Minerals: using data mining to detect router misconfigurations
Proceedings of the 2006 SIGCOMM workshop on Mining network data
Introduction to Automata Theory, Languages, and Computation (3rd Edition)
Introduction to Automata Theory, Languages, and Computation (3rd Edition)
Detecting BGP configuration faults with static analysis
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Configuration management at massive scale: system design and experience
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Automated provisioning of BGP customers
IEEE Network: The Magazine of Global Internetworking
Shadow configuration as a network management primitive
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Extracting Network-Wide Correlated Changes from Longitudinal Configuration Data
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
Unraveling the complexity of network management
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
DECOR: DEClaritive network management and OpeRation
Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow
PACMAN: a platform for automated and controlled network operations and configuration management
Proceedings of the 5th international conference on Emerging networking experiments and technologies
DECOR: DEClarative network management and OpeRation
ACM SIGCOMM Computer Communication Review
A systematic approach for evolving VLAN designs
INFOCOM'10 Proceedings of the 29th conference on Information communications
Semantic Web-Based Management of Routing Configurations
Journal of Network and Systems Management
Using hierarchal change mining to manage network security policy evolution
Hot-ICE'11 Proceedings of the 11th USENIX conference on Hot topics in management of internet, cloud, and enterprise networks and services
The evolution of network configuration: a tale of two campuses
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Toward a cyber-physical topology language: applications to NERC CIP audit
Proceedings of the first ACM workshop on Smart energy grid security
Hi-index | 0.01 |
We analyze data from a Tier-1 ISP that reflect the dynamic operational tasks performed in the ISP network to build a holistic view of configuration management operations. We observe that in addition to commands that lead to persistent configuration changes, virtually all management tasks also involve status-checking commands that do not change the configuration, but allow the operator to verify some router specific state. Based on this observation we model configuration modifications using automatically generated deterministic finite automata (DFA), where a state represents the configured behavior of an interface and an edge indicates the operations performed on the interface either to fulfill a specific task or to check the status of the router. The DFA model captures common configuration tasks derived by our analysis and their ordering and dependency. We argue that composing DFAs is a (small) step towards enabling operators to reason about the operational state of the network, as well as enabling tools for automated network management.