CURSOR: Configuration update synthesis using order rules

Z Chen, L Gao - IEEE INFOCOM 2023-IEEE Conference on …, 2023 - ieeexplore.ieee.org
Network configuration updates are frequent nowadays to adapt to the rapid evolution of
networks. To ensure the safety of the configuration update, network verification can be used …

Solving distributed ACL policies under complex constraints with graph neural networks

X Liao, H Sun, J Wang, Q Qi, Z Zhuang… - 2023 IEEE 31st …, 2023 - ieeexplore.ieee.org
Access Control List (ACL) policies often need to be updated due to upgrades in network
architecture and services. A critical part of ACL update tasks is reachability satisfaction …

Fast and Scalable ACL Policy Solving Under Complex Constraints With Graph Neural Networks

H Sun, X Liao, J Wang, Q Qi, Z Zhuang… - IEEE/ACM …, 2024 - ieeexplore.ieee.org
Network operators often need to modify Access Control List (ACL) policies to align with to
network upgrades. An essential part of the ACL update task is reachability satisfaction …

Efficient BGP Intrusion Detection Model Using Machine Learning: A Comparative Study with AdaBoost as the Optimal Classifier

M Abdoun, M Guennoun, A Amar… - 2023 IEEE Canadian …, 2023 - ieeexplore.ieee.org
The Border Gateway Protocol (BGP) is a crucial component of the Internet's infrastructure
that enables the exchange of routing information among multiple Autonomous Systems so …

SMT-Based Formal Verification of Network Routing Properties and Protocols

MW Usmani - 2024 - scholarworks.umass.edu
In today's hyperconnected world, where every aspect of our lives is intertwined with the
Internet, ensuring the reliability, security, and seamless functionality of networks is …