<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 2.5.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-francois-nmrg-ai-challenges-00" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="Coupling AI and network management">Research Challenges in Coupling Artificial Intelligence and Network Management</title>
    <seriesInfo name="Internet-Draft" value="draft-francois-nmrg-ai-challenges-00"/>
    <author fullname="Jérôme François">
      <organization>Inria</organization>
      <address>
        <postal>
          <street>615 rue du jardin botanique</street>
          <city>Villers-lès-transparency</city>
          <country>France</country>
        </postal>
        <email>jerome.francois@inria.fr</email>
      </address>
    </author>
    <author fullname="Alexander Clemm">
      <organization>Futurewei Technologies, Inc.</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>alex@clemm.org</email>
      </address>
    </author>
    <author fullname="Dimitri Papadimitriou">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>Greece</country>
        </postal>
        <email>papadimitriou.dimitri.be@gmail.com</email>
      </address>
    </author>
    <author fullname="Stenio Fernandes">
      <organization>Central Bank of Canada</organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <email>steniofernandes@gmail.com</email>
      </address>
    </author>
    <author fullname="Stefan Schneider">
      <organization>Digital Railway (DSD) at Deutsche Bahn</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>stefanschneider93@googlemail.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="11"/>
    <workgroup>Internet Research Task Force</workgroup>
    <keyword>network management</keyword>
    <keyword>artificial intelligence</keyword>
    <keyword>machine learning</keyword>
    <abstract>
      <t>This document is intended to introduce the challenges to overcome when network management problems may require to be couple with AI solutions. On one hand, there are many difficult problems in Network Management that to this date have no good solutions, or where any solutions come with significant limitations and constraints.   Artificial Intelligence may help produce novel solutions to those problems.  On the other hand, for several reasons (computational costs of AI solutions, privacy of data), distribution of AI tasks became primordial. It is thus also expected that network <bcp14>SHOULD</bcp14> be operated efficiently to support those tasks.</t>
      <t>To identify the right set of challenges, the document defines a method based on the evolution and nature of NM problems. This will be done in parallel with advances and the nature of existing solutions in AI in order to highlight where AI and NM have been already coupled together or could benefit from a higher integration. So, the method aims at evaluating the gap between NM problems and AI solutions. Challenges are derived accordingly, assuming solving these challenges will help to reduce the gap between NM and AI.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>The functional scope of network management (NM) is very large, ranging from monitoring to accounting, from network provisioning to service diagnostics, from usage accounting to security.   The taxonomy defined in <xref target="Hoo18"/> extends the traditional Fault, Configuration, Accounting, Performance, Security (FCAPS) domains by considering additional functional areas but above all by promoting additional views. For instance, network management approaches can be classified according to the technologies, methods or paradigms they will rely on. Methods include common approaches as for example mathematical optimization or queuing theory but also techniques which have been widely applied in last decades like game theory, data analysis, data mining and machine learning. In management paradigms, autonomic and cognitive management are listed. As highlighted by this taxonomy, the definition of automated and more intelligent techniques have been promoted to support efficient network management operations. Research in NM and more generally in networking has been very active in the area of applied ML <xref target="Bou18"/>.</t>
      <t>However, for maintaining network operational in pre-defined safety bounds, NM still heavily relies on established procedures. Even after several cycles of adding automation, those procedures are still mostly fixed in the sense that the exact control loop is and all possibilities are defined in advance. They are so mostly deterministic by nature or or at least with maximal error bounds .Obviously, there have been a lot of propositions to make network smarter or intelligent with the use of ML but without large adoption for running real networks because it changes the paradigms towards stochastic methods.</t>
      <t>ML is a sub-area of AI that concentrates the focus nowadays but AI encompasses other areas including knowledge representation, inference rule engine, statistical methods or by extension the techniques that allow to observe and perform actions on a system.</t>
      <t>It is thus legitimate to question if ML or AI in general could be helpful for NM in regards to practical deployment. This question is actually tight with the problems the NM aims to address. Independently of NM, ML solutions were introduced to solve one type of problems in an approximate way  which are very complex in nature, i.e. finding an optimal solution is not possible (in polynomial time). This is the case for NP-hard problems. In those cases, solutions typically rely on heuristics that may not yield optimal results, or algorithms that run into issues with scalability and the ability to produce timely results due to the exponential search space. In NM, those problems exist, for instance allocation of resources in case of service function chaining or network slicing  among others are recent examples which have gained interest in our community with SDN. Many propositions consist of defining the problem as an MILP with some heuristics to reach a satisfactory tradeoff between solution quality - computation time and model size/dimensionality. Hence, ML is recognized to be well adapted to progress on this type of problem <xref target="Kaf19"/>.</t>
      <t>However, all problems of NM are not NP-hard. Due to real-time constraints, some involve very short control loops that require both rapid decisions and the ability to rapidly adapt to new situations and different contexts. So, even in that case, time is critical and approximate solutions are usually more acceptable.  Again, it is where AI can be beneficial. Actually expert systems are AI systems <xref target="Ste92"/> but this kind of systems are not designed to scale with the volume and heterogeneity of data we can collect in a network today for which the expert system is built thanks to numerous inference rules. In contrast, ML is more efficient to automatically learn abstract representations of the rules, which can be eventually updated.</t>
      <t>On one hand Another type of common problem in NM is classification. For instance, classifying network flows is helpful for security purposes to detect attack flows, to differentiate QoS among the different flows (e.g. real-time streams which need to be prioritized), etc. On the other hand, ML-based classification algorithms have been widely used in literature with high quality results when properly applied leading to their applications in commercial products. There are many algorithms including decision tress, support vector machine ir (deep) neural networks which have been to be proven efficient in many areas and notably for image and natural language processing.</t>
      <t>Finally, many problems also still rely on humans in the loop, from support issues such as dealing with trouble tickets to planning activities for the roll-out of new services. This creates operational bottlenecks and is often expensive and error prone. This kind of tasks could be either automated or guided by an AI system to avoid human bias. Indeed, the balance between human resources and the complexity of problems to deal with is actually very imbalanced and this will continue to increase due to the size of networks, heterogeneity of devices, services, etc. Hence, human-based procedures tend to be simple in comparison to the problem to solve or time-consuming. Notable examples are in security where the network operator should defend against potential unknown threat. As a result, services might be largely affected during hours</t>
      <t>Actually, all the problems aforementioned are exacerbated by the situation of more complex networks to operate on many dimensions (users, devices, services, connections, etc.). Therefore, AI is expected to enable or simplify the solving of those problems in real networks in the near future <xref target="czb20"/> <xref target="Yan20"/> because those would require reaching unprecedented levels of performance in terms of throughput, latency, mobility, security, etc.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="acronyms">
      <name>Acronyms</name>
      <t>AI: Artificial Intelligence
GAN: Generative Adversarial Network
GNN: Graph Neural Network
LSTM: Long Short-Term Memory
ML: Machine Learning
MLP: Multilayer Perceptron
NM: Network Management</t>
    </section>
    <section anchor="pbNM">
      <name>Difficult problems in network management</name>
      <t>As mentioned in introduction, problems to be tackled in NM tend to be complex and exhibit characteristics that make them candidates for solutions that involve AI techniques:</t>
      <ul spacing="normal">
        <li>C1: A very large solution space, combinatorially exploding with the size of the problem domain. This makes it impractical to explore and test every solution (again NP-hard problems here)</li>
        <li>C2: Uncertainty and unpredictability along multiple dimensions, including the context in which the solution is applied, behavior of users and traffic, lack of visibility into network state, and more.  In addition, many networks do not exist in isolation but are subjected to myriads of interdependencies, some outside their control.  Accordingly, there are many external parameters that affect the efficiency of the solution to a problem and that cannot be known in advance: user activity, interconnected networks, etc.</li>
        <li>C3: The need to provide answers (i.e. compute solutions, deliver verdicts, make decisions)  in constrained or deterministic time. In many cases, context changes dynamically and decisions need to be made quickly to be of use.</li>
        <li>C4: Data-dependent solutions. To solve a problem accurately, it can be necessary to rely on large volumes of data, having to deal with issues that range from data heterogeneity to incomplete data to general challenges of dealing with high data velocity.</li>
        <li>C5: Need to be integrated with existing automatic and human processes.</li>
        <li>C6: Solutions <bcp14>MUST</bcp14> be cost-effective as resources (bandwidth, CPU, human, etc.) can be limited, notably when part of processing is distributed at the network edge or within the network.</li>
      </ul>
      <t>Many problems are affected by multiple criteria. Below is a non-exhaustive list of complex NM problems for which AI and/or non-AI-based approaches have been proposed:</t>
      <ul spacing="normal">
        <li>Computation of optimal paths: packet forwarding is not always based on traditional routing protocols with least cost routing, but on computation of paths that are optimized for certain criteria - for example, to meet certain level objectives, to result in greater resilience, to balance utilization, to optimize energy usage, etc.  Many of those solutions can be found in SDN, where a controller or path computation element computes paths that are subsequently provisioned across the network.  However, such solutions generally do not scale to millions of paths (C1), and cannot be recomputed in sub-second time scales (C3) to take into account dynamically changing network conditions (C2). To compute those paths,  operations research techniques have been extensively used in literature along with AI methods as shown in <xref target="Lop20"/>. As such, this problem can be considered as close to big data problems with some of the different Vs: volume, velocity, variety, value...</li>
        <li>Classification of network traffic: without loss of generality a common objective of network monitoring for operators is to know the type of traffic going through their networks (web, streaming, gaming, VoIP). By nature, this task analyzes data (C4) which can vary over time (C2) except in very particular scenarios like industrial isolated networks. However, the output of the classification technique is time-constrained only in specific cases where fast decisions <bcp14>MUST</bcp14> be made, for example to reroute traffic. Simple identification based on IANA-assigned TCP/UDP ports numbers were sufficient in the past. However, with applications using dynamic port numbers, signature techniques can be used to match packet payload <xref target="Sen04"/>. To handle applications now encapsulated in encrypted web or VPN traffic, machine-learning has been leveraged <xref target="Bri19"/>.</li>
        <li>Network diagnostics: disruptions of networking services can have many causes. Identifying the root cause can be of high importance when what is causing the disruption is not properly understood, so that repair actions can address the root cause versus just working around the symptoms.  Further complicating the matter are scenarios in which disruptions are not "hard" but involve only a degradation of service level, and where disruptions are intermittent, not reproducible, and hard to predict.  Artificial intelligence techniques can offer promising solutions.</li>
