skip to main content
10.1145/3387514.3405900acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Probabilistic Verification of Network Configurations

Published:30 July 2020Publication History

ABSTRACT

Not all important network properties need to be enforced all the time. Often, what matters instead is the fraction of time / probability these properties hold. Computing the probability of a property in a network relying on complex inter-dependent routing protocols is challenging and requires determining all failure scenarios for which the property is violated. Doing so at scale and accurately goes beyond the capabilities of current network analyzers.

In this paper, we introduce NetDice, the first scalable and accurate probabilistic network configuration analyzer supporting BGP, OSPF, ECMP, and static routes. Our key contribution is an inference algorithm to efficiently explore the space of failure scenarios. More specifically, given a network configuration and a property φ, our algorithm automatically identifies a set of links whose failure is provably guaranteed not to change whether φ holds. By pruning these failure scenarios, NetDice manages to accurately approximate P(φ). NetDice supports practical properties and expressive failure models including correlated link failures.

We implement NetDice and evaluate it on realistic configurations. NetDice is practical: it can precisely verify probabilistic properties in few minutes, even in large networks.

Skip Supplemental Material Section

Supplemental Material

3387514.3405900.mp4

mp4

108.2 MB

References

  1. Anubhavnidhi Abhashkumar, Aaron Gember-Jacobson, and Aditya Akella. 2020. Tiramisu: Fast Multilayer Network Verification. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20). USENIX Association, Santa Clara, CA, 201--219. https://www.usenix.org/conference/nsdi20/presentation/abhashkumarGoogle ScholarGoogle Scholar
  2. Carolyn Jane Anderson, Nate Foster, Arjun Guha, Jean-Baptiste Jeannin, Dexter Kozen, Cole Schlesinger, and David Walker. 2014. NetKAT: Semantic Foundations for Networks (POPL '14).Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Anindya Basu, Chih-Hao Luke Ong, April Rasala, F. Bruce Shepherd, and Gordon Wilfong. 2002. Route Oscillations in I-BGP with Route Reflection. In Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (Pittsburgh, Pennsylvania, USA) (SIGCOMM '02). ACM, New York, NY, USA, 235--247. https://doi.org/10.1145/633025.633048Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ryan Beckett, Aarti Gupta, Ratul Mahajan, and David Walker. 2017. A general approach to network configuration verification. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (SIGCOMM '17). ACM, 155--168.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Christopher M. Bishop. 2006. Pattern recognition and machine learning. Springer, New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jeremy Bogle, Nikhil Bhatia, Manya Ghobadi, Ishai Menache, Nikolaj Bjørner, Asaf Valadarsky, and Michael Schapira. 2019. TEAVAR: striking the right utilization-availability balance in WAN traffic engineering. In Proceedings of the ACM Special Interest Group on Data Communication (SIGCOMM '19). ACM, Beijing China, 29--43. https://doi.org/10.1145/3341302.3342069Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lawrence D. Brown, T. Tony Cai, and Anirban DasGupta. 2001. Interval Estimation for a Binomial Proportion. Statist. Sci. 16, 2 (05 2001), 101--133. https://doi.org/10.1214/ss/1009213286Google ScholarGoogle Scholar
  8. Yiyang Chang, Chuan Jiang, Ashish Chandra, Sanjay Rao, and Mohit Tawarmalani. 2019. Lancet: Better Network Resilience by Designing for Pruned Failure Sets. Proceedings of the ACM on Measurement and Analysis of Computing Systems 3, 3 (Dec. 2019), 1--26. https://doi.org/10.1145/3366697Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jaeyoung Choi, Jong Han Park, Pei chun Cheng, Dorian Kim, and Lixia Zhang. 2011. UnderstandingBGPnext-hopdiversity. In2011IEEEConferenceonComputer Communications Workshops (INFOCOM WKSHPS). 846--851. https://doi.org/10.1109/INFCOMW.2011.5928930Google ScholarGoogle Scholar
  10. Luca Cittadini, Stefano Vissicchio, and Giuseppe Di Battista. 2010. Doing don'ts: Modifying BGP attributes within an autonomous system. In Network Operations and Management Symposium (NOMS), 2010IEEE. IEEE, 293--300.Google ScholarGoogle ScholarCross RefCross Ref
