We present Minesweeper, a tool to verify that a network satisfies a wide range of intended properties such as reachability or isolation among nodes, waypointing, black holes …
In-network Access Control List (ACL) is an important technique in ensuring network-wide connectivity and security. As cloud-scale WANs today constantly evolve in size and …
We present a new method for scaling automatic configuration of computer networks. The key idea is to relax the computationally hard search problem of finding a configuration that …
A El-Hassany, P Tsankov, L Vanbever… - 15th USENIX Symposium …, 2018 - usenix.org
Network operators often need to adapt the configuration of a network in order to comply with changing routing policies. Evolving existing configurations, however, is a complex task as …
We describe our experiences using formal methods and automated theorem proving for network operation at scale. The experiences are based on developing and applying the …
J Backes, S Bayless, B Cook, C Dodge… - … Aided Verification: 31st …, 2019 - Springer
Cloud services provide the ability to provision virtual networked infrastructure on demand over the Internet. The rapid growth of these virtually provisioned cloud networks has …
Network verification and configuration synthesis are promising approaches to make networks more reliable and secure by enforcing a set of policies. However, these …
S Ramanathan, Y Zhang, M Gawish… - … USENIX Symposium on …, 2023 - usenix.org
Configuration of production datacenters is challenging due to their scale (many switches), complexity (specific policy requirements), and dynamism (need for many configuration …
This paper explores opportunities to utilize Large Language Models (LLMs) to make network configuration human-friendly, simplifying the configuration of network devices and …