        <li>Intent-Based Networking (IBN): Roughly speaking, IBN refers to the ability to manage  networks by articulating desired outcomes without the need to specify a course of actions to achieve those outcomes.  The ability to determine such courses of actions, in particular in scenarios with multiple interdependencies, conflicting goals, large scale, and highly complex and dynamic environments is a huge and largely unsolved challenge.  Artificial Intelligence techniques can be of help here in multiple ways, from accurately classifying dynamic context to determine matching actions to reframing the expression of intent as a game that can be played (and won) using artificially intelligent techniques.</li>
        <li>VNF placement and SFC design: Virtual Network Functions need to be placed on physical resources and Service Function Chains designed in an optimized manner to avoid use of networking resources and minimize energy usage.</li>
        <li>Smart admission control to avoid congestion and oversubscription of network resources: Admission control needs to be set up and performed in ways that ensure service levels are optimized in a manner that is fair and aligned with application needs, congestion avoided or its effects mitigated.</li>
      </ul>
    </section>
    <section anchor="hlchallenges">
      <name>High-level challenges in adopting AI in NM</name>
      <t>As shown in the previous section, AI techniques are good candidates for the difficult NM problems. There have been many propositions but still most of them remain at the level of prototypes or have been only evaluated with simulation and/or emulation. It is thus questionable why our community investigates much research in this direction but has not adopted those solutions to operate real networks. There are different obstacles.</t>
      <t>First, AI advances have been historically driven by the image/video, natural language and signal processing communities as well as robotics for many decades. As a result, the most impressive applications are in this area including recently the generalization of home assistants or the large progress in autonomous vehicles. However, the network experts have been focused on building the Internet, especially building protocols to make the world interconnected and with always better performance and services. This trend continues today with the 5G in deployment and 6G under definition. Hence, AI was not our primary focus. However, AI is now considered as a core enabler for the future 6G networks which are sometimes qualified as AI-native networks.</t>
      <t>While we can see major contributions in AI-based solutions for networking over more than two decades, only a fraction of the community was concerned by AI at that time. Progress as a whole, from a community perspective, was so limited and compensated by relying on the development of AI in the communities as mentioned earlier. Even if our problems share some commonalities, for example on the volume of data to analyze, there are many differences: data types are completely different, networks are by nature heavily distributed, etc. If problems are different, they <bcp14>SHOULD</bcp14> require distinct solutions. In a nutshell, network-tailored AI was overlooked.</t>
      <t>Second, many AI techniques require enough representative data to be applied independently if the algorithms are supervised or unsupervised. NM has produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI techniques and lead so to a mismatch. For example, (deep) learning techniques mostly rely on having vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc)  but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>.</t>
      <t>An additional challenge concerns the fact that AI techniques that involve analysis of networking data can also lead to the extraction of sensitive and personally-identifiable information, raising potential privacy concerns and concerns regarding the potential for abuse. For example, AI techniques used to analyze encrypted network traffic with the legitimate goal to protect the network from intrusions and illegitimate attack traffic could be used to infer information about network usage and interactions of network users.  Intelligent data analysis and the need to maintain privacy are in many ways that are contradictory in nature, resulting in an arms race.  Similarly, training ML solutions on real network data is in many cases preferable over using less-realisitic synthetic data sets.However, network data may contain private or sensitive data, the sharing of which may be problematic from a privacy standpoint and even result in legal exposure. The challenge concerns thus how to allow AI techniques to perform legitimate network management functions and provide network owners with operational insights into what is going on in their networks, while prohibiting their potential for abuse for other (illegitimate) purposes.</t>
      <t>Finally, networks are already operated thanks to (semi-)automated procedures involving a large number of resources which are synchronized with management or orchestration tools. Adding AI supposes it would be seamlessly integrated within pre-existing processes. Although the goal of these procedures might be solely to provide relevant information to operators through alerts or dashboards in case of monitoring applications, many other applications rely on those procedures to trigger actions on the different resources, which can be local or remote. The use of AI or any other approaches to derive NM actions adds further constraint on them, especially regarding time constraints and synchronization to maintain a coherence over a distributed system.</t>
      <t>A related challenge concerns the fact that to be deployed, a solution needs to not only provide a technical solution but to also be acceptable to users - in this case, network administrators and operators.  One challenge with automated solutions concerns that users want to feel "in control" and able to understand what is going on, even more so if ultimately those users are the ones who are held accountable for whether or not the network is running smoothly.  Those same concerns extend to artificially intelligent systems for obvious reasons. To mitigate those concerns, aspects such as the ability to explain actions that are taken - or about to be taken - by AI systems become important.</t>
      <t>Beyond reasons of making users more comfortable, there are potentially also legal or regulatory ramifications to ensure that actions taken are properly understood.  For example,agencies such as the FCC may impose fines on network operators when services such as E911 experience outages, as there is a public interest in ensuring highest availability for such services.  In investigating causes for such outages, the underlying behavior of systems has to be properly understood, and even more so the reasons for actions that fall under the realm of network operations.</t>
    </section>
    <section anchor="AItechniques">
      <name>AI techniques for network management</name>
      <section anchor="problem-type-and-mapping">
        <name> Problem type and mapping</name>
        <t>In the last few years, an increasing number of different AI techniques have been proposed and applied successfully to a growing variety of different problems in different domains, including network management <xref target="Mus18"/>, <xref target="Xie18"/>. Some of the more recently proposed AI approaches are clearly advancements of older approaches, which they supersede. Many other AI approaches are not predecessors or successors but simply complementary because they are useful for different problems or optimize different metrics. In fact, different AI approaches are useful for different kinds of problem inputs (e.g., tabular data vs. text vs. images vs. time series) and also for different kinds of desired outputs (e.g., a predicted value, a classification, or an action). Similarly, there may be trade-offs between multiple approaches that take the same kind of inputs and desired outputs (e.g., in terms of desired objective, computation complexity, constraints).</t>
        <t>Overall, it is a key challenge of using AI for network management to properly understand and map which kind of problems with which inputs, outputs, and objectives are best solved with which kind of AI (or non-AI) approaches. Given the wealth of existing and newly released AI approaches, this is far from a trivial task.</t>
        <section anchor="sub-challenge-suitable-approach-for-given-input">
          <name>Sub-challenge: Suitable Approach for Given Input</name>
          <t>Different problems in network management come with widely different problem parameters. For example, security-related problems may have large amounts of text or encrypted data as input, whereas forecasting problems have historical time series data as input. They also vary in the amount of available data.</t>
          <t>Both the type and amount of data influences which AI techniques could be useful. On one hand, in scenarios with little data, classical machine learning techniques (e.g., SVM, tree-based approaches, etc.) are often sufficient and even superior to neural networks. On the other hand, neural networks have the advantage of learning complex models from large amounts of data without requiring feature engineering. Here, different neural network architectures are useful for different kinds of problems. The traditional and simplest architecture are (fully connected) multi-layer perceptrons (MLPs), which are useful for structured, tabular data. For images, videos, or other high-dimensional data with correlation between "close" features, convolutional neural networks (CNNs) are useful. Recurrent neural networks (RNNs), especially LSTMs, and attention-based neural networks (transformers) are great for sequential data like time series or text. Finally, Graph Neural Networks (GNNs) can incorporate and consider the graph-structured input, which is very useful in network management, e.g., to represent the network topology.</t>
          <t>The aforementioned rough guidelines can help identify a suitable AI approach and neural network architecture. Still, best results are often only achieved with sophisticated combinations of different approaches. For example, multiple elements can be combined into one architecture, e.g., with both CNNs and LSTMs, and multiple separate AI approaches can be used as an ensemble to combine their strengths. Here, simplifying the mapping from problem type and input to suitable AI approaches and architectures is clearly an open challenge. Future work <bcp14>SHOULD</bcp14> address this challenge by providing both clearer guidelines and striving for more general AI approaches that can easily be applied to a large variety of different problem inputs.</t>
        </section>
        <section anchor="sub-challenge-suitable-approach-for-desired-output">
          <name>Sub-challenge: Suitable Approach for Desired Output</name>
          <t>Similar to the challenge of identifying suitable AI approaches for a given problem input, the desired output for a given problem also affects which AI approach <bcp14>SHOULD</bcp14> be chosen. Here, the format of the desired output (single value, class, action, etc.), the frequency of these outputs and their meaning <bcp14>SHOULD</bcp14> be considered.</t>
          <t>Again, there are rough guidelines for identifying a group of suitable AI approaches. For example, if a single value is required (e.g., the amount of resources to allocate to a service instance), then typical supervised regression approaches <bcp14>SHOULD</bcp14> be used. If classification (e.g., of malware or another security issue <xref target="Abd10"/>) instead of a value is desired, supervised classification methods <bcp14>SHOULD</bcp14> be used. Alternatively, unsupervised machine learning can help to cluster given data into separate groups, which can be useful to analyze networking data, e.g., for better understanding different types of traffic or user segments.</t>
          <t>In addition to these classical supervised and unsupervised methods, reinforcement learning approaches allow active, sequential decisions rather than simple predictions or classifications. This is often useful in network management, e.g., to actively control service scaling and placement as well as flow scheduling and routing. Reinforcement learning agents autonomously select suitable actions in a given environment and are especially useful for self-learning network management. In addition to model-free reinforcement learning, model-based planning approaches (e.g., Monte Carlo Tree Search (MCTS)) also allow choosing suitable actions in a given environment but require full knowledge of the environment dynamics. In contrast, model-free reinforcement learning is ideal for scenarios with unknown environment dynamics, which is often the case in network management.</t>
          <t>Similar to the previous sub-challenge, these are just rough guidelines that can help to select a suitable group of AI approaches. Identifying the most suitable approach within the group, e.g., the best out of the many existing reinforcement learning approaches, is still challenging. And, as before, different approaches could be combined to enable even more effective network management (e.g., heuristics + RL, LSTMs + RL, ...). Here, further research <bcp14>MAY</bcp14> simplify the mapping from desired problem output to choosing or designing a suitable AI approach.</t>
        </section>
        <section anchor="sub-challenge-tailoring-the-ai-approach-to-the-given-problem">
          <name>Sub-challenge: Tailoring the AI Approach to the Given Problem</name>
          <t>After addressing the two aforementioned sub-challenges, one may have selected a useful kind of AI approach for the given input and output of a network management problem. For example, one may select regression and supervised learning to forecast upcoming network traffic. Or select reinforcement learning to continuously control network and service coordination (scaling, placement, etc.). However, even within each of these fields (regression, reinforcement learning, etc.), there are many possible algorithms and hyperparameters to consider. Selecting a suitable algorithm and parametrizing it with the right hyperparameters is crucial to tailor the AI approach to the given network management problem.</t>
          <t>For example, there are many different regression techniques (classical linear, polynomial regression, lasso/ridge regression, SVR, regression trees, neural networks, etc.), each with different benefits and drawbacks and each with its own set of hyperparameters. Choosing a suitable technique depends on the amount and structure of the input data as well as on the desired output. It also depends on the available amount of compute resources and compute time until a prediction is required. If resources and time are not a limiting factor, many hyperparameters can be tuned automatically. In practice, however, the design space of choosing algorithms and hyperparameters is often so large that it cannot be effectively tuned automatically but also requires some initial expertise in selecting suitable AI algorithms and hyperparameters.</t>
          <t>This sub-challenge holds for all fields of AI: Supervised learning (regression and classification), self-supervised learning, unsupervised learning, and reinforcement learning, each are broad and rapidly growing fields. Selecting suitable algorithms and hyperparameters to tailor AI approaches to the network management problem is both an opportunity and a challenge. Here, future work should further explore these trade-offs and provide clearer guidelines on how to navigate these trade-offs for different network management tasks.</t>
        </section>
      </section>
      <section anchor="performance-of-produced-models">
        <name> Performance of produced models</name>
        <t>From a general point of view, any AI technique will produce results with a certain level of quality. This leads to two inherent questions: (1) what is the definition of the performance in a context of a NM application? (2) How to measure it? and (3) How to ensure/improve the quality of produced results?</t>
        <t>Many metrics have been already defined to evaluate the performance of an AI-based techniques in regards to its NM-level objectives. For example, QoS metrics (throughput, latency) can serve to measure the performance of a routing algorithm along with the computational complexity (memory consumption, size of routing tables). The question is to model and measure these two antagonist types of metrics. Number of true/false positives/negatives are the most basic metrics for network attack detection functions. Although the first two questions are thus already answered even if improvement can be done, question (3) refers to the integration of metrics into AI algorithms. Its objective is to obtain the best results which need to be quantified with these metrics. Depending on the type of algorithm, these metrics are either evaluated in an online manner with a feedback loop (for example with reinforcement learning) or in batch to optimize a model based on a particular context (for example described by a dataset for machine learning).</t>
        <t>The problem is two-fold. First, the performance can be measured through multiple metrics of different types (numerical or ordinal for example) and some can be constrained by fixed boundaries (like a maximum latency), making their joint use challenging when creating an AI model to resolve a NM problem. Second, the scale metrics differ from each other in terms of importance or impact and can eventually vary on their domains. It can be hard to precisely assess what is a good or bad value (as it might depend on multiple other ones) and it is even more difficult to integrate in an AI technique, especially for learning algorithms to adjust their models based on the performance. Indeed, learning algorithms run through multiple iterations and rely on internal metrics (MAE or (R)MSE for neural network, gini index or entropy for decision trees, distance to an hyperplane for SVMs, etc) which are not strongly correlated to the final metrics of the application. For instance, a decision tree algorithm for classification purposes aims at being able to create branches with a maximum of data from the same classes and so avoid mixing classes. It is done thanks to a criterion like the entropy index but this kind of Index does not assume any difference between mixing class A and B or A and C. Assuming now that from an operational point of view, if A and B are mixed in the predictions is not critical, the algorithm should have preferred to mix and A and B rather than A and C even if in the first case it will produce more errors.</t>
        <t>Therefore, the internal functioning of the AI algorithms should be refined, here by defining a particular criterion to replace the entropy as a quality measure when separating two branches. It assumes that the final NM objectives are integrated at this stage.</t>
        <t>Another concrete example is traffic predictors which aim at forecasting traffic demands. They only produce an input that is not necessarily simple to be interpreted and used by, e.g., capacity allocation strategies/policies. A traditional traffic prediction that tries to minimize (perfectly symmetric) MAE/MSE treats positive and negative errors in identical ways, hence is agnostic of the diverse meaning (and costs) of under- and over-provisioning. And, such a prediction does not provide any information on, e.g., how to dimension resources/capacity to accommodate the future demand avoiding all underprovisioning (which entails service disruption) while minimizing overprovisioning (i.e., wasting resources). In other words, it forces the operator to guess the overprovisioning by taking (non-informed) safety margins. A more sensible approach here is instead forecasting directly the needed capacity, rather than the traffic <xref target="Beg19"/>.</t>
        <t>While the one above is just an example, the high-level challenge is devising forecasting models that minimize the correct objective/loss function for the specific NM task at hand (instead of generic MAE/MSE). In this way, the prediction phase becomes an integral part of the NM, and not just a (limited and hard-to-use) input to it. In ML terms, this maps to solving the loss-metric mismatch in the context of anticipatory NM <xref target="Hua19"/>.</t>
        <t>Another issue for statistical learning (from examples/observations) is mainly about extracting an estimator from a finite set of input-output samples drawn from an unknown probability distribution that should be descriptive enough for unseen/new input data. In this context online monitoring and error control of the quality/properties of these point estimators (bias, variance, mean squared error, etc.) is critical for dynamic/uncertain network environments. Similar reasoning/challenge applies for interval estimates, i.e., confidence intervals (frequentist) and credible intervals (Bayesian).</t>
      </section>
      <section anchor="lightweight-ai">
        <name> Lightweight AI</name>
        <t>Network management and operations often need to be performed under strict time constraints, i.e. at line rate, in particular in the context of autonomic or self-driven networks. Locating NM functions as close as possible where forwarding is achieved is thus an interesting option to avoid additional delays when these operations are performed remotely, for example in a centralized controller. Besides, forwarding devices may offer available resources to supplement or replace edge resources. In case of AI coupled with network management, AI tasks can be offloaded in network devices, or more generally embedded within the network. Obviously, time-critical tasks are the best candidates to be offloaded within the network. Costly learning tasks should be processed in high-end servers but created models can be deployed, configured, modified and tuned in switches.</t>
        <t>Recent advances in network programmability ease the programming of specific tasks at data-plane level. P4 <xref target="Bos14"/> is widely used today for many tasks including firewalling <xref target="Dat18"/> or bandwidth management <xref target="Che19"/>. P4 is prone to be agnostic to a specific hardware. Switches actually have particular architectures and the RMT (Reconfigurable Match Table) <xref target="Bos13"/> model is generally accepted to be generic enough to represent limited but essential switch architecture components and functionalities. P4 is inspired by this architecture. The RMT model allows reconfiguring match-action tables where actions can be usual ones (rewrite some headers, forward, drop...). Actions are thus applied on the packets when they are forwarded. Actions can also be more complex programs with some safeguards: no loop, resistivity... The impact on the program development is huge. For example, real number operations are not available by default while they are primordial in many AI algorithms.</t>
        <t>In a nutshell, the first challenge to overcome of embedding AI in a network is the capacity of the hardware to support AI operations (architectural limitation). Considering software equipment such as a virtual switch simplifies the problem but does not totally resolve it as, even in that case, strong line-rate requirement limits the type of programs to be executed. For example, BPF (Berkeley Packet Filter) programs provides a higher control on packet processing in OVS <xref target="Cha18"/> but still have some limitations, as the execution time of these programs are bounded by nature to ensure their termination, an essential requirement assuming the run-to-completion model which permits high throughput.</t>
        <t>The second challenge (resource limitation) of network-embedded AI in the network is to allocate enough resources for AI tasks with a limited impact on other tasks of network devices such as forwarding, monitoring, filtering... Approximation and/or optimization of AI tasks are potential directions to help in this area. For instance, many network monitoring proposals rely on sketches and with a proposed  well-tuned implementation for data-plane <xref target="Liu16"/><xref target="Yan18"/>. However, no general optimized AI-programmable abstraction exists to fit all cases and proposals are mostly use-case centric.  Research direction in NM regarding this issue can benefit from propositions in the field of embedded systems that face the same issues. Binarization of neural networks is one example <xref target="Lia18"/>. Besides, distributed processing is a common technique to distribute the load of a single task between multiple entities. AI task decomposition between network elements, edge servers or controllers has been also proposed <xref target="Gup18"/>.</t>
      </section>
      <section anchor="ai-for-planning-of-actions">
        <name>AI for planning of actions</name>
        <t>Many tasks in network management revolve around the planning of actions with the purpose of optimizing a network and facilitating the delivery of communication services.  For example, Paths need to be planned and set up in ways that minimize wasted network resources (to optimize cost) while facilitating high network utilization (avoiding bottlenecks and the formation of congestion hotspots) and ensuring resiliency (by making sure that backup paths are not congruent with primary paths).  Other examples were mentioned in section 2.</t>
        <t>The need for planning only increases with the rise of centralized control planes.  The promise of central control is that decisions can be optimized when made with complete knowledge of relevant context, as opposed to distributed control that needs to rely on local decisions being made with incomplete knowledge while incurring higher overhead to replicate relevant state across multiple systems.  However, as the scale of networks and interconnected systems continues to grow, so does the size of the planning task.  Many problems are NP-hard.  As a result, solutions typically need to rely on heuristics and algorithms that often result in suboptimal outcomes and that are challenging to deploy in a scalable manner.</t>
        <t>The emergence of Intent-Based Networking emphasizes the need for automated planning even further.  The concept underlying "intent" is that it should allow users (network operators, not end users of communication services) to articulate desired outcomes without the need to specify how to achieve those outcomes. An Intent-Based System is responsible for translating the intent into courses of action that achieve the desired outcomes and that continue to maintain the outcomes over time. How the necessary courses of action are derived and what planning needs to take place is left open but where the real challenge lies.  Solutions that rely on clever algorithms devised by human developers face the same challenges as any other network management tasks.</t>
        <t>These properties (problems with a clearly defined need, whose solution is faced with exploding search spaces and that today rely on algorithms and heuristics that in many cases result only suboptimal outcomes and significant limitations in scale) make automated planning of actions an ideal candidate for the application of AI-based solutions.</t>
        <t>AI applications in network management in the past have been largely focusing on classification problems. Examples include analysis by Intrusion Protection Systems of traffic flow patterns to detect suspicious traffic, classification of encrypted traffic for improved QoS treatment based on suspected application type, and prediction of performance parameters based on observations.  In addition, AI has been used for troubleshooting and diagnostics, as well as for automated help and customer support systems.  However, AI-based solutions for the automated planning of actions, including the automated identification of courses of action, have to this point not been explored much.</t>
