Conflict classification and analysis of distributed firewall policies
E Al-Shaer, H Hamed, R Boutaba… - IEEE journal on …, 2005 - ieeexplore.ieee.org
Firewalls are core elements in network security. However, managing firewall rules,
particularly, in multifirewall enterprise networks, has become a complex and error-prone …
particularly, in multifirewall enterprise networks, has become a complex and error-prone …
Graphical models for inference with missing data
We address the problem of deciding whether there exists a consistent estimator of a given
relation Q, when data are missing not at random. We employ a formal representation …
relation Q, when data are missing not at random. We employ a formal representation …
Network tomography of binary network performance characteristics
N Duffield - IEEE Transactions on Information Theory, 2006 - ieeexplore.ieee.org
In network performance tomography, characteristics of the network interior, such as link loss
and packet latency, are inferred from correlated end-to-end measurements. Most work to …
and packet latency, are inferred from correlated end-to-end measurements. Most work to …
Robust monitoring of link delays and faults in IP networks
Y Bejerano, R Rastogi - … -second Annual Joint Conference of the …, 2003 - ieeexplore.ieee.org
In this paper, we develop failure-resilient techniques for monitoring link delays and faults in
a service provider or enterprise IP network. Our two-phased approach attempts to minimize …
a service provider or enterprise IP network. Our two-phased approach attempts to minimize …
An algebraic approach to practical and scalable overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover
from path outages and periods of degraded performance within seconds. For an overlay …
from path outages and periods of degraded performance within seconds. For an overlay …
An empirical evaluation of wide-area internet bottlenecks
Conventional wisdom has been that the performance limitations in the current Internet lie at
the edges of the network--ie last mile connectivity to users, or access links of stub ASes. As …
the edges of the network--ie last mile connectivity to users, or access links of stub ASes. As …
[PDF][PDF] Reverse traceroute.
Traceroute is the most widely used Internet diagnostic tool today. Network operators use it to
help identify routing failures, poor performance, and router misconfigurations. Researchers …
help identify routing failures, poor performance, and router misconfigurations. Researchers …
{SIMON}: A simple and scalable method for sensing, inference and measurement in data center networks
Network measurement and monitoring have been key to understanding the inner workings
of computer networks and debugging the performance problems of distributed applications …
of computer networks and debugging the performance problems of distributed applications …
Compressive sensing over graphs
In this paper, motivated by network inference and tomography applications, we study the
problem of compressive sensing for sparse signal vectors over graphs. In particular, we are …
problem of compressive sensing for sparse signal vectors over graphs. In particular, we are …
Network tomography: Identifiability and fourier domain estimation
The statistical problem for network tomography is to infer the distribution of X, with mutually
independent components, from a measurement model Y= AX, where A is a given binary …
independent components, from a measurement model Y= AX, where A is a given binary …