-COMMON-APP:</dt>
            <dd>
              <t>n.t.r.</t>
            </dd>
            <dt><strong>+</strong> REQ-SEMANTIC:</dt>
            <dd>
              <t>n.t.r.</t>
            </dd>
            <dt><strong>+</strong> REQ-LAYER-NAVIGATE:</dt>
            <dd>
              <t>n.t.r.</t>
            </dd>
            <dt><strong>+</strong> REQ-EXTENSIBLE:</dt>
            <dd>
              <t>Knowledge graphs implicitly satisfy this requirement, notably with OWL <xref target="OWL"/> and SKOS <xref target="SKOS"/> constructs if considering RDF knowledge graphs for the meta-KG (e.g. <tt>owl:sameAs</tt> to relate a meta-KG entity to some other entity of another knowledge graph, <tt>owl:equivalentClass</tt> to link concepts and properties used to interpret the meta-KG to concepts and properties from other data models, <tt>skos:inScheme</tt> to group new items of a controled-vocabulary as part of a <tt>skos:ConceptScheme</tt>).</t>
            </dd>
            <dt><strong>+</strong> REQ-PLUGG:</dt>
            <dd>
              <t>Same remark as for REQ-EXTENSIBLE.</t>
            </dd>
            <dt><strong>+</strong> REQ-GRAPH-TRAVERSAL:</dt>
            <dd>
              <t>This capability is naturally enabled as the meta-KG concept involves using a graph data structure.</t>
            </dd>
          </dl>
          <section anchor="design-requirements">
            <name>Design Requirements</name>
            <dl>
              <dt><strong>-</strong> REQ-TOPO-ONLY:</dt>
              <dd>
                <t>Requirement not satisfied as the meta-KG involves to have more than topological data to interpret and contextualize the network behavior.</t>
              </dd>
              <dt><strong>-</strong> REQ-PROPERTIES:</dt>
              <dd>
                <t>Same remark as for REQ-TOPO-ONLY.</t>
              </dd>
              <dt><strong>-</strong> REQ-RELATIONSHIPS:</dt>
              <dd>
                <t>Same remark as for REQ-TOPO-ONLY.</t>
              </dd>
              <dt><strong>+</strong> REQ-CONDITIONAL:</dt>
              <dd>
                <t>Native, notably considering the expressiveness of SPARQL <xref target="SPARQL11-QL"/> if using the Semantic Web protocol stack to run the meta-KG concept.</t>
              </dd>
              <dt><strong>+</strong> REQ-TEMPO-HISTO:</dt>
              <dd>
                <t>n.t.r.</t>
              </dd>
            </dl>
          </section>
        </section>
        <section anchor="architectural-requirements">
          <name>Architectural Requirements</name>
          <dl>
            <dt><strong>+</strong> REQ-DM-SCALES:</dt>
            <dd>
              <t>This capability applies as we can use data aggregation at the graph level (<xref target="fig-stream-mixed"/> and <xref target="fig-stream-mixed-kr"/> compared to <xref target="fig-stream-kg-only"/> and <xref target="fig-stream-kg-only-kr"/>), aggregation without loss of information (<xref target="fig-stream-mixed"/> and <xref target="fig-stream-mixed-kr"/>), and load balancing (horizontal scaling) by partitioning the meta-KG (<xref target="fig-multi-store"/>). Further, ease of integration is enabled thanks to existing standard graph data access protocols (e.g. SPARQL Federated Queries <xref target="SPARQL11-FQ"/>, as illustrated in <xref target="fig-multi-store"/>).</t>
            </dd>
            <dt><strong>/</strong> REQ-DM-DISCOVERY:</dt>
            <dd>
              <t>Same remark as for REQ-PROG-OPEN-MODEL.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="experiments">
        <name>Experiments</name>
        <t>TODO Experiments</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>As this document covers the <em>meta-knowledge graph</em> concepts, and use cases, there is no specific security considerations.</t>
      <t>However, as the concept of a meta-knowledge graph involves the construction of a multi-faceted graph (i.e. including network topologies, operational data, and service and client data), it poses the risk of simplifying access to network operational data and functions that fall outside the knowledge graph users' responsibility or that could facilitate the intervention of malicious individuals.
To support the discussion on mitigating this risk, we suggest referring to <xref target="fig-multi-store"/>, which illustrates the concept of partial access to the meta-knowledge graph based on rights associated with each user group (UG) at the data domain level.
We also recommend referring to <xref target="AMO-2012"/> for an example of implemention of access rights in a content management system that relies on Semantic Web models and technologies.
