2009
DOI: 10.1109/tnet.2008.925631
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Network-Wide and Router-Specific Misconfigurations Through Data Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
1

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(22 citation statements)
references
References 9 publications
0
21
0
1
Order By: Relevance
“…-Router-level path variability: Router-level maps of an AS are far more variable than AS-level maps: the latter rely on AS peering information (which is based on business relationships, that do not change frequently), while the former change with network conditions. Routing tables themselves are prone to inconsistencies and bogus routes [48,54]. -Imperfect coverage by Traceroute: We used a large number of planetlab nodes to launch traceroute probes 14 , but there remains a chance that some routes are simply not covered; further increasing the number of vantage points, i.e.…”
Section: Limitationsmentioning
confidence: 99%
“…-Router-level path variability: Router-level maps of an AS are far more variable than AS-level maps: the latter rely on AS peering information (which is based on business relationships, that do not change frequently), while the former change with network conditions. Routing tables themselves are prone to inconsistencies and bogus routes [48,54]. -Imperfect coverage by Traceroute: We used a large number of planetlab nodes to launch traceroute probes 14 , but there remains a chance that some routes are simply not covered; further increasing the number of vantage points, i.e.…”
Section: Limitationsmentioning
confidence: 99%
“…In SANE, the ACLs can be specified in a natural way so as to capture the semantics clearly. Le et al [17] used data mining techniques to analyze security policies and to detect possible misconfigurations in the policies. They considered the notion of association rule mining to extract usable safe configurations of routers and detect anomalies in other routers using the extracted patterns.…”
Section: A Network Reachabilitymentioning
confidence: 99%
“…Similar approaches were used to suggest to firewall administrators policies that match prespecified goals [16]. Other works used rule mining and Bayesian inference to analyze router policies and automatically detect configuration errors (e.g., [21]). …”
Section: Privacy In Online Social Networkmentioning
confidence: 99%