2011
DOI: 10.1007/978-3-642-21461-5_22
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing BGP Instances in Maude

Abstract: Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Researchers study the instances by manually constructing execution sequences, hoping to either identify an oscillation or show that the instance is safe by exhaustively examining all possible sequences. We propose to automate the analysis by using Maude, a tool based on rewriting logic. We have developed a library specifying a generalized… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
3
1

Relationship

4
3

Authors

Journals

citations
Cited by 9 publications
(19 citation statements)
references
References 19 publications
0
19
0
Order By: Relevance
“…Our results show that the reduction-based analysis is much more effective than the prior approach of doing exhaustive search on unreduced instances [18]. The data demonstrate that we have not only gained speed, but also the ability to analyze network instances that were previously infeasible to study.…”
Section: Introductionmentioning
confidence: 59%
See 1 more Smart Citation
“…Our results show that the reduction-based analysis is much more effective than the prior approach of doing exhaustive search on unreduced instances [18]. The data demonstrate that we have not only gained speed, but also the ability to analyze network instances that were previously infeasible to study.…”
Section: Introductionmentioning
confidence: 59%
“…To validate our reduction method, we have extended our library for analysis of BGP configurations [18] to support automatic abstraction from dynamic (BGP) configurations to static (extended SPP) configurations, reduction based on SPP configurations, and integration with dynamic exhaustive search analysis. Using the original library BGP instances up to 25 nodes have been successfully analyzed in minutes.…”
Section: Network Reduction In Maudementioning
confidence: 99%
“…Rewriting logic have also been used [29] for simulating and performing state exploration of BGP instances to check for route oscillation. Analysis can be applied to topologies with up to 9 nodes, but they cannot distinguish between temporary and permanent oscillations.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Protocols written in previous versions of DN languages could only be analysed by translating into "logic" (e.g. [29], [8]). But no proof of the correctness of the translation has ever been given.…”
Section: Convergence Analysis For Bgpmentioning
confidence: 99%
“…BGPVerif consists of two components. NetAnalyzer [10] is an automated analysis toolkit based on the Maude rewriting logic engine [4]. In NetAnalyzer, the BGP system is encoded as a transition system driven by rewriting rules.…”
Section: Introductionmentioning
confidence: 99%