  11. Mary Kathryn Cowles and Bradley P. Carlin. 1996. Markov Chain Monte Carlo Convergence Diagnostics: A Comparative Review. J. Amer. Statist. Assoc. 91, 434 (1996), 883--904. https://doi.org/10.1080/01621459.1996.10476956Google ScholarGoogle ScholarCross RefCross Ref
  12. Seyed K. Fayaz, Tushar Sharma, Ari Fogel, Ratul Mahajan, Todd Millstein, Vyas Sekar, and George Varghese. 2016. Efficient Network Reachability Analysis Using a Succinct Control Plane Representation. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI '16) (Savannah, GA, USA). USENIX Association, USA, 217--232.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Feamster and J. Rexford. 2007. Network-Wide Prediction of BGP Routes. IEEE/ACM Transactions on Networking 15, 2 (April 2007), 253--266. https://doi.org/10.1109/TNET.2007.892876Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ashley Flavel, Jeremy McMahon, Aman Shaikh, Matthew Roughan, and Nigel Bean. 2010. BGP route prediction within ISPs. Computer Communications 33, 10 (2010), 1180--1190.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ashley Flavel, Matthew Roughan, Nigel Bean, and Aman Shaikh. 2008. Where's Waldo? practical searches for stability in iBGP. In IEEE International Conference on Network Protocols. ICNP2008. IEEE, 308--317.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Ari Fogel, Stanley Fung, Luis Pedrosa, Meg Walraed-Sullivan, Ramesh Govindan, Ratul Mahajan, and Todd Millstein. 2015. A General Approach to Network Configuration Analysis. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15). USENIX Association, Oakland, CA, 469--483.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nate Foster, Dexter Kozen, Konstantinos Mamouras, Mark Reitblatt, and Alexandra Silva. 2016. Probabilistic NetKAT. In Programming Languages and Systems (ESOP '16), Peter Thiemann (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 282--309.Google ScholarGoogle Scholar
  18. Nate Foster, Dexter Kozen, Matthew Milano, Alexandra Silva, and Laure Thompson. 2015. A coalgebraic decision procedure for NetKAT. In ACM SIGPLAN Notices, Vol. 50. ACM, 343--355.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Aaron Gember-Jacobson, Raajay Viswanathan, Aditya Akella, and Ratul Mahajan. 2016. Fast Control Plane Analysis Using an Abstract Representation. In Proceedings of the 2016 ACM SIGCOMM Conference (Florianopolis, Brazil) (SIGCOMM '16). Association for Computing Machinery, New York, NY, USA, 300--313. https://doi.org/10.1145/2934872.2934876Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Phillipa Gill, Navendu Jain, and Nachiappan Nagappan. 2011. Understanding Network Failures in Data Centers: Measurement, Analysis, and Implications. In Proceedings of the ACM SIGCOMM 2011 Conference (Toronto, Ontario, Canada) (SIGCOMM '11). ACM, New York, NY, USA, 350--361. https://doi.org/10.1145/2018436.2018477Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Barry Raveendran Greene and Philip Smith. 2002. Cisco ISP essentials. Cisco Press.Google ScholarGoogle Scholar
  22. Timothy G Griffin and Gordon Wilfong. 2002. On the correctness of IBGP configuration. In ACM SIGCOMM Computer Communication Review, Vol. 32. ACM, 17--29.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Wassily Hoeffding. 1963. Probability Inequalities for Sums of Bounded Random Variables. J. Amer. Statist. Assoc. 58, 301 (1963), 13--30.Google ScholarGoogle ScholarCross RefCross Ref
  24. Peyman Kazemian, Michael Chang, Hongyi Zeng, George Varghese, Nick McKeown, and Scott Whyte. 2013. Real Time Network Policy Checking Using Header Space Analysis. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI '13). USENIX, Lombard, IL, 99--111.Google ScholarGoogle Scholar
  25. Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header Space Analysis: Static Checking for Networks. In Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12). USENIX, San Jose, CA, 113--126.Google ScholarGoogle Scholar
  26. Ahmed Khurshid, Xuan Zou, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. 2013. VeriFlow: Verifying Network-Wide Invariants in Real Time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI '13). USENIX, Lombard, IL, 15--27.Google ScholarGoogle Scholar
