Internet DRAFT - draft-kim-nmrg-nnmb5g
draft-kim-nmrg-nnmb5g
Network Management Research Group M-S. Kim
Internet-Draft M-S. Kim
Intended status: Informational SANGMYUNG UNIVERSITY
Expires: 28 April 2022 October 2021
SOAR(Security Orchestration Automation and Response)-based Native
Network Management to Optimize an Adaptive B5G Network
draft-kim-nmrg-nnmb5g-00
Abstract
This document is derived from the intelligent artificial intelligent
(AI) network and autonomous security, network management intend-based
technology to ensure constant security quality in B5G. SOAR
(Security Orchestration Automation and Response) is needed by
autonomous security and network management to optimize an adaptive
B5G network. The purpose of this document is to confirm whether the
requirements are reflected to future users and to develop and
identify user provided by useful decision how to develop the system.
This document also covers the user requirements for autonomous
security and intend-based network management to ensure constant
security quality on B5G.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 4 April 2022.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
Kim & Kim Expires 28 April 2022 [Page 1]
Internet-Draft draft-kim-nmrg-nnmb5g-00 October 2021
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Simplified BSD License text
as described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Background . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1. Autonomous Network . . . . . . . . . . . . . . . . . . . 2
2.2. NWDAF (Network Data Analytics Function) . . . . . . . . . 4
2.3. Management for other Standardization . . . . . . . . . . 4
3. B5G Native Network Management based on SOAR . . . . . . . . . 5
3.1. Purpose of B5G Native Network Management Framework . . . 5
3.2. Scope of B5G Native Network Management . . . . . . . . . 6
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
5. Security Considerations . . . . . . . . . . . . . . . . . . . 6
6. Informative References . . . . . . . . . . . . . . . . . . . 6
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8
1. Introduction
In order to respond to large-scale attacks on B5G communication
infrastructure based on hyper-performance, hyperspace, the advanced
security threats targeting new convergence services and intended
super-trust-based security technology. It can both ensure constant
security throughout on B5G infrastructure and relate the foundations
aim to acquire skills. For native network management to optimize an
adaptive B5G network based on SOAR, there are a lot of research
fields to secure intend-based super-trust security skills and the
related technology such as vulnerability analysis and security threat
modeling to provide super-reliable infrastructure for B5G network,
AI-based autonomous security and control framework to provide safe
new convergence services in B5G, B5G-based station security to ensure
availability of 3D mobile communication and quantum security
technologies (PQC, QKD) of conversion methodology for B5G encryption
system application.
2. Background
2.1. Autonomous Network
The autonomous network concept is defined differently depending on
the standardization organization, and these contents are as follows.
Kim & Kim Expires 28 April 2022 [Page 2]
Internet-Draft draft-kim-nmrg-nnmb5g-00 October 2021
3GPP: SON (Self Organizing Networks)
ETS/ITU-T/GSMA: Autonomous Network
ETSI: ZSM (Zero touch network and Service Management)
Hauwei: AND (Autonomous Driving Network)
Juniper: SDN (Self Driving Network)
Cisco: DNA (Digital(Data) Network Architecture)
Ericson: ZTN (Zero Touch Network)
Autonomous networks levels can also be divided into six different
levels.
Level 0 - Manual Network: The system is supported by monitoring
function to manually execute dynamic tasks (SNMP, CLI)
Level 1 - Assisted Network: The system executes specific and
repetitive subtasks that are preconfigured to increase execution
efficiency (Tack-Centric)
Level 2 - Partial Autonomous Network: The system enables closed-loop
O and M for specific devices based on AI models in specific external
environments (Node-Centric)
Level 3 - Conditional Autonomous network: L2-based system has
functions to detect real-time environment change, specific network
domain and intention device. Semi-closed loop management is possible
to optimize and adjust to the external environment (Service-Centric)
Level 4 - Highly autonomous Network: L3-based system has capabilities
of service- and customer-experience-centric in a more complex cross-
domain environment. It can analyze and make decisions based on
predictive or active closed-loop management of the network (User-
Centric)
Level 5 - Fully autonomous network: The system is a fully autonomous
network with multi-services, multi-domains and full lifecycle (Value-
Centric)
Kim & Kim Expires 28 April 2022 [Page 3]
Internet-Draft draft-kim-nmrg-nnmb5g-00 October 2021
2.2. NWDAF (Network Data Analytics Function)
NWDAF is one of the network functions located on the control plane in
the SBA structure of 5GC. It is based on 5G Core, MEC (Cloud) and
user equipment (UE) in edge networks. It is also used with data
collection and data analysis depending on application function (AF)
and Operations and Administration Maintenance (OAM). The purpose of
NWDAF is to simplify the complexity of interfacing with 5GC and 3rd
analytic solution providers. 5GC-related data in NWDAF is collected
with 5G network data and the data can be analyzed by machine learning
and statistical analysis. The analyzed result data is provided to
other 5G core network functions to optimize each network function and
to improve performance as its main function.