        <t>A much-publicized leap in AI has been the development of Alpha Go.  Instead of using AI to merely solve classification problems, Alpha Go has been successful in automatically deriving winning strategy for board games, specifically the game of Go which features a prohibitively large search space that was long thought to put the ability to play Go at a world class level beyond the reach of problems that AI could solve.   Among the remarkable aspects of Alpha Go is that it is able to identify winning strategies completely on its own, without needing those strategies to be taught or learned by observations assuming the system is aware of rules.</t>
        <t>The challenge for AI in network management is hence, where is the equivalent of an Alpha Go that can be applied to network management (and networking) problems?  Specifically, better solutions are needed for solutions that automatically derive plans and courses of actions for network optimization and similar NP-hard problems, such as provided today with only limited effectiveness by controllers and management applications.</t>
        <t>Also, the evaluation of AI algorithms to derive courses of actions is more complex than more common regression or classification tasks. Actions need to be applied in order to observe the results it leads to. However, contrary to game playing, solutions need to be applied in the real world, where actions have real effects and consequences. Different orientations can be envisioned. First, incremental application of AI decisions with small steps can allow us to carefully observe and detect unexpected effects. This can be complemented with roll-back techniques. Second, formal verification techniques can be leveraged to verify decisions made by AI are maintained within safety bounds. Third, sandbox environments can be used but they <bcp14>SHOULD</bcp14> be representative enough of the real world. After progress in simulation and emulation, recent research advances lead to the definition of digital twins which implies a tight coupling between a real system and its digital twin to ensure a parallel but synchronized execution. Alternatively, transfer learning techniques in another promising area to be able to capitalize on ML models applicable on a real word system in a more generic sandbox environment. It is actually also an open problem to make the use of AI more acceptable as highlighted in the dedicated section.</t>
      </section>
    </section>
    <section anchor="netData">
      <name>Network data as input for ML algorithms</name>
      <t>Many applications of AI takes as input data. The quality of the outputs of ML-based techniques are highly dependent on the quality and quantity of data used for learning but also on other parameters. For example, as modern network infrastructures move towards higher speed and scale, they aim to support increasingly more demanding services with strict performance guarantees. These often require resource reconfigurations at run time, in response to emerging network events, so that they can ensure reliable delivery at the expected performance level. Timely observation and detection of events is also of paramount importance for security purposes, and can allow faster execution of remedy actions thus leading to reduced service downtime.</t>
      <t>Thus, the challenge of data management is multifaceted as detailed in next subsections.</t>
      <section anchor="data-for-ai-based-nm-solutions">
        <name>Data for AI-based NM solutions</name>
        <t>Assuming a network management application, the first problem to address is to define the data to be collected which will be appropriate to obtain accurate results. This data selection can require defining problem-specific data or features (feature engineering).</t>
        <t>Firstly, NM has already produced a lot of methods and technologies to acquire data. However, in most cases, the goal was not to support AI problems and lead to a mismatch. Indeed, machine learning algorithms only work as desired when data to be analyzed respects properties. Many methods rely on vector-based distances which so supposes that the data encoded into the vector respects the underlying distance semantic. Taking the first n bytes of a packet as vectors and computing distances accordingly is possible but does not embed the semantic of the information carried out in the headers. For example, (deep) learning techniques mostly rely on vectors of (real) numbers as input which fits some metrics (packet/byte counts, latency, delays, etc) but needs some adjustment for categorical (IP addresses, port numbers, etc) or topological features. Conversions are usually applied using common techniques like one-hot encoding or by coarse-grained representations <xref target="Sco11"/>. However, more advanced techniques have been recently proposed to embed representation of network entities rather than pure encoding <xref target="Rin17"/><xref target="Evr19"/><xref target="Sol20"/>. Data to handle can be in a schema-free or eventually text-based format. One example could be the automated annotation of management intents provided in an unstructured textual format (policies descriptions, specifications,) to extract from them management entities and operations. For that purpose, suitable annotation models need to be built using existing NER (Named Entity Recognition) techniques usually applied for NLP. However, this <bcp14>SHALL</bcp14> be carefully crafted or specialized for network management (intent) language which indirectly bounces back to the challenges of AI techniques for NM specified earlier.</t>
        <t>Secondly, The behavior of any network is not just derived from the events that can be directly observed, such as network traffic overload, but also from events occurring outside the environment of the network. The information provided by the detectors of such kinds of events, e.g. a natural incident (earthquake, storm), can be used to determine the adaptation of the network to avoid potential problems derived from such events. Those can be provided by BigData sources as well as sensors of many kinds. The AI challenge related to this task is to process large amounts of data and associate it with the effects that those events have on the network. It is hard to determine the static and dynamic relation between the data provided by external sources and the specific implications it has in networks. For instance, the effect of a "flash crowd" detected in an external source depends on the relation of a particular network to such an event. This can be addressed by AI and its particular application to network management. The objective is to complement a control-loop, as shown in <xref target="Mar18"/>, by including the specific AI engines into the decision components as well as the processes that close the loop, so the AI engine can receive feedback from the network in order to improve its own behavior. Similar challenges are addressed in other domains, image processing and computer vision, by using artifacts for anticipating movements in object location and identification.</t>
      </section>
      <section anchor="data-collection">
        <name>Data collection</name>
        <t>Once defined, the second problem to address is the collection of data. Monitoring frameworks have been developed for many years such as IPFIX <xref target="RFC7011"/> and more recently with SDN-based monitoring solutions <xref target="Yu14"/><xref target="Ngu20"/>. However, going towards more AI for actions in network management supposes also to retrieve more than traffic related information. Actually, configuration information such as topologies, routing tables or security policies have been proven to be relevant in specific scenarios. As a result, many different technologies can be used to retrieve meaningful data. To support improved QoE, monitoring of the application layer is helpful but far from being easy with the heterogeneity of end-user applications and the wide use of encrypted channels. Monitoring techniques need to be reinvented through the definition of new techniques to extract knowledge from raw measurement <xref target="Bri19"/> or by involving end-users with crowd-sourcing <xref target="Hir15"/> and distributed monitoring.</t>
        <t>The collecting process requirements depend on the kind of processing. We can distinguish two major classes: batch/offline vs real-time/online processing. In particular, real-time monitoring tools are key in enabling dynamic resource management functions to operate on short reconfiguration cycles. However, maintaining an accurate view of the network state requires a vast amount of information to be collected and processed. While efficient mechanisms that extract raw measurement data at line rate have been recently developed, the processing of collected data is still a costly operation. This involves evaluating and aggregating a vast amount of state information as a response to a diverse set of monitoring queries, before generating accurate reports. Machine learning methods, e.g. based on regression, can be used to intelligently filter the raw measurements and thus reduce the volume of data to process. For example, in <xref target="Tan20"/> the authors proposed an approach in which the classifiers derived for this purpose (according to measurements on traffic properties) can achieve a threefold improvement in the query processing capability. A residual question is the storage of raw measurements. In fact, predicting the lifetime of data is challenging because their analysis may not be planned and triggered by a particular event (for example, an anomaly or attack). As a result, the provisioning of storage capacity can be hard.</t>
        <t>In parallel to the continuously increasing dynamicity of networks and complexity of traffic, there is a trend towards more user traffic processing customization <xref target="RFC8986"/><xref target="Li19"/>. As a result, fine grained information about network element states is expected and new propositions have emerged to collect on-path data or in-band network telemetry information <xref target="Tan20b"/>. These new approaches have been designed by introducing much flexibility and customization and could be helpful to be used in conjunction with AI applications. However, the seamless coupling of telemetry processes with packet forwarding requires careful definition of solutions to limit the overhead and the impact of the throughput while providing the necessary level of details. This shares commonalities with the lightweight AI challenge.</t>
      </section>
      <section anchor="usable-data">
        <name>Usable data</name>
        <t>Although all agree on the necessity to have more shared datasets, it is quite uncommon in practice. Data contains private or sensitive information and may not be shared because of the criticality of data (which can be used by ill-intentioned adversaries) or due to laws or regulations, even within the same company. To solve this issue, anonymization techniques <xref target="Dij19"/> can be enhanced to optimize the trade-off between valuable data vs sensitive information (potential) leakage or reconstruction.
Whatever the final user of data, regulations and laws impose rules on data management with potentially costly impact if they are not respected voluntarily or not. Defining a new monitoring framework should always consider security and privacy aspects, for example to let any user/customer or access/remove its own data with General Data Protection Regulation (GDPR) in EU. The challenge resides here in the capacity of qualifying what is critical or private information and the capacity for an adversary to reconstruct it from other sources of data. Hence AI/ML based solutions will require more data but also more administrative, legal and ethical procedures. Those can last long and so slow down the deployment of a new solution. In addition, this requires interaction with experts from different domains (e.g. AI engineer and a lawyer). The integration of these non-technical constraints should be considered when defining new data to be collected or a new technique to collect data. However, knowing the final use of data is most of the time necessary for ethical and legal assessment which assumes that those considerations <bcp14>SHOULD</bcp14>  be integrated from the early design of new AI-based solutions.</t>
        <t>For supervised or semi-supervised training, having a labeled dataset is a prerequisite. It constitutes a major challenge as well. One one hand, collectors are able to retrieve data. On the other hand, those network data are typically unlabeled. This limits application of ML to unsupervised learning tasks (learning from data). Because manual labeling is a tedious task. one option is to leverage AI to guide humans. This may also support a better generalization of a learned model. Indeed, an underlying challenge is the genericity or coverage of the datasets. Labels encode values of an objective function, the challenge posed by the design of such tools is tremendous since for involving a M:N relationship: 1 data type may be associated to M objective function values and N data types may be associated to 1 objective function. As a result, most datasets used for research encodes a single label for a particular application like attack label for datasets to be used in the context of intrusion detection or application type for network traffic used for classification where the value of a single dataset could be capitalized in several applications.</t>
        <t>Again, researchers need empirical (or at least realistic) datasets to validate their solutions. Unfortunately, as highlighted above, having such data from real deployments for various reasons (business secrets, privacy concerns, concerns that vulnerabilities are revealed by accident, raw unlabeled data, etc.) is tough. Even if such a dataset is available it might not be enough to convincingly validate a new algorithm.
Instead of falling back to artificial testbed experiments or simulation, it would be useful to have the capability to generate datasets with characteristics that are not 100% identical but similar to the characteristics of one or more real datasets. Such synthetic networks can be used to validate new management algorithms, intrusion detection systems, etc.
