skip to main content
10.1145/1989323.1989488acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
demonstration

NetTrails: a declarative platform for maintaining and querying provenance in distributed systems

Published: 12 June 2011 Publication History

Abstract

We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history and derivations of network state that result from the execution of a distributed protocol. It has broad applicability in the management, diagnosis, and security analysis of networks. Our demonstration shows the use of NetTrails for maintaining and querying network provenance in a variety of distributed settings, ranging from declarative networks to unmodified legacy distributed systems. We conclude our demonstration with a discussion of our ongoing research on enhancing the query language and security guarantees.

References

[1]
Demonstration Video for the NetTrails Prototype. http://netdb.cis.upenn.edu/rapidnet/sigmod11demo.html.
[2]
Hyperbolic Tree Java Library. http://sourceforge.net/projects/hypertree/.
[3]
G. Karvounarakis, Z. G. Ives, and V. Tannen. Querying data provenance. In SIGMOD, 2010.
[4]
B. T. Loo, T. Condie, M. Garofalakis, D. E. Gay, J. M. Hellerstein, P. Maniatis, R. Ramakrishnan, T. Roscoe, and I. Stoica. Declarative Networking. In CACM, 2009.
[5]
S. C. Muthukumar, X. Li, C. Liu, J. B. Kopena, M. Oprea, and B. T. Loo. Declarative toolkit for rapid network protocol simulation and experimentation. In SIGCOMM-demo, 2009.
[6]
Network Simulator 3. http://www.nsnam.org/.
[7]
Quagga Routing Suite. http://www.quagga.net/.
[8]
RapidNet. http://netdb.cis.upenn.edu/rapidnet/.
[9]
RouteViews project. http://www.routeviews.org/.
[10]
W. Zhou, A. Haeberlen, B. T. Loo, and M. Sherr. Tracking Adversarial Behavior in Distributed Systems with Secure Network Provenance. Technical Report MS-CIS-10--28, University of Pennsylvania, 2010.
[11]
W. Zhou, M. Sherr, T. Tao, X. Li, B. T. Loo, and Y. Mao. Efficient querying and maintenance of network provenance at internet-scale. In SIGMOD, 2010.

Cited By

View all
  • (2022)Modeling the Data Provenance of Relational Databases Supporting Full-Featured SQL and Procedural LanguagesApplied Sciences10.3390/app1301006413:1(64)Online publication date: 21-Dec-2022
  • (2020)Check before you changeProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388285(575-590)Online publication date: 25-Feb-2020
  • (2019)DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and VerificationIEEE Access10.1109/ACCESS.2019.29031507(35302-35316)Online publication date: 2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '11: Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
June 2011
1364 pages
ISBN:9781450306614
DOI:10.1145/1989323

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 June 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. declarative networking
  2. provenance
  3. visualization

Qualifiers

  • Demonstration

Conference

SIGMOD/PODS '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Modeling the Data Provenance of Relational Databases Supporting Full-Featured SQL and Procedural LanguagesApplied Sciences10.3390/app1301006413:1(64)Online publication date: 21-Dec-2022
  • (2020)Check before you changeProceedings of the 17th Usenix Conference on Networked Systems Design and Implementation10.5555/3388242.3388285(575-590)Online publication date: 25-Feb-2020
  • (2019)DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and VerificationIEEE Access10.1109/ACCESS.2019.29031507(35302-35316)Online publication date: 2019
  • (2019)SRDPVWireless Networks10.1007/s11276-017-1625-825:4(1731-1747)Online publication date: 1-May-2019
  • (2017)An auditing language for preventing correlated failures in the cloudProceedings of the ACM on Programming Languages10.1145/31339211:OOPSLA(1-28)Online publication date: 12-Oct-2017
  • (2017)One Primitive to Diagnose Them AllProceedings of the Twelfth European Conference on Computer Systems10.1145/3064176.3064212(374-388)Online publication date: 23-Apr-2017
  • (2013)Declarative hybrid routing protocols in Ad hoc NETworksJournal of Electronics (China)10.1007/s11767-013-3037-y30:4(341-351)Online publication date: 18-Jul-2013
  • (2013)Enabling the analysis of cross-cutting aspects in ad-hoc processesProceedings of the 25th international conference on Advanced Information Systems Engineering10.1007/978-3-642-38709-8_4(51-67)Online publication date: 17-Jun-2013
  • (2012)Recent advances in declarative networkingProceedings of the 14th international conference on Practical Aspects of Declarative Languages10.1007/978-3-642-27694-1_1(1-16)Online publication date: 23-Jan-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media