Table I from CHeSS: A Configuration Health Scoring System and Its Application to Network Devices | Semantic Scholar (2024)

Skip to search formSkip to main contentSkip to account menu

Semantic ScholarSemantic Scholar's Logo
@article{Sondur2020CHeSSAC, title={CHeSS: A Configuration Health Scoring System and Its Application to Network Devices}, author={Sanjeev Sondur and Girisha Shankar and Krishna Kant}, journal={2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)}, year={2020}, pages={250-257}, url={https://api.semanticscholar.org/CorpusID:215739795}}
  • Sanjeev Sondur, Girisha Shankar, K. Kant
  • Published in Conference on Innovation in… 1 February 2020
  • Computer Science, Engineering

This paper proposes a health index targeting multiple metrics including performance, security and availability and specialize them for network devices such as routers and switches and extends the approach to use a knowledge repository to better refine the health index, which improves with an increase in available data.

1 Citation

Background Citations

1

Methods Citations

1

Figures and Tables from this paper

  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
  • figure 7
  • table I

Topics

Network Devices (opens in a new tab)Routers (opens in a new tab)Comprehensive Health Enhancement Support System (opens in a new tab)

Performance Health Index for Complex Cyber Infrastructures
    Sanjeev SondurK. Kant

    Computer Science

    ACM Trans. Model. Perform. Evaluation Comput…

  • 2022

This paper shows how CHI, which is defined as a configuration scoring system, can take advantage of the domain knowledge and the available available performance data to produce important insights into the configuration settings, and compares the CHI with both well-advertised segmented non-linear models and state-of-the-art data-driven models.

21 References

A data model for management of network device configuration heterogeneity
    Eric Lunaud NgoupeSylvain Stoesel Pierre Boucher

    Computer Science

    2015 IFIP/IEEE International Symposium on…

  • 2015

This paper presents a generic data model for configuration information of network devices that takes into account vendor and version heterogeneity, and proposes a configuration query engine that will allow a user to pinpoint a specific, abstract configuration parameter, and be given the proper sequence of commands to query that parameter on a device of given vendor and operating system version.

  • 6
  • PDF
Common Vulnerability Scoring System
    P. MellK. ScarfoneSasha Romanosky

    Computer Science

    IEEE Secur. Priv.

  • 2006

The Common Vulnerability Scoring System is a public initiative designed to address this issue by presenting a framework for assessing and quantifying the impact of software vulnerabilities.

  • 701
  • Highly Influential
Systems Approaches to Tackling Configuration Errors
    Tianyin XuYuanyuan Zhou

    Engineering, Computer Science

    ACM Comput. Surv.

  • 2015

A holistic and structured overview of the systems approaches that tackle configuration errors and the potential solutions for resolving configuration errors in the spectrum of system development and management is provided.

  • 121
  • PDF
Scalable near real-time failure localization of data center networks
    H. HerodotouBolin DingS. BalakrishnanG. OuthredPercy Fitter

    Computer Science, Engineering

    KDD

  • 2014

The key idea is to use statistical data mining techniques on large-scale active monitoring data to determine a ranked list of suspect causes, which is refined with passive monitoring signals and correlated with other failure signals from passive monitoring to increase the confidence of the probabilistic analysis.

  • 31
  • PDF
Unraveling the Complexity of Network Management
    Theophilus A. BensonAditya AkellaD. Maltz

    Computer Science, Engineering

    NSDI

  • 2009

A suite of complexity models are developed that describe the routing design and configuration of a network in a succinct fashion, abstracting away details of the underlying configuration languages and are predictive of the issues operators face when reconfiguring their networks.

  • 214
  • PDF
An Ontology-Based Information Extraction System for bridging the configuration gap in hybrid SDN environments
    A. MartinezM. YannuzziJ. D. VergaraR. Serral-GraciàW. Ramírez

    Computer Science, Engineering

    2015 IFIP/IEEE International Symposium on…

  • 2015

A semantic-based approach is presented that eases and automates the configuration of network devices while complementing the capabilities of OF-CONFIG and NETCONF and defines a learning algorithm that enables automated interpretation of CLIs' configuration capabilities in heterogeneous (multi-vendor) network scenarios.

  • 11
  • PDF
Beyond heuristics: learning to classify vulnerabilities and predict exploits
    Mehran BozorgiL. SaulS. SavageG. Voelker

    Computer Science

    KDD

  • 2010

This work shows how to train classifiers that predict much more accurately whether and how soon individual vulnerabilities are likely to be exploited, compared to current industry-standard heuristics based on expert knowledge and static formulas.

  • 236
  • PDF
An empirical study on configuration errors in commercial and open source systems
    Zuoning YinXiao MaJing ZhengYuanyuan ZhouLakshmi N. BairavasundaramS. Pasupathy

    Computer Science

    SOSP

  • 2011

One of the first attempts to conduct a real-world misconfiguration characteristic study is undertaken, finding that a significant portion of misconfigurations can cause hard-to-diagnose failures, such as crashes, hangs, or severe performance degradation, indicating that systems should be better-equipped to handle mis configurations.

  • 260
  • PDF
On the Performance Variation in Modern Storage Stacks
    Zhen CaoVasily TarasovHari Prasath RamanDean HildebrandE. Zadok

    Computer Science, Engineering

    FAST

  • 2017

There was no single root cause: it often changed with the workload, hardware, or software configuration in the storage stack, and the amount of variability in benchmarking modern storage stacks was characterized.

  • 53
  • PDF
The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines
    L. BarrosoU. Hölzle

    Computer Science, Engineering

    The Datacenter as a Computer: An Introduction to…

  • 2009

The architecture of WSCs is described, the main factors influencing their design, operation, and cost structure, and the characteristics of their software base are described.

  • 1,867
  • PDF

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    Table I from CHeSS: A Configuration Health Scoring System and Its Application to Network Devices | Semantic Scholar (9)

    TABLE I. Health Index of Sample Configuration Files.

    Published in Conference on Innovation in Clouds, Internet and Networks 2020

    CHeSS: A Configuration Health Scoring System and Its Application to Network Devices

    Sanjeev SondurGirisha ShankarK. Kant

    Figure 8 of 8

    Table I from CHeSS: A Configuration Health Scoring System and Its Application to Network Devices | Semantic Scholar (2024)

    References

    Top Articles
    Latest Posts
    Article information

    Author: Jamar Nader

    Last Updated:

    Views: 6403

    Rating: 4.4 / 5 (75 voted)

    Reviews: 90% of readers found this page helpful

    Author information

    Name: Jamar Nader

    Birthday: 1995-02-28

    Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

    Phone: +9958384818317

    Job: IT Representative

    Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

    Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.