<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-yuan-rtgwg-security-agent-usecase-00"
     ipr="trust200902">
  <front>
    <title abbrev="Security Agent Usecase">Use cases of the AI Network
    Security Agent</title>

    <author fullname="Quan Yuan" initials="Q." surname="Yuan">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>yuanquan25@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Jianwei Mao" initials="J." surname="Mao">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>maojianwei@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Bing Liu" initials="B." surname="Liu">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>leo.liubing@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Nan Geng" initials="N." surname="Geng">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>gengnan@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Xiaotong Shang" initials="X." surname="Shang">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>shangxiaotong@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Qiangzhou Gao" initials="Q." surname="Gao">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>gaoqiangzhou@huawei.com</email>

        <uri/>
      </address>
    </author>

    <author fullname="Zhenbin" initials="Z." surname="Li">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street/>

          <city>Beijing</city>

          <region/>

          <code>100095</code>

          <country>China</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>robinli314@163.com</email>

        <uri/>
      </address>
    </author>

    <date day="1" month="November" year="2025"/>

    <abstract>
      <t>Core network devices like routers fulfill dual roles of data
      forwarding and security protection. However, escalating threats (e.g.,
      zero-day vulnerabilities, DDoS attacks) expose limitations of
      traditional security&mdash;relying on static ACLs, signature-based
      detection, and manual configuration&mdash;causing delayed responses,
      high false positives, and protection gaps. This paper proposes AI
      Network Security Agents: intelligent software components leveraging
      machine learning, behavioral analysis, and real-time data fusion, with
      three core capabilities (adaptive learning, automation, distributed
      collaboration) to shift security from passive to intelligent. Four key
      scenarios are outlined: dynamic defense against unknown threats via
      baselines and tracing; ACL optimization via intent parsing;
      configuration security via baseline checks and simulation; and
      collaborative defense via intelligence aggregation and linked responses.
      AI Agents turn routers into active security orchestrators, enhancing
      threat protection and operational efficiency.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>Routers and other core network devices serve as the foundational
      backbone of modern digital infrastructures, responsible for both data
      forwarding across network segments and the critical security functions
      of protecting traffic integrity, confidentiality, and availability.
      However, the escalating sophistication of cyber threats&mdash;ranging
      from stealthy zero-day exploits and large-scale DDoS assaults to
      persistent APT infiltrations&mdash;has exposed inherent limitations in
      traditional network security mechanisms. Dependent on static access
      control lists (ACLs), signature-based threat detection, and manual
      configuration workflows, legacy systems lack the agility to keep pace
      with dynamic threat landscapes, often leading to delayed threat
      responses, high false-positive rates, and unavoidable protection gaps.
      This document explores how integrating AI Agents into network devices
      addresses these limitations, transforming passive defense into an
      intelligent, adaptive security framework.</t>
    </section>

    <section title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
      "OPTIONAL" in this document are to be interpreted as described in RFC
      2119<xref target="RFC2119"> </xref>.</t>
    </section>

    <section title="Usage Scenarios of the AI Network Security Agent">
      <t>After integrating AI Agents into network devices, their core security
      capabilities are upgraded from passive defense to an intelligent,
      adaptive protection system. Below are the key usage scenarios,
      elaborated with technical details and practical use cases:</t>

      <section title="Dynamic Defense Against Zero-Day Vulnerabilities and Unknown Threats">
        <t>Traditional signature-based detection fails to address zero-day
        Vulnerabilities (e.g., new APT campaigns). AI Agents enable real-time
        threat identification and mitigation through behavioral analytics and
        adaptive learning:</t>

        <section title="Behavioral Pattern Recognition">
          <t>Embedded AI Agents in network devices can analyze system calls,
          network traffic features, and file operations to establish a "normal
          behavior baseline." For instance, if a device suddenly sends
          encrypted data to multiple unknown IPs (a sign of data
          exfiltration), the AI Agent triggers isolation within minutes to
          prevent lateral spread.</t>
        </section>

        <section title="Attack Chain Tracing">
          <t>Leveraging knowledge graphs, AI Agents can correlate multi-source
          logs (Syslog, traffic logs) to map attack paths. For example, during
          a supply chain attack, the agent can identify abnormal ARP requests
          and failed SSH logins in device logs, pinpoint the attack pivot, and
          block further infiltration.</t>
        </section>

        <section title="Zero-Day Vulnerability Prediction">
          <t>Trained on historical vulnerability data and code features, AI
          Agents can forecast potential attack surfaces. For example, they
          scan device configurations to flag weak passwords or unclosed
          high-risk ports, generating actionable risk reports.</t>
        </section>
      </section>

      <section title="Dynamic ACL Rule Optimization and Intelligent Policy Management">
        <t>Manual ACL configuration is error-prone and rigid. AI Agents
        automate policy creation and adjustment via intent-based parsing and
        reinforcement learning:</t>

        <section title="Policy Intent Translation">
          <t>Users describe security requirements in natural language (e.g.,
          "Block the Sales department from accessing finance servers"), and
          the AI Agent converts this into valid ACL rules.</t>
        </section>

        <section title="Traffic Behavior Learning">
          <t>AI Agents can continuously analyze network traffic to optimize
          ACL rules dynamically. For example, during peak video conference
          hours, the agent adjusts QoS policies to prioritize critical app
          bandwidth while identifying DDoS attacks disguised as video
          streams.</t>
        </section>

        <section title="Policy Conflict Detection">
          <t>Using knowledge graphs, AI Agents can real-time validate logical
          conflicts in ACL rules. If rules like "Allow all HTTP traffic" and
          "Block specific IPs" overlap, the agent flags the inconsistency and
          recommends priority adjustments.</t>
        </section>
      </section>

      <section title="Device Configuration Security">
        <t>Manual configuration audits are inefficient. AI Agents boost
        network security via automated compliance checks and intelligent
        repairs:</t>

        <section title="Configuration Baseline Verification">
          <t>AI Agents can use pre-defined security templates to scan device
          configurations, flagging risks like weak passwords or unencrypted
          management interfaces.</t>
        </section>

        <section title="Configuration Change Validation">
          <t>After a user submits a configuration change (e.g., modifying NAT
          policies), the AI Agent simulates post-deployment network behavior
          to verify functionality&mdash;ensuring internal devices can still
          access the public network&mdash;and generates a validation
          report.</t>
        </section>
      </section>

      <section title="Threat Intelligence Sharing and Global Collaborative Defense">
        <t>Traditional security deployments operate in silos, limiting
        effectiveness against cross-network threats. AI Agents enable
        cross-device/vendor protection via multi-source data fusion and
        automated response orchestration:</t>

        <section title="Intelligence Aggregation">
          <t>AI Agents integrate feeds from sources like CISA and VirusTotal
          to update threat signatures in real time. If a malicious IP is
          flagged as a phishing source by multiple feeds, the agent
          automatically adds blocking rules across all routers in the
          network.</t>
        </section>

        <section title="Linked Attack Response">
          <t>When one router detects an attack, the AI Agent notifies
          upstream/downstream devices for coordinated defense. For example, if
          a branch router detects an APT attack, the agent coordinates with
          the headquarters firewall to block the attack IP and alerts endpoint
          security tools for virus scans.</t>
        </section>

        <section title="Security Posture Prediction">
          <t>Using historical attack data and network topology, AI Agents
          forecast potential attack paths. If a network faces cross-VLAN
          infiltration risks, the agent pre-deploys access control policies on
          core routers to block lateral movement.</t>
        </section>
      </section>
    </section>

    <section title="Conclusion">
      <t>The integration of AI Agents into core network devices represents a
      pivotal advancement in network security, addressing the inherent
      inflexibility of traditional defense mechanisms. By enabling dynamic
      threat detection, intelligent policy management, automated configuration
      security, and collaborative defense, AI Agents transform routers from
      passive traffic handlers into proactive security orchestrators. These
      capabilities not only enhance protection against emerging threats like
      zero-day vulnerabilities but also streamline operational efficiency by
      reducing manual intervention. While challenges remain&mdash;such as
      optimizing AI model performance for resource-constrained devices and
      mitigating adversarial attacks&mdash;future developments in edge AI and
      self-healing algorithms will further strengthen this framework.
      Ultimately, AI-enhanced network security devices provide organizations
      with a resilient, scalable foundation to navigate the evolving cyber
      threat landscape, ensuring the reliability and security of critical
      digital infrastructures.</t>
    </section>

    <section title="Security Considerations">
      <t>TBD.</t>
    </section>

    <section title="IANA Considerations">
      <t>TBD.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include='reference.RFC.2119'?>
    </references>
  </back>
</rfc>