  27. Simon Knight, Hung X Nguyen, Nick Falkner, Rhys Bowden, and Matthew Roughan. 2011. The internet topology zoo. IEEE Journal on Selected Areas in Communications 29, 9 (2011), 1765--1775.Google ScholarGoogle ScholarCross RefCross Ref
  28. Pierre Simon Laplace. 1812. Théorie analytique des probabilités. Ve. Courcier.Google ScholarGoogle Scholar
  29. Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, P. Brighten Godfrey, and Samuel Talmadge King. 2011. Debugging the Data Plane with Anteater. In Proceedings of the ACM SIGCOMM 2011 Conference (Toronto, Ontario, Canada) (SIGCOMM '11). Association for Computing Machinery, New York, NY, USA, 290--301. https://doi.org/10.1145/2018436.2018470Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Pascal Mérindol, Virginie Van den Schrieck, Benoit Donnet, Olivier Bonaventure, and Jean-Jacques Pansiot. 2009. Quantifying Ases Multiconnectivity Using Multicast Information. In Proceedings of the 9th ACM SIGCOMMConference on Internet Measurement (IMC '09). Association for Computing Machinery, New York, NY, USA, 370--376.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Santhosh Prabhu, Kuan Yen Chou, Ali Kheradmand, Brighten Godfrey, and Matthew Caesar. 2020. Plankton: Scalable network configuration verification through model checking. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI '20). USENIX Association, Santa Clara, CA, 953--967. https://www.usenix.org/conference/nsdi20/presentation/prabhuGoogle ScholarGoogle Scholar
  32. Bruno Quoitin and Steve Uhlig. 2005. Modeling the routing of an autonomous systemwith C-BGP. IEEEnetwork 19, 6 (2005), 12--19.Google ScholarGoogle Scholar
  33. Y. Rekhter, T. Li, andS. Hares. 2006. ABorder GatewayProtocol 4 (BGP-4). RFC 4271 (Draft Standard). http://www.ietf.org/rfc/rfc4271.txtGoogle ScholarGoogle Scholar
  34. Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang. 2002. BGP routing stability of popular destinations. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. ACM, 197--202.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Steffen Smolka, Praveen Kumar, Nate Foster, Dexter Kozen, and Alexandra Silva. 2017. Cantor Meets Scott: Semantic Foundations for Probabilistic Networks. In Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages (Paris, France)(POPL '17). ACM, New York, NY, USA, 557--571. https://doi.org/10.1145/3009837.3009843Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. M. Steinder and A. S. Sethi. 2002. End-to-end service failure diagnosis using belief networks. In Network Operations and Management Symposium (NOMS '02). 375--390.Google ScholarGoogle Scholar
  37. M. Steinder and A. S. Sethi. 2002. Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms. In Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 1. 322-331 vol.1.Google ScholarGoogle Scholar
  38. Daniel Turner, Kirill Levchenko, Alex C. Snoeren, and Stefan Savage. 2010. California Fault Lines: Understanding the Causes and Impact of Network Failures. In Proceedings of the ACM SIGCOMM 2010 Conference (New Delhi, India) (SIGCOMM '10). ACM, New York, NY, USA, 315--326.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Stefano Vissicchio, Luca Cittadini, and Giuseppe Di Battista. 2015. On iBGP Routing Policies. IEEE/ACM Trans. Netw. 23, 1 (Feb. 2015), 227--240. https://doi.org/10.1109/TNET.2013.2296330Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Konstantin Weitz, Doug Woos, Emina Torlak, Michael D. Ernst, Arvind Krishnamurthy, and Zachary Tatlock. 2016. Scalable verification of border gateway protocol configurations with an SMT solver. In ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, (OOPSLA '16). https://doi.org/10.1145/2983990.2984012Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Nevin Lianwen Zhang and David Poole. 1996. Exploiting Causal Independence in Bayesian Network Inference. J. Artif. Int. Res. 5, 1 (Dec. 1996), 301--328. http://dl.acm.org/citation.cfm?id=1622756.1622765Google ScholarGoogle Scholar

Index Terms

  1. Probabilistic Verification of Network Configurations

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication
        July 2020
        814 pages
        ISBN:9781450379557
        DOI:10.1145/3387514

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 July 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate554of3,547submissions,16%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader