SlideShare a Scribd company logo
Semantic Metadata Annotation for Network Anomaly Detection
draft-netana-opsawg-nmrg-network-anomaly-semantics-01
Helps to test, validate and compare outlier detection, supports
supervised and semi-supervised machine learning development,
enables data exchange among network operators, vendors and academia,
and make anomalies for humans apprehensible
1
thomas.graf@swisscom.com
wanting.du@swisscom.com
alex.huang-feng@insa-lyon.fr
vincenzo.riccobene@huawei-partners.com
antonio.roberto@huawei.com
04. November 2023
« Network operators connect
customers in routing tables
called VPN's »
2
Packet
Segment
Routing
Connection Point
Connection Point
Logical
Connection
IPFIX
YANG Push
BMP
IPFIX
YANG Push
BMP
IPFIX
YANG Push
BMP
Extended
Community:
RT:60633:1100001064
Standard
Community:
64497:798
Prefixes:
64499:123:172.16.31.0/24,
64499:456:100.67.1.0/24
VRF Name: ABC
Route Distinguisher: 0:64499:1
Standard Community: 64499:123
Prefixes: 172.16.31.0/24
VRF Name: DEF
Route Distinguisher: 0:64499:2
Standard Community: 64499:456
Prefixes: 100.67.1.0/24
IPv4/6 Source: 172.16.31.1
Port Source: 23456
IP Protocol: TCP
IP Type of Service: 192
IPv4/6 Destination: 100.67.1.2
Port Destination: 443
Ingress Logical Interface ID: 32
Ingress Physical Interface ID: 21
Ingress VRF ID: 0x100
Egress Logical Interface ID: 11
Egress Physical Interface ID: 43
Egress VRF ID: 0x16
Forwarding Status: FWD Unkown
What to monitor
Which operational metrics are collected
Forwarding Plane
Data Models
How customers are
using our network
and services. Active
and passive delay
measurement
Control Plane
Data Models
How networks are
provisioned and
redundancy adjusts to
topology
Management Plane
Data Models
How logical and
physical network
devices are connected
with each other and
carry load
Network Connectivity Service
Service Models
Translates between what customers wishes and intend which should be fulfilled
« Network Telemetry
(RFC 9232) describes how to collect data
from all 3 network planes efficiently »
« Customers are always
connected, when VPN's
changing, regardless due to
operational or
configurational reasons,
network operators are late
to react due to missing
visibility and automation »
3
Why to automate monitoring
Recognize network incidents faster than humans can
4
Network Data
Collection
Network
Device Trend
Detection
Verify,
Troubleshoot
and Notify
Closed Loop
Operation
Network
Anomaly
Detection
Network
Visualization
Network
SLI and SLO
Service
Owner
Platform
Owner
Operation Data Products
Governed by Network Telemetry RFC 9232
Analytical Data Products
Governed by Network Operator
Data Product
Owner
Data Product
Owner
How to organize and collaborate with data
The Data Mesh Architecture enables Network Analytics use
5
NetworkAnomaly
Detection
For VPNs, Network Anomaly Detection constantly
monitors and detects any network or device topology
changes, along with their associated forwarding
consequences for customers as outliers. Notifications
are sent to the Network Operation Center before the
customer is aware of service disruptions. It offers
operational metrics for in-depth analysis, allowing to
understand on which platform the problem originates
and facilitates problem resolution.
Answers
What changed and when, on which
connectivity service, and how does it impact
the customers?
Focuses
Provides meaningful connectivity service
impact information before customer is aware
of and support in root-cause analysis.
Data Mesh
Consumes operational real-time Forwarding
Plane, Control Plane and Management Plane
metrics and produces analytical alerts.
Direction
From connectivity service to network platform.
What does Network Anomaly Detection mean
Monitor changes
6
« A more detailing paper
will be submitted soon to
IEEE Transactions on
Network and Service
Management»
Presented in ANRW 2023
At IETF 117 San Francisco
7
From network incidents postmortems we network operators
learn and improve so does network anomaly detection and
supervised and semi-supervised machine learning.
The more network incidents are observed, the more we can
improve. With more incidents the postmortem process
needs be automated, let's get organized first by defining
human and machine-readable metadata semantics and
annotate operational and analytical data.
Let's get further organized by exchanging standardized
labeled network incident data among network operators,
vendors and academia to collaborate on academic research.
