Netpiler: Detection of ineffective router configurations

Sihyung Lee, Tina Wong, Hyong Kim

Research output: Contribution to journalArticlepeer-review

9 Scopus citations

Abstract

Configuring a network is a tedious and error-prone task. In particular, configuring routing policies for a network is complex as it involves subtle dependencies in multiple routers across the network. Misconfigurations are common and certain misconfigurations can bring the Internet down. In 2005, a misconfigured router in AS 9121 blackholed traffic for tens of thousands of networks in the Internet. This paper describes NetPiler, a system that detects router misconfigurations. NetPiler consists of a routing policy configuration model and a misconfiguration detection algorithm. The model is applicable to routing policies configured on a single router as well as to network-wide configuration. Using the model, NetPiler detects configuration commands that do not influence the behavior of the network - we call these configurations ineffective commands. Although the ineffective commands could be benign, sometimes when the commands are mistakenly configured to be ineffective, they cause the network to misbehave deviating from the intended behavior. We have implemented NetPiler in approximately 128,000 lines of C++ code, and evaluated it on the configurations of four production networks. NetPiler discovers nearly a hundred ineffective commands. Some of these misconfigurations can result in loss of connectivity, access to protected networks, and financial implications by providing free transit services. We believe NetPiler can help networks to significantly reduce misconfigurations.

Original languageEnglish
Article number4808473
Pages (from-to)291-301
Number of pages11
JournalIEEE Journal on Selected Areas in Communications
Volume27
Issue number3
DOIs
StatePublished - Apr 2009

Keywords

  • Network abstraction
  • Network configuration modeling
  • Network management
  • Static analysis

Fingerprint

Dive into the research topics of 'Netpiler: Detection of ineffective router configurations'. Together they form a unique fingerprint.

Cite this