problem of router misconfigurations using data mining. We apply association scheme on configuration files from a large state-wide network provider, a large a network to infer local, network-specific policies and detect potential errors that. prior work in identifying such misconfigurations in two main ways. First, we . use of association rule mining [2], by which the access logs are an- alyzed to Detecting network-wide and router-specific misconfigurations through data mining. D.: Detecting network-wide and router-specific misconfigurations through data mining. IEEE/ACM Trans. Netw. 17(1), 66–79 () Leberknight, C.S., Chiang.

Author: Akir Samubei
Country: Canada
Language: English (Spanish)
Genre: Career
Published (Last): 6 February 2005
Pages: 258
PDF File Size: 16.96 Mb
ePub File Size: 20.59 Mb
ISBN: 324-1-88104-560-7
Downloads: 81207
Price: Free* [*Free Regsitration Required]
Uploader: Yozshurn

It is very hard to debug networks. On the other hand, if an output link is congested, failure is captured by the As the figure clearly depicts that the proposed system utilizes latency of a test packet going above a threshold.

Every day logging into every box in the network via the Command Line network engineers have to wrestle with misconfigured routers, Interface CLI. The paper uses the Automatic Test Packet Generation system for debugging and adds an enhancement to that system which restricts the number of test packets generated and removes the threshold violation over the file size limit.

To tnrough so, ATPG applies the all-pairs reachability algorithm described, on every terminal port, an all-x header a header which has all wild carded bits is applied to the transfer function of the first switch connected to each test terminal. Rapid detection of maintenance induced changes in service performance. First, Alice examines each router to see if the packets from every port. A SOFT way for open ow switch interoperability testing.

These packets will be sent periodically by the test terminals step 4. Do we only read and analyze forwarding tables any packet processing rules in the network.


Misconfiturations Example automatic, systematic data plane troubleshooting a necessity. ATPG can adapt to packets silently.

How much we know about the network packets required for complete coverage. The control plane populates the data plane with performance assertions such as packet latency. As each packet pk traverses the network using the network function, the set of rules that match pk are recorded in pk. Ip fault localization via risk modeling. Venkata Naga Jayudu2 1 P. Enter the email address you signed up with and we’ll email you a reset link. Header constraints are applied here.

References Publications referenced misconnfigurations this paper. Each network device terminals that are available; 2 Header: MaltzHui ZhangAlbert G.

Log In Sign Up. From This Paper Figures, tables, and topics from this paper. On top of the data plane is the and other configuration parameters.

Calaméo – IEEE PROJECT JAVA NETWORKING @ SBGC ( Chennai, Trichy, Tamilnadu, India )

ATPG can be customized to check only for Suppose a router with a faulty line card starts dropping reachability or for performance as well.

Doing this the proposed system clearly outperformed the existing system in the time taken to Figure 2: ATPG must only use contains a set of forwarding rules e. Skip to search form Skip to main content. XieJibin ZhanDavid A. Which network components do we cover, forwarding rules, its full coverage guarantees testing of every links or rules?

Router computing Search for additional papers on this topic. ATPG must only use test device, such as a switch or router.

Detecting Network-Wide and Router-Specific Misconfigurations Through Data Mining

The system then samples each class to choose test packets, and finally first collects all the forwarding state from the network step compresses the resulting set of test packets to find the 1. The paper proposed an ATPG system that generates only a minimal set of test packets and removes the threshold over the file size limitation.


Test packets are fed under test? It can also be specialized to generate a that even possible? However, these solutions share a common limitation: Examples of action faults with the growth of the data size which will clearly takes more include unexpected packet loss, a missing rule, congestion, debugging time.

Moreover, different networks may call for different that these packets are being dropped. A switch transfer function, Tmodels a network respect two key constraints: Any data plane tester design should answer the ATPG detects and diagnoses errors by independently and following three questions: On static reachability analysis of IP networks Geoffrey G.

Detecting network-wide and router-specific misconfigurations through data mining. This paper proposes an automatic testing and debugging procedure for verifying the various network conditions and to provide safe reaching of the packets to the desired destination. An arriving packet For example, the network administrator may only allow using is associated with exactly one rule by matching it against each a specific set of VLANs.

Moreover, how to use this set to localize unscalable for large networks such as PlanetLab. In Example 1 forwarding rules based on its global network knowledge.

For example, both the ASIC and software design industries Debugging networks is only becoming harder as networks are are buttressed by billion-dollar tool businesses that supply getting bigger modern data centers may contain 10, techniques for both static e. Finally, she calls a colleague to replace the line card.