« The community working
on Network Anomaly
Detection is probably the
only group wishing for
more network incidents »
What our motivation is
Automate learn and improve
8
Action: Which action the network node performed for a
packet in the forwarding plane, a path or adjacency in the
control plane or state or statistical changes in the
management plane.
Reason: For each reason one or more actions describing why
this action was used. From drop unreachable, administered,
and corrupt in forwarding plane, to reachability withdraw and
adjacency teared down in control plane, to Interface down,
errors or discard in management plane.
Cause: For each reason one or more causes describes why
the action was chosen. From missing next-hop and link-layer
information in forwarding plane, to reachability withdrawn
due to peer down or path no longer redistributed.
« Symptoms are
categorized in which plane
they have been observed,
their action, reason and
cause »
What is a symptom and how to categorize them
From action to reason to cause
9
Network Operators: Do you agree that today’s actions; traffic is dropped, path is withdrawn
and interface down, are always exposed through Network Telemetry. But reasons and
causes, dropped due to unreachable next-hop, withdrawn due to peer down, interface
down due to missing signal, are rarely exposed to telemetry would be most interesting?
Network Vendors: Is the assumption correct that a when network service process, routing
process and withdrawing a path occur, most of the time the vendor knows why it acts that
way, and could potential make this reason and cause information available?
Academia: Would it help if network operators would provide well defined labeled
operational and analytical data to enable and validate their research?
Everybody: Should these symptoms be clearly described and standardized for a common
terminology so that operators, researchers and anomaly detection systems alike understand
their meaning and learn and act accordingly?
Questions to the audience
Do you care?
10
Global outliers: An outlier is considered "global" if its
behavior is outside the entirety of the considered data set.
Contextual outliers: An outlier is considered "contextual" if
its behavior is within a normal (expected) range, but it would
not be expected based on some context. Context can be
defined as a function of multiple parameters, such as time,
location, etc.
Collective outliers: An outlier is considered "collective" if the
behavior of each single data point that are part of the
anomaly are within expected ranges (so they are not
anomalous, it’s either a contextual or a global sense), but the
group taking all the data points together, is.
« Collective outliers are
important because
networks are connected.
Through different planes
interconnected symptoms
from various angles can be
observed »
Outliers in Anomaly Detection
From global to contextual to collective
• Symptoms describe what changed in the
network for what reason and cause with
which concern score from when to when.
• Tags describes in which network plane, which
action, reason and cause was observed.
• Pattern describes the measurement pattern
over time of the time series data.
• Source describes which system observed the
outlier. A human or a network anomaly
detection system.
11
Annotate Operation Data
YANG Module
module: ietf-symptom-semantic-metadata
+--rw symptom
+--rw id yang:uuid
+--rw event-id yang:uuid
+--rw description string
+--rw start-timeyang:date-and-time
+--rw end-time yang:date-and-time
+--rw confidence-score float
+--rw concern-score? float
+--rw tags* [key]
| +--rw key string
| +--rw value string
+--rw (pattern)?
| +--:(drop)
| | +--rw dropempty
| +--:(spike)
| | +--rw spike empty
| +--:(mean-shift)
| | +--rw mean-shift empty
| +--:(seasonality-shift)
| | +--rw seasonality-shift empty
| +--:(trend)
| | +--rw trend empty
| +--:(other)
| +--rw other string
+--rw source
+--rw (source-type)
| +--:(human)
| | +--rw human empty
| +--:(algorithm)
| +--rw algorithm empty
+--rw name? string
module: ietf-incident-semantic-metadata
+--rw incident
+--rw id yang:uuid
+--rw description string
+--rw start-time yang:date-and-time
+--rw end-time yang:date-and-time
+--rw symptoms* []
| +--rw symptom
| +--rw id yang:uuid
| +--rw event-id yang:uuid
<snip>
+--rw source
+--rw (type)
| +--:(human)
| | +--rw human empty
| +--:(algorithm)
| +--rw algorithm empty
+--rw name? string
12
Annotate Analytical Data
YANG Module
• Incidents has a unique ID and description with
a start and end time and a concern score.
• Symptoms describe what changed in the
network for what reason and cause with
which concern score from when to when.
• Source describes which system reported the
outlier. A human or a network anomaly
detection system.
13
IETF 118 Hackathon – Antagonist
Labelling a Symptom in Grafana
(1) Vertical dotted
lines are the
tagged
symptoms.
(2) Once the
symptom is
selected, the
user can add all
the details.
Once the symptom
is defined it gets
submitted to
Antagonist.
1
2
14
IETF 118 Hackathon - Antagonist
Workflow
Antagonist
(Anomaly tagging on historical data)
https://github.com/vriccobene/antagonist
Incidents
&
Symptoms
REST
Telemetry Data is
stored
Symptom and
Incident Data is
visually annotated
2
Symptoms and
Incidents are
processed
3
Ground Truth is
exposed through
the YANG format
4
REST
Semantic Metadata Annotation for Network Anomaly Detection
Next steps
• This work relates to the data topic, specifically semantics and ontology for
network management related artificial intelligence and machine learning
previously discussed in NMRG meetings.
• Do you realize the benefit of having standardized semantic metadata
annotation for Network Anomaly Detection and how it helps network
operators, vendor and academia to collaborate?
• -> What are your thoughts and comments?
• This document looks for a community and working group who have interest
in Network Anomaly Detection, bridging network and data engineering,
operator, vendors and academia, by writing the semantics and ontology of
network symptoms for operational and analytical data.
• This work will unveil what is missing in Network Telemetry data and provide
input for other documents to enable a more detailed and holistic view from
networks.
thomas.graf@swisscom.com
wanting.du@swisscom.com
alex.huang-feng@insa-lyon.fr
vincenzo.riccobene@huawei-partners.com
antonio.roberto@huawei.com
04. November 2023
Transforms
semantic referance
Publishes and subscribes
with semantic reference
Apache Kafka
Message Broker
Timeseries DB
YANG push
receiver
YANG push
publisher
Consolidates
Messages
Transforms semantics
in ingestion specifications
Network Analytics
Uses network semantics
to visualize and validate
15

More Related Content

PDF
Network Traffic Anomaly Detection Through Bayes Net
PPTX
Anomaly Detection in Network Traffic using Machine Learning.pptx
PPTX
From ensembles to computer networks
PPTX
A time series of networks. Is everything OK? Are there anomalies?
PDF
Procuring the Anomaly Packets and Accountability Detection in the Network
PPTX
Anomaly detection final
PPTX
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
PDF
slides-117-anrw-sessb-daisy-practical-anomaly-detection-in-large-bgpmpls-and-...
Network Traffic Anomaly Detection Through Bayes Net
Anomaly Detection in Network Traffic using Machine Learning.pptx
From ensembles to computer networks
A time series of networks. Is everything OK? Are there anomalies?
Procuring the Anomaly Packets and Accountability Detection in the Network
Anomaly detection final
Anomaly Detection and Spark Implementation - Meetup Presentation.pptx
slides-117-anrw-sessb-daisy-practical-anomaly-detection-in-large-bgpmpls-and-...

Similar to Semantic Metadata Annotation for Network Anomaly Detection (20)

PDF
Network Anomaly Detection Using Autonomous System Flow Aggregates
PPTX
Anomaly detection
PDF
POSTER_Ewonye.pdf
PPTX
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
PDF
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
PPT
Network Security Data Visualization
PDF
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
PDF
An Introduction to Anomaly Detection
PDF
Detecting Hacks: Anomaly Detection on Networking Data
PPTX
Detecting Hacks: Anomaly Detection on Networking Data
PDF
Term_Paper_Shengzhe_Wang
PDF
VictoriaMetrics December 2023 Meetup: Anomaly Detection
PDF
PDF
RS Barga STRATA'18 New York City
PDF
Anomaly detection (Unsupervised Learning) in Machine Learning
PDF
AI in anomaly detection - An Overview.pdf
PDF
M41028892
PPTX
Looking out for anomalies
PDF
AI in anomaly detection.pdf
PPTX
Applicability of Machine learning in computer networks
Network Anomaly Detection Using Autonomous System Flow Aggregates
Anomaly detection
POSTER_Ewonye.pdf
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Network Security Data Visualization
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprint
An Introduction to Anomaly Detection
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
Term_Paper_Shengzhe_Wang
VictoriaMetrics December 2023 Meetup: Anomaly Detection
RS Barga STRATA'18 New York City
Anomaly detection (Unsupervised Learning) in Machine Learning
AI in anomaly detection - An Overview.pdf
M41028892
Looking out for anomalies
AI in anomaly detection.pdf
Applicability of Machine learning in computer networks
Ad

More from ThomasGraf42 (20)

PDF
BMP Peer Up Message Namespace
PDF
YANG push Integration into Apache Kafka
PDF
Support of Hostname and Sequencing in YANG Notifications
PDF
UDP-based Transport for Configured Subscriptions
PDF
Subscription to Distributed Notifications
PDF
YANG Grouping for UDP Clients and UDP Servers
PDF
YANG model for NETCONF Event Notifications
PDF
slides-117-nmrg-sessb-data-management-paradigms-data-fabric-and-data-mesh-00.pdf
PDF
slides-117-opsawg-modeling-the-digital-map-based-on-rfc8345-sharing-experienc...
PDF
slides-117-opsawg-a-data-manifest-for-contextualized-telemetry-data-00.pdf
PDF
slides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdf
PDF
slides-117-grow-draft-francios-grow-bmp-loc-peer-00.pdf
PDF
slides-117-grow-bmp-peer-up-message-namespace-00.pdf
PDF
ietf117-netconf-yang-push-data-mesh-integration.pdf
PDF
BMP YANG Module
PDF
BMP Extension for Path Status TLV
PDF
TLV support for BMP Route Monitoring and Peer Down Messages
PDF
BMP Loc-RIB: Peer address
PDF
UDP-based Transport for Configured Subscriptions
PDF
On-Path delay in Postcard-mode In Situ OAM
BMP Peer Up Message Namespace
YANG push Integration into Apache Kafka
Support of Hostname and Sequencing in YANG Notifications
UDP-based Transport for Configured Subscriptions
Subscription to Distributed Notifications
YANG Grouping for UDP Clients and UDP Servers
YANG model for NETCONF Event Notifications
slides-117-nmrg-sessb-data-management-paradigms-data-fabric-and-data-mesh-00.pdf
slides-117-opsawg-modeling-the-digital-map-based-on-rfc8345-sharing-experienc...
slides-117-opsawg-a-data-manifest-for-contextualized-telemetry-data-00.pdf
slides-117-grow-grow-bmp-enhancements-to-frrouting-00.pdf
slides-117-grow-draft-francios-grow-bmp-loc-peer-00.pdf
slides-117-grow-bmp-peer-up-message-namespace-00.pdf
ietf117-netconf-yang-push-data-mesh-integration.pdf
BMP YANG Module
BMP Extension for Path Status TLV
TLV support for BMP Route Monitoring and Peer Down Messages
BMP Loc-RIB: Peer address
UDP-based Transport for Configured Subscriptions
On-Path delay in Postcard-mode In Situ OAM
Ad

Recently uploaded (20)

PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Introduction to the IoT system, how the IoT system works
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
artificial intelligence overview of it and more
DOCX
Unit-3 cyber security network security of internet system
PPTX
Introduction to Information and Communication Technology
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
Internet___Basics___Styled_ presentation
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
Exploring VPS Hosting Trends for SMBs in 2025
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Power Point - Lesson 3_2.pptx grad school presentation
Introduction to the IoT system, how the IoT system works
E -tech empowerment technologies PowerPoint
Slides PPTX World Game (s) Eco Economic Epochs.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
INTERNET------BASICS-------UPDATED PPT PRESENTATION
artificial intelligence overview of it and more
Unit-3 cyber security network security of internet system
Introduction to Information and Communication Technology
presentation_pfe-universite-molay-seltan.pptx
Job_Card_System_Styled_lorem_ipsum_.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Internet___Basics___Styled_ presentation
artificialintelligenceai1-copy-210604123353.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt

Semantic Metadata Annotation for Network Anomaly Detection

  • 1. Semantic Metadata Annotation for Network Anomaly Detection draft-netana-opsawg-nmrg-network-anomaly-semantics-01 Helps to test, validate and compare outlier detection, supports supervised and semi-supervised machine learning development, enables data exchange among network operators, vendors and academia, and make anomalies for humans apprehensible 1 thomas.graf@swisscom.com wanting.du@swisscom.com alex.huang-feng@insa-lyon.fr vincenzo.riccobene@huawei-partners.com antonio.roberto@huawei.com 04. November 2023
  • 2. « Network operators connect customers in routing tables called VPN's » 2 Packet Segment Routing Connection Point Connection Point Logical Connection IPFIX YANG Push BMP IPFIX YANG Push BMP IPFIX YANG Push BMP Extended Community: RT:60633:1100001064 Standard Community: 64497:798 Prefixes: 64499:123:172.16.31.0/24, 64499:456:100.67.1.0/24 VRF Name: ABC Route Distinguisher: 0:64499:1 Standard Community: 64499:123 Prefixes: 172.16.31.0/24 VRF Name: DEF Route Distinguisher: 0:64499:2 Standard Community: 64499:456 Prefixes: 100.67.1.0/24 IPv4/6 Source: 172.16.31.1 Port Source: 23456 IP Protocol: TCP IP Type of Service: 192 IPv4/6 Destination: 100.67.1.2 Port Destination: 443 Ingress Logical Interface ID: 32 Ingress Physical Interface ID: 21 Ingress VRF ID: 0x100 Egress Logical Interface ID: 11 Egress Physical Interface ID: 43 Egress VRF ID: 0x16 Forwarding Status: FWD Unkown What to monitor Which operational metrics are collected Forwarding Plane Data Models How customers are using our network and services. Active and passive delay measurement Control Plane Data Models How networks are provisioned and redundancy adjusts to topology Management Plane Data Models How logical and physical network devices are connected with each other and carry load Network Connectivity Service Service Models Translates between what customers wishes and intend which should be fulfilled « Network Telemetry (RFC 9232) describes how to collect data from all 3 network planes efficiently »