The usage of AI (for example GANs) in this area <xref target="Hui22"/> is not yet widespread and there are still many concerns that deter researchers, e.g. the fear of leaking sensitive information from the original dataset into the synthetic dataset.</t>
      </section>
    </section>
    <section anchor="acceptability-of-ai">
      <name> Acceptability of AI</name>
      <t>Networks are critical infrastructures. On one hand, they <bcp14>SHOULD</bcp14> be operated without interruption and must be interoperable. Networks, except in a lab, are not isolated which slow down innovation in general. For example, changing Internet routing protocols <bcp14>SHOULD</bcp14> be accepted by all. The same applies for protocol. Even if there have been several versions of major protocols in use like TCP or DNS, there are still some security issues which cannot be patched with 100% guarantee. On the other hand, results provided by AI solutions are uncertain by nature. The same technique applied in different environments can produce different results. AI techniques need some effort (time and human) to be properly configured or to be stabilized. For instance, reinforcement learning needs several iterations before being able to produce acceptable results. These properties of AI techniques are thus a bit antagonist with the criticality of network infrastructures. With that in mind, acceptability of AI by network operators is clearly an obstacle for its larger adoption.</t>
      <section anchor="explainability-of-network-ai-products">
        <name> Explainability of Network-AI products</name>
        <t>A common issue across all Machine Learning (ML) applications is that they are black boxes. This means that, after training, the knowledge acquired by ML models is unintelligible to humans. As a result, offering hard guarantees on performance is a very challenging issue. In addition, complex ML models like neural networks -that often have more than hundreds of thousands of parameters- are very hard to debug or troubleshoot in case of failure.</t>
        <t>While this is a common issue for all applications of AI, many areas work well with uncertainty and the black-box behavior of AI-based solutions. For instance, users accept an inherent error in recommender systems or computer vision solutions.</t>
        <t>The networking field has already produced a set of well-established network management algorithms and methods, with clear performance guarantees and troubleshooting mechanisms <xref target="Rex06"/><xref target="Kr14"/>. As such, improving debugging, troubleshooting and guarantees on AI-based solutions for networking is a must.</t>
        <t>AI researchers and practitioners are devoting large research efforts to improve this aspect of ML models, which is commonly known as explainability <xref target="XAI"/>.</t>
        <t>This set of techniques provides insights and, in some cases, guarantees on the performance and behavior of ML-based solutions. Understanding such techniques, researching and applying them to network AI is critical for the success of the field.</t>
        <t>There exist several ML-based methods that are human-understandable, although not widely used today. For instance, <xref target="Mar20"/> shows a method for building anticipation models (prediction) that provide explanations while determining some actions for tuning some parameters of the network. There are other challenges that <bcp14>SHOULD</bcp14> be addressed, such as providing explanations for other ML methods that are quite extended. For instance, xNN/SVM models can be accompanied by Digital Twins of the network that are reversely explored to explain some output from the ML model (e.g., xNN/SVM). In this context, there already exist several methods <xref target="Zil20"/><xref target="Puj21"/> that produce human-readable interpretations of trained NN models, by analyzing their neural activations on different inputs.</t>
      </section>
      <section anchor="ai-based-products-and-algorithms-in-production-systems">
        <name> AI-based products and algorithms in production systems</name>
        <t>AI-based network management and optimization algorithms are first trained, then the resulting model is used to produce relevant inferences in operation, either in management or optimization scenarios. A relevant question for the success of AI-based solutions is: where does this training occur?</t>
        <t>Traditionally, AI-based models have been trained in the same scenario where they operate<xref target="Val17"/><xref target="Xu18"/>, this is the customer network. However this presents critical drawbacks. First, training an AI model for management and operation typically requires generating network configurations and scenarios that can break the network. This is because training requires seeing a broad spectrum of scenarios. Thus, it is not feasible in production networks. Second, customer networks may not be equipped with the monitoring infrastructure required to collect the data used in the training process (e.g., performance metrics).</t>
        <t>A more sensible approach is to train the AI-based product in a lab, for instance in the vendor's premises. In the lab, AI models can be trained in a controlled testbed, with any configuration, even ones that break the network. However, the main challenge here arises from the fundamental differences between the lab's network and the customer networks. For instance, the topology of the lab's network might be smaller, etc. As a result, there is a need for models that are able to generalize. In this context, generalization means that models should be able to operate in other scenarios not seen during training, with different topologies, routing configurations, scheduling policies, etc.</t>
        <t>In order to address this generalization problem, two main approaches are possible: The first one is Transfer Learning <xref target="tl1"/>. With this technique, the knowledge gained in the lab's training  is used to operate in the customer network. Transfer Learning still requires that some data from the customer is used to re-train the model (e.g., accurate performance measurements). This means that, for each customer network, re-training is required. This presents important drawbacks, since this represents an added cost and access to customer data might be problematic.</t>
        <t>A different approach is to use Graph Neural Networks (GNN) <xref target="gnn1"/><xref target="gnn2"/>. GNNs are a novel type of neural network able to operate and generalize over graphs. Indeed, networks are fundamentally represented as graphs: topology, routing, etc. With GNN, vendors can train the AI model in a lab and then use the resulting model, as is, in different customer networks, without additional re-training using customer data.</t>
      </section>
      <section anchor="ai-with-humans-in-the-loop">
        <name> AI with humans in the loop</name>
        <t>Depending on the network management task, AI can automate and replace manual human control or it can complement human experts and keep them in the loop. Keeping humans in the loop will be an important step of building trust in AI approaches and help ensure the desired outcomes.
There are various ways of keeping humans in the loop in the different fields of AI, which could be useful for different aspects of network management.</t>
        <t>In classification tasks (e.g., detecting security breaches, malware or detecting anomalies), trained AI models provide a confidence score in addition to the predicted class. If the confidence is high, the prediction is used directly. If the confidence is too low, a human expert may jump in and make the decision - thereby also providing valuable training data to improve the AI model. Such approaches are already being used in industry, e.g., to automatically label datasets (AWS SageMake). Similar approaches could also be used for other supervised learning tasks, e.g., regression. Still, it is an open challenge to keep humans in the loop in all phases of the learning process.</t>
        <t>Another field of AI is reinforcement learning, which is useful for taking continuous control decisions in network management, e.g., controlling service scaling and placement as well as flow scheduling and routing over time. Reinforcement learning agents typically interact with the environment (i.e., the simulated or real network) completely autonomously without human feedback. However, there is a growing number of approaches to put human experts back into the loop. One approach is offline reinforcement learning, where the training data does not come from the reinforcement learning agent's own exploration but from pre-recorded traces of human experts (e.g., placement decisions that were made by humans before). Another approach is to reward the reinforcement learning agent based on human feedback rather than a pre-defined reward function <xref target="Lee21"/>. Again, while there are first promising approaches, more work is required in this area.
Overall, it is an open challenge to both leverage the benefits of AI but keep human experts in the loop where it is useful.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference target="https://www.rfc-editor.org/info/rfc7011" anchor="RFC7011" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" surname="Claise" initials="B"/>
            <author fullname="B. Trammell" surname="Trammell" initials="B"/>
            <author fullname="P. Aitken" surname="Aitken" initials="P"/>
            <date year="2013" month="September"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network.  In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required.  This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process.  This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC8986" target="https://www.rfc-editor.org/info/rfc8986" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8986.xml">
          <front>
            <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
            <author initials="C." surname="Filsfils" fullname="C. Filsfils" role="editor">
              <organization/>
            </author>
            <author initials="P." surname="Camarillo" fullname="P. Camarillo" role="editor">
              <organization/>
            </author>
            <author initials="J." surname="Leddy" fullname="J. Leddy">
              <organization/>
            </author>
            <author initials="D." surname="Voyer" fullname="D. Voyer">
              <organization/>
            </author>
            <author initials="S." surname="Matsushima" fullname="S. Matsushima">
              <organization/>
            </author>
            <author initials="Z." surname="Li" fullname="Z. Li">
              <organization/>
            </author>
            <date year="2021" month="February"/>
            <abstract>
              <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
              <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
              <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8986"/>
          <seriesInfo name="DOI" value="10.17487/RFC8986"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Ste92">
          <front>
            <title>A Diagnosis Expert System for Network Traffic Management</title>
            <author initials="D." surname="Stern" fullname="Daniel Stern">
              <organization/>
            </author>
            <author initials="P." surname="Chemouil" fullname="Prosper Chemouil">
              <organization/>
            </author>
            <date year="1992"/>
          </front>
          <annotation>Networks, Kobe, Japan</annotation>
        </reference>
        <reference anchor="Abd10">
          <front>
            <title>A Diagnosis Expert System for Network Traffic Management</title>
            <author initials="K. A." surname="Jalil" fullname="Kamarularifin Abd Jalil">
              <organization/>
            </author>
            <author initials="M. H." surname="Kamarudin" fullname="Muhammad Hilmi Kamarudin">
              <organization/>
            </author>
            <author initials="M. N." surname="Masrek" fullname="Mohamad Noorman Masrek">
              <organization/>
            </author>
            <date year="2010"/>
          </front>
          <annotation>IEEE international conference on networking and information technology</annotation>
        </reference>
        <reference anchor="Beg19">
          <front>
            <title>DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning</title>
            <author initials="D." surname="Bega" fullname="D. Bega">
              <organization/>
            </author>
            <author initials="M." surname="Gramaglia" fullname="M. Gramaglia">
              <organization/>
            </author>
            <author initials="M." surname="Fiore" fullname="M. Fiore">
              <organization/>
            </author>
            <author initials="A." surname="Banchs" fullname="A. Banchs">
              <organization/>
            </author>
            <author initials="X." surname="Costa-Perez" fullname="X. Costa-Perez">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
          <annotation>IEEE INFOCOM</annotation>
        </reference>
        <reference anchor="Bos13">
          <front>
            <title>Forwarding metamorphosis: Fast programmable match-action processing in hardware for SDN</title>
            <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
              <organization/>