This implementation uses the AMO ontology, which includes a set of classes and properties for annotating resources that require access control, as well as a base of inference rules that model the access management strategy to carry out.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.netana-nmop-network-anomaly-lifecycle">
          <front>
            <title>Experiment: Network Anomaly Lifecycle</title>
            <author fullname="Vincenzo Riccobene" initials="V." surname="Riccobene">
              <organization>Huawei</organization>
            </author>
            <author fullname="Antonio Roberto" initials="A." surname="Roberto">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Wanting Du" initials="W." surname="Du">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
              <organization>INSA-Lyon</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   Network Anomaly Detection is the act of detecting problems in the
   network.  Accurately detect problems is very challenging for network
   operators in production networks.  Good results require a lot of
   expertise and knowledge around both the implied network technologies
   and the specific service provided to consumers, apart from a proper
   monitoring infrastructure.  In order to facilitate network anomaly
   detection, novel techniques are being introduced, including
   programmatical, rule-based and AI-based, with the promise of
   improving scalability and the hope to keep a high detection accuracy.
   To guarantee acceptable results, the process needs to be properly
   designed, adopting well-defined stages to accurately collect evidence
   of anomalies, validate their relevancy and improve the detection
   systems over time, iteratively.

   This document describes the lifecycle process to iteratively improve
   network anomaly detection accurately.  Three key stages are proposed,
   along with a YANG model specifying the required metadata for the
   network anomaly detection covering the exchange of information
   between different stages of the lifecycle.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-netana-nmop-network-anomaly-lifecycle-03"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.havel-nmop-digital-map-concept">
          <front>
            <title>Digital Map: Concept, Requirements, and Use Cases</title>
            <author fullname="Olga Havel" initials="O." surname="Havel">
              <organization>Huawei</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="4" month="July" year="2024"/>
            <abstract>
              <t>   This document defines the concept of Digital Map, explains its
   connection to the Digital Twin, and identifies a set of Digital Map
   requirements and use cases.

   The document intends to be used as a reference for the assessment
   effort of the various topology modules to meet Digital Map
   requirements.

   Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/OlgaHuawei/draft-havel-nmop-digital-map-concept/.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-havel-nmop-digital-map-concept-00"/>
        </reference>
        <reference anchor="RFC8345">
          <front>
            <title>A YANG Data Model for Network Topologies</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
            <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
            <author fullname="X. Liu" initials="X." surname="Liu"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8345"/>
          <seriesInfo name="DOI" value="10.17487/RFC8345"/>
        </reference>
        <reference anchor="RFC9418">
          <front>
            <title>A YANG Data Model for Service Assurance</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="J. Quilbeuf" initials="J." surname="Quilbeuf"/>
            <author fullname="P. Lucente" initials="P." surname="Lucente"/>
            <author fullname="P. Fasano" initials="P." surname="Fasano"/>
            <author fullname="T. Arumugam" initials="T." surname="Arumugam"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>This document specifies YANG modules for representing assurance graphs. These graphs represent the assurance of a given service by decomposing it into atomic assurance elements called subservices. The companion document, "Service Assurance for Intent-Based Networking Architecture" (RFC 9417), presents an architecture for implementing the assurance of such services.</t>
              <t>The YANG data models in this document conform to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9418"/>
          <seriesInfo name="DOI" value="10.17487/RFC9418"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="OWL" target="https://www.w3.org/TR/owl2-overview/">
          <front>
            <title>OWL 2 Web Ontology Language Document Overview (Second Edition)</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2012" month="December"/>
          </front>
        </reference>
        <reference anchor="RDF" target="https://www.w3.org/TR/rdf11-concepts/">
          <front>
            <title>Resource Description Framework (RDF): Concepts and Abstract Syntax</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2014" month="February"/>
          </front>
        </reference>
        <reference anchor="RDFS" target="https://www.w3.org/TR/rdf-schema/">
          <front>
            <title>RDF Schema 1.1</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2014" month="February"/>
          </front>
        </reference>
        <reference anchor="SPARQL11-QL" target="https://www.w3.org/TR/sparql11-query/">
          <front>
            <title>SPARQL 1.1 Query Language</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2013" month="March"/>
          </front>
        </reference>
        <reference anchor="SPARQL11-FQ" target="https://www.w3.org/TR/sparql11-federated-query/">
          <front>
            <title>SPARQL 1.1 Federated Query</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2013" month="March"/>
          </front>
        </reference>
        <reference anchor="SKOS" target="https://www.w3.org/TR/skos-reference/">