  • 3. « Customers are always connected, when VPN's changing, regardless due to operational or configurational reasons, network operators are late to react due to missing visibility and automation » 3 Why to automate monitoring Recognize network incidents faster than humans can
  • 4. 4 Network Data Collection Network Device Trend Detection Verify, Troubleshoot and Notify Closed Loop Operation Network Anomaly Detection Network Visualization Network SLI and SLO Service Owner Platform Owner Operation Data Products Governed by Network Telemetry RFC 9232 Analytical Data Products Governed by Network Operator Data Product Owner Data Product Owner How to organize and collaborate with data The Data Mesh Architecture enables Network Analytics use
  • 5. 5 NetworkAnomaly Detection For VPNs, Network Anomaly Detection constantly monitors and detects any network or device topology changes, along with their associated forwarding consequences for customers as outliers. Notifications are sent to the Network Operation Center before the customer is aware of service disruptions. It offers operational metrics for in-depth analysis, allowing to understand on which platform the problem originates and facilitates problem resolution. Answers What changed and when, on which connectivity service, and how does it impact the customers? Focuses Provides meaningful connectivity service impact information before customer is aware of and support in root-cause analysis. Data Mesh Consumes operational real-time Forwarding Plane, Control Plane and Management Plane metrics and produces analytical alerts. Direction From connectivity service to network platform. What does Network Anomaly Detection mean Monitor changes
  • 6. 6 « A more detailing paper will be submitted soon to IEEE Transactions on Network and Service Management» Presented in ANRW 2023 At IETF 117 San Francisco
  • 7. 7 From network incidents postmortems we network operators learn and improve so does network anomaly detection and supervised and semi-supervised machine learning. The more network incidents are observed, the more we can improve. With more incidents the postmortem process needs be automated, let's get organized first by defining human and machine-readable metadata semantics and annotate operational and analytical data. Let's get further organized by exchanging standardized labeled network incident data among network operators, vendors and academia to collaborate on academic research. « The community working on Network Anomaly Detection is probably the only group wishing for more network incidents » What our motivation is Automate learn and improve
  • 8. 8 Action: Which action the network node performed for a packet in the forwarding plane, a path or adjacency in the control plane or state or statistical changes in the management plane. Reason: For each reason one or more actions describing why this action was used. From drop unreachable, administered, and corrupt in forwarding plane, to reachability withdraw and adjacency teared down in control plane, to Interface down, errors or discard in management plane. Cause: For each reason one or more causes describes why the action was chosen. From missing next-hop and link-layer information in forwarding plane, to reachability withdrawn due to peer down or path no longer redistributed. « Symptoms are categorized in which plane they have been observed, their action, reason and cause » What is a symptom and how to categorize them From action to reason to cause
  • 9. 9 Network Operators: Do you agree that today’s actions; traffic is dropped, path is withdrawn and interface down, are always exposed through Network Telemetry. But reasons and causes, dropped due to unreachable next-hop, withdrawn due to peer down, interface down due to missing signal, are rarely exposed to telemetry would be most interesting? Network Vendors: Is the assumption correct that a when network service process, routing process and withdrawing a path occur, most of the time the vendor knows why it acts that way, and could potential make this reason and cause information available? Academia: Would it help if network operators would provide well defined labeled operational and analytical data to enable and validate their research? Everybody: Should these symptoms be clearly described and standardized for a common terminology so that operators, researchers and anomaly detection systems alike understand their meaning and learn and act accordingly? Questions to the audience Do you care?
