Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication 2008
DOI: 10.1145/1402958.1402972
|View full text |Cite
|
Sign up to set email alerts
|

Shadow configuration as a network management primitive

Abstract: Configurations for today's IP networks are becoming increasingly complex. As a result, configuration management is becoming a major cost factor for network providers and configuration errors are becoming a major cause of network disruptions. In this paper, we present and evaluate the novel idea of shadow configurations. Shadow configurations allow configuration evaluation before deployment and thus can reduce potential network disruptions. We demonstrate using real implementation that shadow configurations can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
28
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(28 citation statements)
references
References 35 publications
0
28
0
Order By: Relevance
“…For example, an ISP might set up a router that listens to S*BGP messages from neighboring ASes, and then use these message to predict how becoming secure might impact its neighbors' route selections. A more sophisticated mechanism could use extended "shadow configurations" with neighboring ASes [1] to gain visibility into how traffic flows might change.…”
Section: Computing Projected Utilitymentioning
confidence: 99%
See 1 more Smart Citation
“…For example, an ISP might set up a router that listens to S*BGP messages from neighboring ASes, and then use these message to predict how becoming secure might impact its neighbors' route selections. A more sophisticated mechanism could use extended "shadow configurations" with neighboring ASes [1] to gain visibility into how traffic flows might change.…”
Section: Computing Projected Utilitymentioning
confidence: 99%
“…First, effort should be spent to engineer a lightweight simplex S*BGP. Second, with security impacting route selection, ISPs will need tools to forecast how S*BGP deployment will impact traffic patterns (e.g., using "shadow configurations", inspired by [1], with cooperative neighboring ASes) so they can provision their networks appropriately. Finally, our results suggest that S*BGP and BGP will coexist in the long term.…”
mentioning
confidence: 99%
“…For example, firewall modeling and conflict analysis were targeted by ( [4], [11], [14], and [20]). Also, there was a considerable amount of work on detecting misconfiguration in routing ( [10], [12], [5], and [16]). Other research has been done on creating general model for network devices ( [3], [8], and [19]).…”
Section: Related Workmentioning
confidence: 99%
“…Manual analysis of the interaction among the policies of the many devices in the network with different syntax and semantics is infeasible. The increasing complexity of managing access control configurations due to larger networks and longer policies makes configuration errors highly likely [1]. These misconfigurations can cause major network failures such as reachability problems, security violations, and network vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…These misconfigurations can cause major network failures such as reachability problems, security violations, and network vulnerabilities. Recent studies have found that more than 62% of network failures today are due to network misconfiguration [1]. Configuration analysis is very important for debugging network problems and isolate errors due to protocol implementation bugs or configuration errors.…”
Section: Introductionmentioning
confidence: 99%