+----+
+NF-1+----------------+--------------------+ +----+
+----+ + NWDAF +-------------+NF-1+
+-------------+ +-----+ + + +----+
+ Untrusted AF+---+NEF-1+--+ +
+-------------+ +-----+ + +--------------+ + +-----+
+----------+ + +analytic Model+ +-------------+NEF-1+
+Trusted AF+---------------+ +(Static, + + +-----+
+----------+ + + algorithm)-3 + +
+-----+ + +--------------+ +-------------------+
+UDR-1+---------------+ +
+-----+ + + +-----+
+-----+ + +-------------+OAM-2+
+OAM-2+---------------+ + +-----+
+-----+ +--------------------+
----------------------------------------------------------------------------
.................................................
. 1: Core NF 2: Network Management .
. 3: Proprietary Function .
.................................................
Figure 1: NWDAF Architecture Overview
2.3. Management for other Standardization
NFV (Network Functions Virtualization) Management and NFVO (NFV
Orchestration): Identify network function (NF) lifecycle management
procedures in virtualized environments
OSM (Open Source MANO): E2E Network Service Orchestrator (NFV + Slice
+ Cross Domain)
Kim & Kim Expires 28 April 2022 [Page 4]
Internet-Draft draft-kim-nmrg-nnmb5g-00 October 2021
MEC (Multi access Edge Computing) Management, F5G (Fifth Generation
Fixed Network)
ENI (Experiential Networked Intelligence):
(a)Cognitive Netwok Management architecture using AI and Context
aware Polices
(b)Method to add intelligence to legacy systems
(c)Method between API Broker layer and Legacy System (OSS/BSS, NF,
User, etc. and ENI system)
ZSM (Zero Touch Network and Service Management):
(a)Fully Autonomous Management and Operations Framework level
(b)Management Services of Domain, Unified Fabric and Cross Domain
(c)Closed Loop Control Acquisition, Analysis, Determination and
Execution Method Actions
(D)Domain level Management, Cross Domain Level Management, Business
Service Level Management
This document present to aim B5G-based autonomous security and intend
framework based on the constant security quality guarantee to provide
the super-trusted infrastructure of the new convergent network
security service without cyber threats
3. B5G Native Network Management based on SOAR
3.1. Purpose of B5G Native Network Management Framework
It is necessary to verify native security element skill to analyze
the detailed functions such as B5G wireless access, D2D and
infrastructure virtualization. It is also needed to analyze B5G
global network security-based intelligence and internalization
technology, security vulnerability in flying base station and quantum
security for security application system. We also propose of design
of B5G native network management and requirement for B5G wireless
access/D2D/infrastructure virtualization attack model, AI-based B5G
autonomous security control of security native intelligence,
networking security and intrusion detection in flying base station
and quantum security for application of B5G security system. In
addition, security native modeling and verification are also
necessary in B5G native network management framework. [TM-
Forum][ITU-T:Y.3172][ITU-T:Y.3173][ITU-T:Y.3174][ITU-T:Y.3176][FG-
Kim & Kim Expires 28 April 2022 [Page 5]
Internet-Draft draft-kim-nmrg-nnmb5g-00 October 2021
ML5G:spec1] [FG-ML5G:spec2][FG-ML5G:spec3][FG-
ML5G:spec4][Y.ML:IMT2020-RAFR][TS23.288] [TR23.791][TR28.809][TR28.81
0][TR28.100][TR28.812][TR28.312][TR28.805]
[TR28.535][TR28.536][TR28.861][TR28.313]
3.2. Scope of B5G Native Network Management
Above all, the first scope is to analyze of B5G wireless access/D2D/
infrastructure virtualization elements and to define security
requirements such as B5G wireless access, Ultra-high-density of B5G
D2D and infrastructure virtualization. In next scope, there are B5G
wireless access/D2D/infrastructure virtualization attack model
development and threat analysis, design of AI-based B5G autonomous
security control and security intelligence internalization concept.
