“…Second, probing is inaccurate, e.g., it cannot probe the open ports with no server listening on them. Due to these drawbacks of probing, many approaches were proposed to address the reachability problem [2], [11], [13], [18], [24], [26]. The main assumption in all these approaches is that the reachability restriction information of each network device and other configuration state are known to a central network analyst, who is quantifying the network reachability.…”