            </author>
            <author initials="G." surname="Gibb" fullname="Glen Gibb">
              <organization/>
            </author>
            <author initials="H.-S." surname="Kim" fullname="Hun-Seok Kim">
              <organization/>
            </author>
            <author initials="G." surname="Varghese" fullname="George Varghese">
              <organization/>
            </author>
            <author initials="N." surname="McKeown" fullname="Nick McKeown">
              <organization/>
            </author>
            <author initials="M." surname="Izzard" fullname="Martin Izzard">
              <organization/>
            </author>
            <author initials="F." surname="Mujica" fullname="Fernando Mujica">
              <organization/>
            </author>
            <author initials="M." surname="Horowitz" fullname="Mark Horowitz">
              <organization/>
            </author>
            <date year="2013"/>
          </front>
          <annotation>ACM SIGCOMM</annotation>
        </reference>
        <reference anchor="Bos14">
          <front>
            <title>P4: programming protocol-independent packet processors</title>
            <author initials="P." surname="Bosshart" fullname="Pat Bosshart">
              <organization/>
            </author>
            <author initials="D." surname="Daly" fullname="Dan Daly">
              <organization/>
            </author>
            <author initials="G." surname="Gibb" fullname="Glen Gibb">
              <organization/>
            </author>
            <author initials="M." surname="Izzard-" fullname="Martin Izzard-">
              <organization/>
            </author>
            <author initials="N." surname="McKeown" fullname="Nick McKeown">
              <organization/>
            </author>
            <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
              <organization/>
            </author>
            <author initials="C." surname="Schlesinger" fullname="Cole Schlesinger">
              <organization/>
            </author>
            <author initials="D." surname="Talayco" fullname="Dan Talayco">
              <organization/>
            </author>
            <author initials="A." surname="Vahdat" fullname="Amin Vahdat">
              <organization/>
            </author>
            <author initials="G." surname="Varghese" fullname="George Varghese">
              <organization/>
            </author>
            <author initials="D." surname="Walker" fullname="David Walker">
              <organization/>
            </author>
            <date year="2014"/>
          </front>
          <annotation>SIGCOMM Comput. Commun. Rev. 44</annotation>
        </reference>
        <reference anchor="Dat18">
          <front>
            <title>P4Guard: Designing P4 Based Firewall</title>
            <author initials="R." surname="Datta" fullname="R. Datta">
              <organization/>
            </author>
            <author initials="S." surname="Choi" fullname="S. Choi">
              <organization/>
            </author>
            <author initials="A." surname="Chowdhary" fullname="A. Chowdhary">
              <organization/>
            </author>
            <author initials="Y." surname="Park," fullname="Y. Park,">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>IEEE Military Communications Conference (MILCOM)</annotation>
        </reference>
        <reference anchor="Che19">
          <front>
            <title>P4-Enabled Bandwidth Management</title>
            <author initials="Y." surname="Chen" fullname="Y. Chen">
              <organization/>
            </author>
            <author initials="L." surname="Yen" fullname="L. Yen">
              <organization/>
            </author>
            <author initials="W." surname="Wang" fullname="W. Wang">
              <organization/>
            </author>
            <author initials="C." surname="Chuang" fullname="C. Chuang">
              <organization/>
            </author>
            <author initials="Y." surname="Liu" fullname="Y. Liu">
              <organization/>
            </author>
            <author initials="C." surname="Tseng" fullname="C. Tseng">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
          <annotation>Asia-Pacific Network Operations and Management Symposium (APNOMS)</annotation>
        </reference>
        <reference anchor="Cha18">
          <front>
            <title>Oko: Extending Open vSwitch with Stateful Filters</title>
            <author initials="P." surname="Chaignon" fullname="Paul Chaignon">
              <organization/>
            </author>
            <author initials="K." surname="Lazri" fullname="Kahina Lazri">
              <organization/>
            </author>
            <author initials="J." surname="François" fullname="Jérôme François">
              <organization/>
            </author>
            <author initials="T." surname="Delmas" fullname="Thibault Delmas">
              <organization/>
            </author>
            <author initials="O." surname="Festor" fullname="Olivier Festor">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>ACM Symposium on SDN Research (SOSR)</annotation>
        </reference>
        <reference anchor="czb20">
          <front>
            <title>Network Management 2030: Operations and Control of Network 2030 Services</title>
            <author initials="A." surname="Clemm" fullname="A. Clemm">
              <organization/>
            </author>
            <author initials="M. F." surname="Zhani" fullname="M. F. Zhani">
              <organization/>
            </author>
            <author initials="R." surname="Boutaba" fullname="R. Boutaba">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>Springer Journal of Network and Systems Management (JNSM)</annotation>
        </reference>
        <reference anchor="Hua19">
          <front>
            <title>Addressing the Loss-Metric Mismatch with Adaptive Loss Alignment</title>
            <author initials="C." surname="Huang" fullname="Chen Huang">
              <organization/>
            </author>
            <author initials="S." surname="Zhai" fullname="Shuangfei Zhai">
              <organization/>
            </author>
            <author initials="W." surname="Talbott" fullname="Walter Talbott">
              <organization/>
            </author>
            <author initials="M. A." surname="Bautista" fullname="Miguel Angel Bautista">
              <organization/>
            </author>
            <author initials="S.-Y." surname="Sun" fullname="Shih-Yu Sun">
              <organization/>
            </author>
            <author initials="C." surname="Guestrin" fullname="Carlos Guestrin">
              <organization/>
            </author>
            <author initials="J." surname="Susskind" fullname="Josh Susskind">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>ICRL</annotation>
        </reference>
        <reference anchor="Lee21">
          <front>
            <title>Feedback-efficient interactive reinforcement learning via relabeling experience and unsupervised pre-training</title>
            <author initials="K." surname="Lee" fullname="K. Lee">
              <organization/>
            </author>
            <author initials="L." surname="Smith" fullname="L. Smith">
              <organization/>
            </author>
            <author initials="P." surname="Abbeel" fullname="P. Abbeel">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <annotation>arXiv preprint arXiv:2106.05091</annotation>
        </reference>
        <reference anchor="Lia18">
          <front>
            <title>FP-BNN: Binarized neural network on FPGA</title>
            <author initials="S." surname="Liang" fullname="Shuang Liang">
              <organization/>
            </author>
            <author initials="S." surname="Yin" fullname="Shouyi Yin">
              <organization/>
            </author>
            <author initials="L." surname="Liu" fullname="Leibo Liu">
              <organization/>
            </author>
            <author initials="W." surname="Luk" fullname="Wayne Luk">
              <organization/>
            </author>
            <author initials="S." surname="Wei" fullname="Shaojun Wei">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>Neurocomputing, Volume 275</annotation>
        </reference>
        <reference anchor="Liu16">
          <front>
            <title>One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon</title>
            <author initials="Z." surname="Liu" fullname="Zaoxing Liu">
              <organization/>
            </author>
            <author initials="A." surname="Manousis" fullname="Antonis Manousis">
              <organization/>
            </author>
            <author initials="G." surname="Vorsanger" fullname="Gregory Vorsanger">
              <organization/>
            </author>
            <author initials="V." surname="Sekar" fullname="Vyas Sekar">
              <organization/>
            </author>
            <author initials="V." surname="Braverman" fullname="Vladimir Braverman">
              <organization/>
            </author>
            <date year="2016"/>
          </front>
          <annotation>ACM SIGCOMM Conference</annotation>
        </reference>
        <reference anchor="Yan18">
          <front>
            <title>Elastic sketch: adaptive and fast network-wide measurements</title>
            <author initials="T." surname="Yang" fullname="Tong Yang">
              <organization/>
            </author>
            <author initials="J." surname="Jiang" fullname="Jie Jiang">
              <organization/>
            </author>
            <author initials="P." surname="Liu" fullname="Peng Liu">
              <organization/>
            </author>
            <author initials="Q." surname="Huang" fullname="Qun Huang">
              <organization/>
            </author>
            <author initials="J." surname="Gong" fullname="Junzhi Gong">
              <organization/>
            </author>
            <author initials="Y." surname="Zhou" fullname="Yang Zhou">
              <organization/>
            </author>
            <author initials="R." surname="Miao" fullname="Rui Miao">
              <organization/>
            </author>
            <author initials="X." surname="Li" fullname="Xiaoming Li">
              <organization/>
            </author>
            <author initials="S." surname="Uhlig" fullname="Steve Uhlig">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>ACM SIGCOMM Conference</annotation>
        </reference>
        <reference anchor="Gup18">
          <front>
            <title>Sonata: query-driven streaming network telemetry</title>
            <author initials="A." surname="Gupta" fullname="Arpit Gupta">
              <organization/>
            </author>
            <author initials="R." surname="Harrison" fullname="Rob Harrison">
              <organization/>
            </author>
            <author initials="M." surname="Canini" fullname="Marco Canini">
              <organization/>
            </author>
            <author initials="N." surname="Feamster" fullname="Nick Feamster">
              <organization/>
            </author>
            <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
              <organization/>
            </author>
            <author initials="W." surname="Willinger" fullname="Walter Willinger">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>ACM SIGCOMM Conference</annotation>
        </reference>
        <reference anchor="Mar18">
          <front>
            <title>Exploiting External Events for Resource Adaptation in Virtual Computer and Network Systems</title>
            <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
              <organization/>
            </author>
            <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
              <organization/>
            </author>
            <author initials="H." surname="Harai" fullname="Hiroaki Harai">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>IEEE Transactions on Network and Service Management, Vol. 15, N. 2,</annotation>
        </reference>
        <reference anchor="Mar20">
          <front>
            <title>Explained Intelligent Management Decisions in Virtual Networks and Network Slices</title>
            <author initials="P." surname="Martinez-Julia" fullname="Pedro Martinez-Julia">
              <organization/>
            </author>
            <author initials="V. P." surname="Kafle" fullname="Ved P. Kafle">
              <organization/>
            </author>
            <author initials="H." surname="Asaeda" fullname="H. Asaeda">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)</annotation>
        </reference>
        <reference anchor="Mus18">
          <front>
            <title>An overview on application of machine learning techniques in optical networks</title>
            <author initials="F." surname="Musumeci" fullname="F. Musumeci">
              <organization/>
            </author>
            <author initials="C." surname="Rottondi" fullname="C. Rottondi">
              <organization/>
            </author>
            <author initials="A." surname="Nag" fullname="A. Nag">
              <organization/>
            </author>
            <author initials="I." surname="Macaluso" fullname="I. Macaluso">
              <organization/>
            </author>
            <author initials="D." surname="Zibar" fullname="D. Zibar">
              <organization/>