It is also necessary to design networking security, intrusion
detection element technology in flying base station and design of
quantum security technology for B5G security application.
Verification of the contents in advance is also additionally required
with the following scope.
4. IANA Considerations
There are no IANA considerations related to this document.
5. Security Considerations
[TBD]
6. Informative References
[TM-Forum] "Aaron Richard Earl Boasman-Patel, Autonomous Networks:
Empowering Digital Transformation for The Telecoms
Industry", 2019.
[ITU-T_Y.3172]
"Architectural framework for machine learning in future
networks including IMT-2020", 2020.
[ITU-T_Y.3173]
"Framework for evaluating intelligence level of future
networks including IMT-2020", 2020.
[ITU-T_Y.3174]
"Framework for data handling to enable machine learning in
future networks including IMT-2020", 2020.
Kim & Kim Expires 28 April 2022 [Page 6]
Internet-Draft draft-kim-nmrg-nnmb5g-00 October 2021
[ITU-T_Y.3176]
"Machine learning marketplace integration in future
networks including IMT-2020", 2020.
[FG-ML5G_spec1]
"Requirements, architecture and design for machine
learning function orchestrator", 2020.
[FG-ML5G_spec2]
"Machine Learning Sandbox for future networks including
IMT-2020 requirements and architecture framework", 2020.
[FG-ML5G_spec3]
"Machine learning based end to end network slice
management and orchestration", November 2020.
[FG-ML5G_spec4]
"Vertical assisted Network Slicing Based on a Cognitive
Framework", 2020.
[Y.ML_IMT2020-RAFR]
"Architecture framework for AI based network automation of
resource adaptation and failure recovery for future
networks including IMT 2020", 2020.
[TS23.288] "Architecture enhancements for 5G System to support
network data analytics services", 2021.
[TR23.791] "Study of Enablers for Network Automation for 5G", 2021.
[TR28.809] "Study on enhancement of Management Data Analytics (MDA)",
2021.
[TR28.810] "Study on concept, requirements and solutions for levels
of autonomous network", 2021.
[TR28.100] "Management and orchestration; Levels of autonomous
network", 2021.
[TR28.812] "Telecommunication management; Study on scenarios for
Intent driven management services for mobile networks",
2021.
[TR28.312] "Intent driven management services for mobile networks",
2021.
[TR28.805] "Telecommunication management; Study on management aspects
of communication services", 2021.
Kim & Kim Expires 28 April 2022 [Page 7]
Internet-Draft draft-kim-nmrg-nnmb5g-00 October 2021
[TR28.535] "Management and orchestration; Management services for
communication service assurance; Requirements", 2021.
[TR28.536] "Management and orchestration; Management services for
communication service assurance; Stage 2 and Stage 3",
2021.
[TR28.861] "Study on the Self Organizing Networks (SON) for 5G
networks", 2021.
[TR28.313] "Self-Organizing Networks (SON) for 5G networks", 2021.
Authors' Addresses
Hwan-kuk Kim
SANGMYUNG UNIVERSITY
31, Sangmyeongdae-gil, Dongnam-gu
Cheonan
Phone: +82 41 550 5101
Email: rinyfeel@smu.ac.kr
Min-Suk Kim
SANGMYUNG UNIVERSITY
31, Sangmyeongdae-gil, Dongnam-gu
Cheonan
Phone: +82 41 550 5113
Email: minsuk.kim@smu.ac.kr
Kim & Kim Expires 28 April 2022 [Page 8]