          <front>
            <title>SKOS Simple Knowledge Organization System Reference</title>
            <author>
              <organization>W3C</organization>
            </author>
            <date year="2009" month="August"/>
          </front>
        </reference>
        <reference anchor="NORIA-O-2024" target="https://doi.org/10.1007/978-3-031-60635-9_2">
          <front>
            <title>NORIA-O: An Ontology for Anomaly Detection and Incident Management in ICT Systems</title>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="R." surname="Troncy" fullname="Raphaël Troncy">
              <organization/>
            </author>
            <author initials="Y." surname="Chabot" fullname="Yoan Chabot">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="SLKG-2023" target="https://doi.org/10.1145/3600160.3604991">
          <front>
            <title>Leveraging Knowledge Graphs For Classifying Incident Situations in ICT Systems</title>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="R." surname="Troncy" fullname="Raphaël Troncy">
              <organization/>
            </author>
            <author initials="Y." surname="Chabot" fullname="Yoan Chabot">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="GPL-2024" target="https://doi.org/10.1145/3589335.3651447">
          <front>
            <title>Graphameleon: Relational Learning and Anomaly Detection on Web Navigation Traces Captured as Knowledge Graphs</title>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="B." surname="Stach" fullname="Benjamin Stach">
              <organization/>
            </author>
            <author initials="Y." surname="Chabot" fullname="Yoan Chabot">
              <organization/>
            </author>
            <author initials="R." surname="Troncy" fullname="Raphaël Troncy">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NORIA-UI-2024" target="https://doi.org/10.1145/3664476.3670438">
          <front>
            <title>NORIA UI: Efficient Incident Management on Large-Scale ICT Systems Represented as Knowledge Graphs</title>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
              <organization/>
            </author>
            <author initials="Y." surname="Chabot" fullname="Yoan Chabot">
              <organization/>
            </author>
            <author initials="A." surname="Py" fullname="Antoine Py">
              <organization/>
            </author>
            <author initials="P." surname="Guillemette" fullname="Perrine Guillemette">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="FLAGSM-2021" target="https://doi.org/10.1016/j.future.2020.10.015">
          <front>
            <title>FLAGS: A Methodology for Adaptive Anomaly Detection and Root Cause Analysis on Sensor Data Streams by Fusing Expert Knowledge with Machine Learning</title>
            <author initials="B." surname="Steenwinckel" fullname="Bram Steenwinckel">
              <organization/>
            </author>
            <author initials="D. D." surname="Paepe" fullname="Dieter De Paepe">
              <organization/>
            </author>
            <author initials="S. V." surname="Hautte" fullname="Sander Vanden Hautte">
              <organization/>
            </author>
            <author initials="P." surname="Heyvaert" fullname="Pieter Heyvaert">
              <organization/>
            </author>
            <author initials="M." surname="Bentefrit" fullname="Mohamed Bentefrit">
              <organization/>
            </author>
            <author initials="P." surname="Moens" fullname="Pieter Moens">
              <organization/>
            </author>
            <author initials="A." surname="Dimou" fullname="Anastasia Dimou">
              <organization/>
            </author>
            <author initials="B. V. D." surname="Bossche" fullname="Bruno Van Den Bossche">
              <organization/>
            </author>
            <author initials="F. D." surname="Turck" fullname="Filip De Turck">
              <organization/>
            </author>
            <author initials="S. V." surname="Hoecke" fullname="Sofie Van Hoecke">
              <organization/>
            </author>
            <author initials="F." surname="Ongenae" fullname="Femke Ongenae">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="FOLIO-2018" target="https://www.ceur-ws.org/Vol-2213/paper2.pdf">
          <front>
            <title>Towards Adaptive Anomaly Detection and Root Cause Analysis by Automated Extraction of Knowledge from Risk Analyses</title>
            <author initials="B." surname="Steenwinckel" fullname="Bram Steenwinckel">
              <organization/>
            </author>
            <author initials="P." surname="Heyvaert" fullname="Pieter Heyvaert">
              <organization/>
            </author>
            <author initials="D. D." surname="Paepe" fullname="Dieter De Paepe">
              <organization/>
            </author>
            <author initials="O." surname="Janssens" fullname="Olivier Janssens">
              <organization/>
            </author>
            <author initials="S. V." surname="Hautte" fullname="Sander Vanden Hautte">
              <organization/>
            </author>
            <author initials="A." surname="Dimou" fullname="Anastasia Dimou">
              <organization/>
            </author>
            <author initials="F. D." surname="Turck" fullname="Filip De Turck">
              <organization/>
            </author>
            <author initials="S. V." surname="Hoecke" fullname="Sofie Van Hoecke">
              <organization/>
            </author>
            <author initials="F." surname="Ongenae" fullname="Femke Ongenae">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="DevOpsInfra-2021" target="https://doi.org/10.1007/978-3-030-88361-4_26">
          <front>
            <title>A High-Level Ontology Network for ICT Infrastructures</title>
            <author initials="O." surname="Corcho" fullname="Oscar Corcho">
              <organization/>
            </author>
            <author initials="D." surname="Chaves-Fraga" fullname="David Chaves-Fraga">