            </author>
            <author initials="M." surname="Ruffini" fullname="M. Ruffini">
              <organization/>
            </author>
            <author initials="M." surname="Tornatore" fullname="M. Tornatore">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>IEEE Communications Surveys &amp; Tutorials, 21(2), 1383-1408.</annotation>
        </reference>
        <reference anchor="Ngu20">
          <front>
            <title>Efficient SDN-based traffic monitoring in IoT networks with double deep Q-network</title>
            <author initials="T. G." surname="Nguyen" fullname="T. G. Nguyen">
              <organization/>
            </author>
            <author initials="T. V." surname="Phan" fullname="T. V. Phan">
              <organization/>
            </author>
            <author initials="D. T." surname="Hoang" fullname="D. T. Hoang">
              <organization/>
            </author>
            <author initials="T. N." surname="Nguyen" fullname="T. N. Nguyen">
              <organization/>
            </author>
            <author initials="C." surname="So-In" fullname="C. So-In">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>International conference on computational data and social networks, Springer</annotation>
        </reference>
        <reference anchor="Tan20">
          <front>
            <title>Classification-assisted Query Processing for Network Telemetry</title>
            <author initials="G." surname="Tangari" fullname="G. Tangari">
              <organization/>
            </author>
            <author initials="M." surname="Charalambides" fullname="M. Charalambides">
              <organization/>
            </author>
            <author initials="G." surname="Pavlou" fullname="G. Pavlou">
              <organization/>
            </author>
            <author initials="C." surname="Grazian" fullname="C. Grazian">
              <organization/>
            </author>
            <author initials="D." surname="Tuncer" fullname="D. Tuncer">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>Network Traffic Measurement and Analysis Conference (TMA)</annotation>
        </reference>
        <reference anchor="Tan20b">
          <front>
            <title>In-band Network Telemetry: A Survey</title>
            <author initials="T." surname="Lizhuang" fullname="Tan, Lizhuang">
              <organization/>
            </author>
            <author initials="S." surname="Wei" fullname="Su, Wei">
              <organization/>
            </author>
            <author initials="Z." surname="Zhenyi" fullname="Zhang, Zhenyi">
              <organization/>
            </author>
            <author initials="M." surname="Jingying" fullname="Miao, Jingying">
              <organization/>
            </author>
            <author initials="L." surname="Xiaoxi" fullname="Liu, Xiaoxi">
              <organization/>
            </author>
            <author initials="L." surname="Na" fullname="Li, Na">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>Computer Networks. 186. 10.1016</annotation>
        </reference>
        <reference anchor="Val17">
          <front>
            <title>Learning to route</title>
            <author initials="V." surname="A." fullname="Valadarsky, A.">
              <organization/>
            </author>
            <author initials="S." surname="M." fullname="Schapira, M.">
              <organization/>
            </author>
            <author initials="S." surname="D." fullname="Shahaf, D.">
              <organization/>
            </author>
            <author initials="T." surname="A." fullname="Tamar, A.">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
          <annotation>ACM HotNets</annotation>
        </reference>
        <reference anchor="Xu18">
          <front>
            <title>Experience-driven networking: A deep reinforcement learning based approach</title>
            <author initials="X." surname="Z." fullname="Xu, Z.">
              <organization/>
            </author>
            <author initials="T." surname="J." fullname="Tang J.">
              <organization/>
            </author>
            <author initials="M." surname="J." fullname="Meng, J.">
              <organization/>
            </author>
            <author initials="Z." surname="W." fullname="Zhang, W.">
              <organization/>
            </author>
            <author initials="W." surname="Y." fullname="Wang, Y.">
              <organization/>
            </author>
            <author initials="L. C." surname="H." fullname="Liu, C. H.">
              <organization/>
            </author>
            <author initials="Y." surname="D." fullname="Yang, D.">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>IEEE INFOCOM</annotation>
        </reference>
        <reference anchor="tl1">
          <front>
            <title>Transfer learning</title>
            <author initials="L." surname="Torrey" fullname="Lisa Torrey">
              <organization/>
            </author>
            <author initials="J." surname="Shavlik" fullname="Jude Shavlik">
              <organization/>
            </author>
            <date year="2010"/>
          </front>
          <annotation>Handbook of research on machine learning applications and trends: algorithms, methods, and techniques</annotation>
        </reference>
        <reference anchor="gnn1">
          <front>
            <title>Relational inductive biases, deep learning, and graph networks</title>
            <author initials="P. W." surname="Battaglia" fullname="Peter W. Battaglia">
              <organization/>
            </author>
            <author initials="E." surname="al" fullname="Et. al">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>arXiv preprint arXiv:1806.01261</annotation>
        </reference>
        <reference anchor="gnn2">
          <front>
            <title>Unveiling the potential of Graph Neural Networks for network modeling and optimization in SDN</title>
            <author initials="K." surname="Rusek" fullname="K. Rusek">
              <organization/>
            </author>
            <author initials="J." surname="Suárez-Varela" fullname="J. Suárez-Varela">
              <organization/>
            </author>
            <author initials="A." surname="Mestres" fullname="A. Mestres">
              <organization/>
            </author>
            <author initials="P." surname="Barlet-Ros" fullname="P. Barlet-Ros">
              <organization/>
            </author>
            <author initials="A." surname="Cabellos-Aparicio" fullname="A. Cabellos-Aparicio">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
          <annotation>ACM Symposium on SDN Research</annotation>
        </reference>
        <reference anchor="Rex06">
          <front>
            <title>Route optimization in IP networks</title>
            <author initials="J." surname="Rexford" fullname="Jennifer Rexford">
              <organization/>
            </author>
            <date year="2006"/>
          </front>
          <annotation>Handbook of Optimization in Telecommunications (pp. 679-700), Springer</annotation>
        </reference>
        <reference anchor="Kr14">
          <front>
            <title>Software-defined networking: A comprehensive survey</title>
            <author initials="D." surname="Kreutz" fullname="D. Kreutz">
              <organization/>
            </author>
            <author initials="F. M." surname="Ramos" fullname="F. M. Ramos">
              <organization/>
            </author>
            <author initials="P. E." surname="Verissimo" fullname="P. E. Verissimo">
              <organization/>
            </author>
            <author initials="C. E." surname="Rothenberg" fullname="C. E. Rothenberg">
              <organization/>
            </author>
            <author initials="S." surname="Azodolmolky" fullname="S. Azodolmolky">
              <organization/>
            </author>
            <author initials="S." surname="Uhlig" fullname="S. Uhlig">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <annotation>Proceedings of the IEEE, vol. 103, no. 1, pp. 14-76</annotation>
        </reference>
        <reference anchor="XAI">
          <front>
            <title>Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models</title>
            <author initials="W." surname="Samek" fullname="Wojciech Samek">
              <organization/>
            </author>
            <author initials="T." surname="Wiegand" fullname="Thomas Wiegand">
              <organization/>
            </author>
            <author initials="K.-R." surname="Müller" fullname="Klaus-Robert Müller">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
          <annotation>arXiv preprint arXiv:1708.08296</annotation>
        </reference>
        <reference anchor="Zil20">
          <front>
            <title>Interpreting Deep Learning-Based Networking Systems</title>
            <author initials="Z." surname="Meng" fullname="Zili Meng">
              <organization/>
            </author>
            <author initials="M." surname="Wang" fullname="Minhu Wang">
              <organization/>
            </author>
            <author initials="J." surname="Bai" fullname="Jiasong Bai">
              <organization/>
            </author>
            <author initials="M." surname="Xu" fullname="Mingwei Xu">
              <organization/>
            </author>
            <author initials="H." surname="Mao" fullname="Hongzi Mao">
              <organization/>
            </author>
            <author initials="H." surname="Hu" fullname="Hongxin Hu">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>ACM SIGCOMM</annotation>
        </reference>
        <reference anchor="Puj21">
          <front>
            <title>NetXplain: Real-time explainability of Graph Neural Networks applied to Computer Networks</title>
            <author initials="D." surname="Pujol-Perich" fullname="David Pujol-Perich">
              <organization/>
            </author>
            <author initials="J." surname="Suárez-Varela" fullname="José Suárez-Varela">
              <organization/>
            </author>
            <author initials="S." surname="Xiao" fullname="Shihan Xiao">
              <organization/>
            </author>
            <author initials="B." surname="Wu" fullname="Bo Wu">
              <organization/>
            </author>
            <author initials="A." surname="Cabello" fullname="Albert Cabello">
              <organization/>
            </author>
            <author initials="P." surname="Barlet-Ros" fullname="Pere Barlet-Ros">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
          <annotation>MLSys workshop on Graph Neural Networks and Systems (GNNSys)</annotation>
        </reference>
        <reference anchor="Li19">
          <front>
            <title>A Framework for Qualitative Communications Using Big Packet Protocol</title>
            <author initials="R." surname="Li" fullname="Richard Li">
              <organization/>
            </author>
            <author initials="K." surname="Makhijani" fullname="Kiran Makhijani">
              <organization/>
            </author>
            <author initials="H." surname="Yousefi" fullname="Hamed Yousefi">
              <organization/>
            </author>
            <author initials="C." surname="Westphal" fullname="Cedric Westphal">
              <organization/>
            </author>
            <author initials="L." surname="Dong" fullname="Lijun Dong">
              <organization/>
            </author>
            <author initials="T." surname="Wauters" fullname="Tim Wauters">
              <organization/>
            </author>
            <author initials="F. D." surname="Turck." fullname="Filip De Turck.">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
          <annotation>ACM SIGCOMM Workshop on Networking for Emerging Applications and Technologies (NEAT)</annotation>
        </reference>
        <reference anchor="Hir15">
          <front>
            <title>Crowdsourced network measurements: Benefits and best practices</title>
            <author initials="M." surname="Hirth" fullname="Matthias Hirth">
              <organization/>
            </author>
            <author initials="T." surname="Hossfeld" fullname="Tobias Hossfeld">
              <organization/>
            </author>
            <author initials="M." surname="Mellia" fullname="Marco Mellia">
              <organization/>
            </author>
            <author initials="C." surname="Schwartz" fullname="Christian Schwartz">
              <organization/>
            </author>
            <author initials="F." surname="Lehrieder" fullname="Frank Lehrieder">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <annotation>Computer Networks. 90</annotation>
        </reference>
        <reference anchor="Bri19">
          <front>
            <title>Transparent and Service-Agnostic Monitoring of Encrypted Web Traffic</title>
            <author initials="P.-O." surname="Brissaud" fullname="Pierre-Olivier Brissaud">
              <organization/>
            </author>
            <author initials="J." surname="François" fullname="Jérôme François">
              <organization/>
            </author>
            <author initials="I." surname="Chrisment" fullname="Isabelle Chrisment">
              <organization/>
            </author>
            <author initials="T." surname="Cholez" fullname="Thibault Cholez">
              <organization/>
            </author>
