A general approach to network configuration verification

R Beckett, A Gupta, R Mahajan, D Walker - … of the Conference of the ACM …, 2017 - dl.acm.org
We present Minesweeper, a tool to verify that a network satisfies a wide range of intended
properties such as reachability or isolation among nodes, waypointing, black holes …

A general approach to network configuration analysis

A Fogel, S Fung, L Pedrosa… - … USENIX Symposium on …, 2015 - usenix.org
We present an approach to detect network configuration errors, which combines the benefits
of two prior approaches. Like prior techniques that analyze configuration files, our approach …

Providing public intradomain traffic matrices to the research community

S Uhlig, B Quoitin, J Lepropre, S Balon - ACM SIGCOMM Computer …, 2006 - dl.acm.org
This paper presents a new publicly available dataset from GÉANT, the European Research
and Educational Network. This dataset consists of traffic matrices built using full IGP routing …

Safely and automatically updating in-network acl configurations with intent language

B Tian, X Zhang, E Zhai, HH Liu, Q Ye… - Proceedings of the …, 2019 - dl.acm.org
In-network Access Control List (ACL) is an important technique in ensuring network-wide
connectivity and security. As cloud-scale WANs today constantly evolve in size and …

Tiramisu: Fast multilayer network verification

A Abhashkumar, A Gember-Jacobson… - 17th USENIX Symposium …, 2020 - usenix.org
Today's distributed network control planes are highly sophisticated, with multiple interacting
protocols operating at layers 2 and 3. The complexity makes network configurations highly …

Aquila: a practically usable verification system for production-scale programmable data planes

B Tian, J Gao, M Liu, E Zhai, Y Chen, Y Zhou… - Proceedings of the …, 2021 - dl.acm.org
This paper presents Aquila, the first practically usable verification system for Alibaba's
production-scale programmable data planes. Aquila addresses four challenges in building a …

Probabilistic verification of network configurations

S Steffen, T Gehr, P Tsankov, L Vanbever… - Proceedings of the …, 2020 - dl.acm.org
Not all important network properties need to be enforced all the time. Often, what matters
instead is the fraction of time/probability these properties hold. Computing the probability of …

Path splicing

M Motiwala, M Elmore, N Feamster… - Proceedings of the ACM …, 2008 - dl.acm.org
We present path splicing, a new routing primitive that allows network paths to be constructed
by combining multiple routing trees (" slices") to each destination over a single network …

Accuracy, scalability, coverage: A practical configuration verifier on a global wan

F Ye, D Yu, E Zhai, HH Liu, B Tian, Q Ye… - Proceedings of the …, 2020 - dl.acm.org
This paper presents Hoyan--the first reported large scale deployment of configuration
verification in a global-scale wide area network (WAN). Hoyan has been running in …

Differential network analysis

P Zhang, A Gember-Jacobson, Y Zuo… - … USENIX Symposium on …, 2022 - usenix.org
Networks are constantly changing. To avoid outages, operators need to know whether
prospective changes in a network's control plane will cause undesired changes in end-to …