2013
DOI: 10.1109/tnet.2012.2203144
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying and Verifying Reachability for Access Controlled Networks

Abstract: Abstract-Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenance, and design. Although attempts to model network reachability have been made, feasible solutions to computing network reachability have remained unknown. In this paper, we propose a suite of algorithms for quantifying reachability based on network configurations [mainly Access Control Lists (ACLs)] as well as solutions for que… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 17 publications
0
19
0
Order By: Relevance
“…Unessential details about the traffic control devices such as firewalls, switches and routers, will be omitted in the following, as well as the techniques for computing the reachability of nodes, since the theory, data structures and algorithms presented in [40] fit in well with our framework and have been borrowed consequently. In particular, our model takes into account the same network elements at the basis of the methodology of [40], and we assume that the whole network reachability has already been computed by means of [40], and is available through simple queries.…”
Section: The Implementation Partmentioning
confidence: 99%
See 3 more Smart Citations
“…Unessential details about the traffic control devices such as firewalls, switches and routers, will be omitted in the following, as well as the techniques for computing the reachability of nodes, since the theory, data structures and algorithms presented in [40] fit in well with our framework and have been borrowed consequently. In particular, our model takes into account the same network elements at the basis of the methodology of [40], and we assume that the whole network reachability has already been computed by means of [40], and is available through simple queries.…”
Section: The Implementation Partmentioning
confidence: 99%
“…In particular, our model takes into account the same network elements at the basis of the methodology of [40], and we assume that the whole network reachability has already been computed by means of [40], and is available through simple queries. This implies that our view of the network is static, that is its connectivity properties are not affected by the actions of players.…”
Section: The Implementation Partmentioning
confidence: 99%
See 2 more Smart Citations
“…In the last years, various testing techniques have been proposed. Some of them (e.g., [27], [28], [29]) analyze the configuration of traditional networks and are hard to extend to SDN controller verification, e.g., because bound to specific network protocols. Others propose testing frameworks targeted to SDN (e.g., [30], [16]).…”
Section: Related Workmentioning
confidence: 99%