| Internet-Draft | NKG Gateway | February 2026 |
| Cui | Expires 31 August 2026 | [Page] |
This document specifies an interaction gateway for Network Knowledge Graphs (NKG) to simplify graph-based operations. The gateway architecture defines a Unified Intent Gateway (UIG) that supports Natural Language (NL) and Domain-Specific Language (DSL) inputs. By utilizing LLM-based agents and rule engines, the UIG translates high-level intents into precise graph queries via an Intermediate Representation (IR). The gateway architecture incorporates multi-layer authentication and fine-grained access control to ensure secure and compliant network management.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 31 August 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Network Knowledge Graphs (NKG) provide a unified, associative, and semantic representation of network states and structures, supporting observability, automated operations, and intelligent management. In current operational scenarios, engineers primarily rely on structured query languages (e.g., Cypher or SPARQL) for interaction, which introduces the following challenges:¶
Therefore, a unified and secure interaction gateway tailored for network operations is urgently required.¶
The central challenge is the absence of an intelligent interface capable of automatically translating high-level human intents (NL) or declarative application directives (DSL) into deep queries, inferences, or operations against the NKG, while meeting the following requirements:¶
This gateway architecture adopts a three-layer architecture, with the Unified Intent Gateway (UIG) serving as the central mediator between upstream requests and downstream knowledge execution:¶
+-----------------------------------------------------------+
| Upstream: Input & Interaction Layer |
| (Users [NL], Applications [DSL]) |
+----------------------------^------------------------------+
|
(1) Intent Request | (4) Final Response
|
+----------------------------v------------------------------+
| Midstream: Unified Intent Gateway |
| [ Authorization | Resolution (IR) | Query | Synthesis ] |
+----------------------------^------------------------------+
|
(2) Cypher Query | (3) Structured Result
|
+----------------------------v------------------------------+
| Downstream: Data & Knowledge Layer |
| [ Authorization Check | Graph Engine | NKG Storage ] |
+-----------------------------------------------------------+
¶
Overall processing flow:¶
Upstream input (NL/DSL) -> UIG (authentication/authorization, parsing, Intermediate Representation (IR) construction, query/execution planning) -> NKG execution -> UIG response synthesis -> upstream response delivery.¶
The upstream layer accepts two categories of inputs:¶
SELECT_TRAFFIC(srcIP=10.0.0.1, window=5m).¶
Primary responsibilities of this layer include:¶
The UIG receives requests, performs authentication/authorization and intent resolution, normalizes requests into an IR, and generates graph query/operation statements (e.g., Cypher). After receiving results from the NKG, the UIG aggregates and formats the structured data and returns it to upstream consumers.¶
+-----------------------------------------------------------------------+ | Unified Intent Gateway (UIG) | | | | +---------------+ +-------------------+ +----------------+ | | | Ingress | | Intent Resolution | | Query Executor | | | | & |---->| (Agent / Parser) |----->| & | | | | Authorization | +---------+---------+ | Synthesizer | | | +---------------+ | +-------+--------+ | | | (IR Generation) | | | | | | | | +-----------------------+------------------------+ | | | | | +----------v----------+ | | | Audit Log | | | | (Policy & Action) | | | +---------------------+ | +-----------------------------------------------------------------------+¶
Defense-in-depth requirement: the underlying NKG/graph engine itself MUST provide built-in security capabilities. It MUST authenticate the UIG's Query Executor and authorize operations using fine-grained policies for node/subgraph access, so that the framework does not rely on the UIG as a single point of failure.¶
The UIG's main functions include:¶
Input parsing and intent recognition¶
Validation and policy enforcement¶
Statement generation and execution orchestration¶
Response synthesis¶
This layer consists of the NKG and the graph database/engine, and is responsible for executing graph queries/operations and returning structured results. It supports:¶
Security requirement: the NKG MUST authenticate querying entities and authorize access to nodes/edges/subgraphs using fine-grained access control (e.g., restricting sensitive subgraphs based on role). This provides a foundational security safeguard for the overall gateway architecture.¶
This section provides illustrative use cases demonstrating how the gateway architecture supports automated and controlled NKG interactions.¶
Scenario: A service reports abnormal response latency, and an operator suspects an HTTP Flood.¶
Input (NL): "Check whether there is an HTTP Flood attack affecting the target service."¶
Expected UIG behavior:¶
{intent: http_flood_investigation, window: 5m, target: service_X}).¶
Example query (Cypher):¶
MATCH (src:IP)-[r:SENDS_HTTP]->(dst:Server) WHERE r.request_rate > $threshold AND dst.port = 80 AND r.window = "5m" RETURN src, r.request_rate, dst ORDER BY r.request_rate DESC¶
Output:¶
Scenario: A network administrator dynamically maintains the NKG by creating, updating, or deleting graph nodes (e.g., device nodes, service nodes, or asset entries). All write operations MUST be strictly controlled by role-based authorization and fully audited.¶
Input (DSL examples):¶
UPSERT_NODE(type="Device", key="name", value="FW1", props={interface:"eth0", status:"active"})¶
DELETE_NODE(type="Device", key="name", value="FW1")¶
Expected UIG behavior:¶
{op: upsert_node, type: Device, match_key: name, match_value: FW1, props: {...}}).¶
Example operations (Cypher):¶
MERGE (n:Device {name:"FW1"})
SET n.interface="eth0",
n.status="active";
MATCH (n:Device {name:"FW1"})
DELETE n;
¶
Output:¶
This document describes an interaction gateway for a NKG mediated by a UIG. Implementations MUST consider the following:¶
This document has no IANA actions.¶