Proceedings of the ACM Special Interest Group on Data Communication 2019
DOI: 10.1145/3341302.3342088
|View full text |Cite
|
Sign up to set email alerts
|

Safely and automatically updating in-network ACL configurations with intent language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0
5

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(36 citation statements)
references
References 27 publications
0
29
0
5
Order By: Relevance
“…The intent refining system introduces a feedback mechanism, which effectively improves the accuracy of intent recognition, but does not check the consistency of the network intent before the network policy is issued. A system for automatically generating ACL update plans based on the advanced intent of network operatorsałJinjing was proposed in [50]. Jinjing allows operators to express their update intent (such as ACL migration and flow control) in a declarative language called LAI, and Jinjing automatically synthesizes ACL update plans that meet their intents.…”
Section: B Enabling Idn Technologiesmentioning
confidence: 99%
“…The intent refining system introduces a feedback mechanism, which effectively improves the accuracy of intent recognition, but does not check the consistency of the network intent before the network policy is issued. A system for automatically generating ACL update plans based on the advanced intent of network operatorsałJinjing was proposed in [50]. Jinjing allows operators to express their update intent (such as ACL migration and flow control) in a declarative language called LAI, and Jinjing automatically synthesizes ACL update plans that meet their intents.…”
Section: B Enabling Idn Technologiesmentioning
confidence: 99%
“…Besides firewall, ACL (Access Control List) rules can be implemented directly in network devices, such as routers, to packet filtering. ACL is a collection of "permit" and "deny" conditions and the packets are permitted (or denied) based on their source and destination IP addresses, ports, and protocol (TIAN et al, 2019). Packets that come into a network device that contains ACL rules are compared to the set of rules sequentially until it has a match.…”
Section: Port 80mentioning
confidence: 99%
“…Jinjing (TIAN et al, 2019) allows operators to declare update intents (e.g., ACL migration) in a declarative language called LAI, and automatically synthesizes ACL update plans that meet their intents. Jinjing modeled the ACL configuration formally and designed an intent primitive to ensure the accuracy of the system operation.…”
Section: Intentsmentioning
confidence: 99%
See 1 more Smart Citation
“…This development is also not limited to academia. Large cloud providers, such as Alibaba [36], Amazon [2], and Microsoft [20], are developing and deploying network verification systems. However, as shown in Figure 1, each such tool today is a monolith, with its own model of the target functionality and its own analysis engine.…”
Section: Introductionmentioning
confidence: 99%