            <author initials="O." surname="Bettan" fullname="Olivier Bettan">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
          <annotation>IEEE Transactions on Network and Service Management, 16 (3)</annotation>
        </reference>
        <reference anchor="Hoo18">
          <front>
            <title>Updated Taxonomy for the Network and Service Management Research Field</title>
            <author initials="J. V. D." surname="Hooft" fullname="Jeroen Van Der Hooft">
              <organization/>
            </author>
            <author initials="M." surname="Claeys" fullname="Maxim Claeys">
              <organization/>
            </author>
            <author initials="N." surname="Bouten" fullname="Niels Bouten">
              <organization/>
            </author>
            <author initials="T." surname="Wauters" fullname="Tim Wauters">
              <organization/>
            </author>
            <author initials="J." surname="Schönwälder" fullname="Jürgen Schönwälder">
              <organization/>
            </author>
            <author initials="A. P. B." surname="Stiller" fullname="Aiko Pras, Burkhard Stiller">
              <organization/>
            </author>
            <author initials="M." surname="Charalambides" fullname="Marinos Charalambides">
              <organization/>
            </author>
            <author initials="R." surname="Badonnel" fullname="Rémi Badonnel">
              <organization/>
            </author>
            <author initials="J." surname="Serrat" fullname="Joan Serrat">
              <organization/>
            </author>
            <author initials="C. R. P. D." surname="Santos" fullname="Carlos Raniery Paula Dos Santos">
              <organization/>
            </author>
            <author initials="F. D." surname="Turck" fullname="Filip De Turck">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>Journal of Network System Managemen (JNSM) 26, 790-808</annotation>
        </reference>
        <reference anchor="Bou18">
          <front>
            <title>A comprehensive survey on machine learning for networking: evolution, applications and research opportunities</title>
            <author initials="R." surname="Boutaba" fullname="Raouf Boutaba">
              <organization/>
            </author>
            <author initials="M. A." surname="Salahuddin" fullname="Mohammad A. Salahuddin">
              <organization/>
            </author>
            <author initials="N." surname="Limam" fullname="Noura Limam">
              <organization/>
            </author>
            <author initials="S." surname="Ayoubi" fullname="Sara Ayoubi">
              <organization/>
            </author>
            <author initials="N." surname="Shahriar" fullname="Nashid Shahriar">
              <organization/>
            </author>
            <author initials="F." surname="Estrada-Solano" fullname="Felipe Estrada-Solano">
              <organization/>
            </author>
            <author initials="O. M." surname="Caicedo" fullname="Oscar M. Caicedo">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>Journal of Internet Services and Applications 9, 16</annotation>
        </reference>
        <reference anchor="Kaf19">
          <front>
            <title>Automation of 5G Network Slice Control Functions with Machine Learning</title>
            <author initials="V. P." surname="Kafle" fullname="V. P. Kafle">
              <organization/>
            </author>
            <author initials="P." surname="Martinez-Julia" fullname="P. Martinez-Julia">
              <organization/>
            </author>
            <author initials="T." surname="Miyazawa" fullname="T. Miyazawa">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
          <annotation>IEEE Communications Standards Magazine, vol. 3, no. 3, pp. 54-62</annotation>
        </reference>
        <reference anchor="Yan20">
          <front>
            <title>Artificial-Intelligence-Enabled Intelligent 6G Networks</title>
            <author initials="H." surname="Yang" fullname="H. Yang">
              <organization/>
            </author>
            <author initials="A." surname="Alphones" fullname="A. Alphones">
              <organization/>
            </author>
            <author initials="Z." surname="Xiong" fullname="Z. Xiong">
              <organization/>
            </author>
            <author initials="D." surname="Niyato" fullname="D. Niyato">
              <organization/>
            </author>
            <author initials="J." surname="Zhao" fullname="J. Zhao">
              <organization/>
            </author>
            <author initials="K." surname="Wu," fullname="K. Wu,">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>IEEE Network, vol. 34, no. 6, pp. 272-280</annotation>
        </reference>
        <reference anchor="Lop20">
          <front>
            <title>Priority Flow Admission and Routing in SDN: Exact and Heuristic Approaches</title>
            <author initials="J." surname="López" fullname="J. López">
              <organization/>
            </author>
            <author initials="M." surname="Labonne" fullname="M. Labonne">
              <organization/>
            </author>
            <author initials="C." surname="Poletti" fullname="C. Poletti">
              <organization/>
            </author>
            <author initials="D." surname="Belabed" fullname="D. Belabed">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>IEEE International Symposium on Network Computing and Applications (NCA)</annotation>
        </reference>
        <reference anchor="Sen04">
          <front>
            <title>Accurate, scalable in-network identification of p2p traffic using application signatures</title>
            <author initials="S." surname="Sen" fullname="Subhabrata Sen">
              <organization/>
            </author>
            <author initials="O." surname="Spatscheck" fullname="Oliver Spatscheck">
              <organization/>
            </author>
            <author initials="D." surname="Wang" fullname="Dongmei Wang">
              <organization/>
            </author>
            <date year="2004"/>
          </front>
          <annotation>ACM International conference on World Wide Web (WWW)</annotation>
        </reference>
        <reference anchor="Rin17">
          <front>
            <title>IP2Vec: Learning Similarities Between IP Addresses</title>
            <author initials="M." surname="Ring" fullname="M. Ring">
              <organization/>
            </author>
            <author initials="A." surname="Dallmann" fullname="A. Dallmann">
              <organization/>
            </author>
            <author initials="D." surname="Landes" fullname="D. Landes">
              <organization/>
            </author>
            <author initials="A." surname="Hotho" fullname="A. Hotho">
              <organization/>
            </author>
            <date year="2017"/>
          </front>
          <annotation>IEEE International Conference on Data Mining Workshops (ICDMW)</annotation>
        </reference>
        <reference anchor="Evr19">
          <front>
            <title>port2dist: Semantic Port Distances for Network Analytics</title>
            <author initials="L." surname="Evrard" fullname="Laurent Evrard">
              <organization/>
            </author>
            <author initials="J." surname="François" fullname="Jérôme François">
              <organization/>
            </author>
            <author initials="J.-N." surname="Colin" fullname="Jean-Noël Colin">
              <organization/>
            </author>
            <author initials="F." surname="Beck" fullname="Frédéric Beck">
              <organization/>
            </author>
            <date year="2019"/>
          </front>
          <annotation>IFIP/IEEE Symposium on Integrated Network and Service Management (IM)</annotation>
        </reference>
        <reference anchor="Sol20">
          <front>
            <title>A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks</title>
            <author initials="H. M." surname="Soliman" fullname="Hazem M. Soliman">
              <organization/>
            </author>
            <author initials="G." surname="Salmon" fullname="Geoff Salmon">
              <organization/>
            </author>
            <author initials="D." surname="Sovilij" fullname="Dusan Sovilij">
              <organization/>
            </author>
            <author initials="M." surname="Rao" fullname="Mohan Rao">
              <organization/>
            </author>
            <date year="2020"/>
          </front>
          <annotation>IEEE International Conference on Cloud Networking (CloudNet)</annotation>
        </reference>
        <reference anchor="Sco11">
          <front>
            <title>On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses</title>
            <author initials="S. E." surname="Coull" fullname="Scott E. Coull">
              <organization/>
            </author>
            <author initials="F." surname="Monrose" fullname="Fabian Monrose">
              <organization/>
            </author>
            <author initials="M." surname="Bailey" fullname="Michael Bailey">
              <organization/>
            </author>
            <date year="2011"/>
          </front>
          <annotation>NDSS</annotation>
        </reference>
        <reference anchor="Xie18">
          <front>
            <title>A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges</title>
            <author initials="J." surname="Xie" fullname="Junfeng Xie">
              <organization/>
            </author>
            <author initials="F. R." surname="Yu" fullname="F. Richard Yu">
              <organization/>
            </author>
            <author initials="T." surname="Huang" fullname="Tao Huang">
              <organization/>
            </author>
            <author initials="R." surname="Xie" fullname="Renchao Xie">
              <organization/>
            </author>
            <author initials="J." surname="Liu" fullname="Jiang Liu">
              <organization/>
            </author>
            <author initials="C." surname="Wang" fullname="Chenmeng Wang">
              <organization/>
            </author>
            <author initials="Y." surname="Liu" fullname="Yunjie Liu">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <annotation>IEEE Communications Surveys &amp; Tutorials</annotation>
        </reference>
        <reference anchor="Yu14">
          <front>
            <title>Distributed and collaborative traffic monitoring in software defined networks</title>
            <author initials="Y." surname="Yu" fullname="Ye Yu">
              <organization/>
            </author>
            <author initials="C." surname="Qian" fullname="Chen Qian">
              <organization/>
            </author>
            <author initials="X." surname="Li" fullname="Xin Li">
              <organization/>
            </author>
            <date year="2014"/>
          </front>
          <annotation>ACM Hot topics in software defined networking</annotation>
        </reference>
        <reference anchor="Dij19">
          <front>
            <title>A Survey of Network Traffic Anonymisation Techniques and Implementations</title>
            <author initials="N. V." surname="Dijkhuizen" fullname="Niels Van Dijkhuizen">
              <organization/>
            </author>
            <author initials="J. V. D." surname="Ham" fullname="Jeroen Van Der Ham">
              <organization/>
            </author>
            <author initials="X." surname="Li" fullname="Xin Li">
              <organization/>
            </author>
            <date year="2014"/>
          </front>
          <annotation>ACM Comput. Surv. 51, 3, Article 52</annotation>
        </reference>
        <reference anchor="Hui22">
          <front>
            <title>Knowledge Enhanced GAN for IoT Traffic Generation</title>
            <author initials="S." surname="Hui" fullname="Shuodi Hui">
              <organization/>
            </author>
            <author initials="H." surname="Wang" fullname="Huandong Wang">
              <organization/>
            </author>
            <author initials="Z." surname="Wang" fullname="Zhenhua Wang">
              <organization/>
            </author>
            <author initials="X." surname="Yang" fullname="Xinghao Yang">
              <organization/>
            </author>
            <author initials="Z." surname="Liu" fullname="Zhongjin Liu">
              <organization/>
            </author>
            <author initials="D." surname="Jin" fullname="Depeng Jin">
              <organization/>
            </author>
            <author initials="Y." surname="Li" fullname="Yong Li">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
          <annotation>ACM Web Conference 2022 (WWW)</annotation>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document is the result of a collective work. Authors of this document are the main contributors and the editors but contributions have been also received from the following people we acknowledge: Laurent Ciavaglia, Felipe Alencar Lopes, Abdelkader Lahamdi, Albert Cabellos, Jose Suarez-Varela, Marinos Charalambides, Ramin Sadre, Pedro Martinez-Julia and Flavio Esposito</t>
      <t>This document is also partially supported by project AI@EDGE, funded from the European Union's Horizon 2020 H2020-ICT-52 call for projects, under grant agreement no. 101015922.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