  • 10. 10 Global outliers: An outlier is considered "global" if its behavior is outside the entirety of the considered data set. Contextual outliers: An outlier is considered "contextual" if its behavior is within a normal (expected) range, but it would not be expected based on some context. Context can be defined as a function of multiple parameters, such as time, location, etc. Collective outliers: An outlier is considered "collective" if the behavior of each single data point that are part of the anomaly are within expected ranges (so they are not anomalous, it’s either a contextual or a global sense), but the group taking all the data points together, is. « Collective outliers are important because networks are connected. Through different planes interconnected symptoms from various angles can be observed » Outliers in Anomaly Detection From global to contextual to collective
  • 11. • Symptoms describe what changed in the network for what reason and cause with which concern score from when to when. • Tags describes in which network plane, which action, reason and cause was observed. • Pattern describes the measurement pattern over time of the time series data. • Source describes which system observed the outlier. A human or a network anomaly detection system. 11 Annotate Operation Data YANG Module module: ietf-symptom-semantic-metadata +--rw symptom +--rw id yang:uuid +--rw event-id yang:uuid +--rw description string +--rw start-timeyang:date-and-time +--rw end-time yang:date-and-time +--rw confidence-score float +--rw concern-score? float +--rw tags* [key] | +--rw key string | +--rw value string +--rw (pattern)? | +--:(drop) | | +--rw dropempty | +--:(spike) | | +--rw spike empty | +--:(mean-shift) | | +--rw mean-shift empty | +--:(seasonality-shift) | | +--rw seasonality-shift empty | +--:(trend) | | +--rw trend empty | +--:(other) | +--rw other string +--rw source +--rw (source-type) | +--:(human) | | +--rw human empty | +--:(algorithm) | +--rw algorithm empty +--rw name? string
  • 12. module: ietf-incident-semantic-metadata +--rw incident +--rw id yang:uuid +--rw description string +--rw start-time yang:date-and-time +--rw end-time yang:date-and-time +--rw symptoms* [] | +--rw symptom | +--rw id yang:uuid | +--rw event-id yang:uuid <snip> +--rw source +--rw (type) | +--:(human) | | +--rw human empty | +--:(algorithm) | +--rw algorithm empty +--rw name? string 12 Annotate Analytical Data YANG Module • Incidents has a unique ID and description with a start and end time and a concern score. • Symptoms describe what changed in the network for what reason and cause with which concern score from when to when. • Source describes which system reported the outlier. A human or a network anomaly detection system.
  • 13. 13 IETF 118 Hackathon – Antagonist Labelling a Symptom in Grafana (1) Vertical dotted lines are the tagged symptoms. (2) Once the symptom is selected, the user can add all the details. Once the symptom is defined it gets submitted to Antagonist. 1 2
  • 14. 14 IETF 118 Hackathon - Antagonist Workflow Antagonist (Anomaly tagging on historical data) https://github.com/vriccobene/antagonist Incidents & Symptoms REST Telemetry Data is stored Symptom and Incident Data is visually annotated 2 Symptoms and Incidents are processed 3 Ground Truth is exposed through the YANG format 4 REST
  • 15. Semantic Metadata Annotation for Network Anomaly Detection Next steps • This work relates to the data topic, specifically semantics and ontology for network management related artificial intelligence and machine learning previously discussed in NMRG meetings. • Do you realize the benefit of having standardized semantic metadata annotation for Network Anomaly Detection and how it helps network operators, vendor and academia to collaborate? • -> What are your thoughts and comments? • This document looks for a community and working group who have interest in Network Anomaly Detection, bridging network and data engineering, operator, vendors and academia, by writing the semantics and ontology of network symptoms for operational and analytical data. • This work will unveil what is missing in Network Telemetry data and provide input for other documents to enable a more detailed and holistic view from networks. thomas.graf@swisscom.com wanting.du@swisscom.com alex.huang-feng@insa-lyon.fr vincenzo.riccobene@huawei-partners.com antonio.roberto@huawei.com 04. November 2023 Transforms semantic referance Publishes and subscribes with semantic reference Apache Kafka Message Broker Timeseries DB YANG push receiver YANG push publisher Consolidates Messages Transforms semantics in ingestion specifications Network Analytics Uses network semantics to visualize and validate 15