              <organization/>
            </author>
            <author initials="J." surname="Toledo" fullname="Jhon Toledo">
              <organization/>
            </author>
            <author initials="J." surname="Arenas-Guerrero" fullname="Juli{\'a}n Arenas-Guerrero">
              <organization/>
            </author>
            <author initials="C." surname="Badenes-Olmedo" fullname="Carlos Badenes-Olmedo">
              <organization/>
            </author>
            <author initials="M." surname="Wang" fullname="Mingxue Wang">
              <organization/>
            </author>
            <author initials="H." surname="Peng" fullname="Hu Peng">
              <organization/>
            </author>
            <author initials="N." surname="Burrett" fullname="Nicholas Burrett">
              <organization/>
            </author>
            <author initials="J." surname="Mora" fullname="Jos{\'e} Mora">
              <organization/>
            </author>
            <author initials="P." surname="Zhang" fullname="Puchao Zhang">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="AMO-2012" target="https://doi.org/10.1007/978-3-642-25838-1_3">
          <front>
            <title>Ontology-Based Access Rights Management</title>
            <author initials="M." surname="Buffa" fullname="Michel Buffa">
              <organization/>
            </author>
            <author initials="C." surname="Faron-Zucker" fullname="Catherine Faron-Zucker">
              <organization/>
            </author>
            <date year="2012"/>
          </front>
        </reference>
        <reference anchor="I-D.marcas-nmop-knowledge-graph-yang">
          <front>
            <title>Knowledge Graphs for YANG-based Network Management</title>
            <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Lucía Cabanillas Rodríguez" initials="L. C." surname="Rodríguez">
              <organization>Telefonica</organization>
            </author>
            <date day="5" month="July" year="2024"/>
            <abstract>
              <t>   The success of the YANG language and YANG-based protocols for
   managing the network has unlocked new opportunities in network
   analytics.  However, the wide heterogeneity of YANG models hinders
   the consumption and analysis of network data.  Besides, data encoding
   formats and transport protocols will differ depending on the network
   management protocol supported by the network device.  These
   challenges call for new data management paradigms that facilitate the
   discovery, understanding, integration and access to silos of
   heterogenous YANG data, abstracting from the complexities of the
   network devices.

   This document introduces the knowledge graph paradigm as a solution
   to this data management problem, with focus on YANG-based network
   management.  The document provides background on related topics such
   as ontologies and graph standards, and shares guidelines for
   implementing knowledge graphs from YANG data.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-marcas-nmop-knowledge-graph-yang-03"/>
        </reference>
        <reference anchor="I-D.irtf-nmrg-network-digital-twin-arch">
          <front>
            <title>Network Digital Twin: Concepts and Reference Architecture</title>
            <author fullname="Cheng Zhou" initials="C." surname="Zhou">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Hongwei Yang" initials="H." surname="Yang">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Xiaodong Duan" initials="X." surname="Duan">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
         </author>
            <author fullname="Antonio Pastor" initials="A." surname="Pastor">
         </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
              <organization>Orange</organization>
            </author>
            <date day="7" month="July" year="2024"/>
            <abstract>
              <t>   Digital Twin technology has been seen as a rapid adoption technology
   in Industry 4.0.  The application of Digital Twin technology in the
   networking field is meant to develop various rich network
   applications, realize efficient and cost-effective data-driven
   network management, and accelerate network innovation.

   This document presents an overview of the concepts of Digital Twin
   Network, provides the basic definitions and a reference architecture,
   lists a set of application scenarios, and discusses such technology's
   benefits and key challenges.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-nmrg-network-digital-twin-arch-06"/>
        </reference>
        <reference anchor="I-D.boucadair-nmop-rfc3535-20years-later">
          <front>
            <title>RFC 3535, 20 Years Later: An Update of Operators Requirements on Network Management Protocols and Modelling</title>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Reshad Rahman" initials="R." surname="Rahman">
              <organization>Equinix</organization>
            </author>
            <date day="22" month="July" year="2024"/>
            <abstract>
              <t>   The IAB has organized an important workshop to establish a dialog
   between network operators and protocol developers, and to guide the
   IETF focus on work regarding network management.  The outcome of that
   workshop was documented in the "IAB Network Management Workshop" (RFC
   3535) which was instrumental for developing NETCONF and YANG, in
   particular.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-boucadair-nmop-rfc3535-20years-later-04"/>
        </reference>
      </references>
    </references>
    <?line 529?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Benoit Claise for spontaneously seeking to include the work of the NORIA research project in the vision of the NMOP working group through direct contact.</t>
      <t>We would also like to thank Fano Rampary for his initial analysis of the possibilities of defining a model conversion algebra for going from Yang data models to OWL ontologies.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
