Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
153 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

DEFT: Distributed, Elastic, and Fault-tolerant State Management of Network Functions (2311.18595v1)

Published 30 Nov 2023 in cs.DC

Abstract: Network function virtualization is the key to developing elastically scalable and fault-tolerant network functions (e.g. load balancer, firewall etc.). By integrating NFV and SDN technologies, it is feasible to dynamically reroute traffic to new network function (NF) instances in the event of an NF failure or overload scenario. The fact that the majority of network functions are stateful makes the task more challenging. State migration and state replication are common approaches in achieving elasticity and fault tolerance. The majority of the studies in the literature either emphasize fault tolerance or elastic scalability while designing a state management system for network functions. In this paper, we have designed a complete state management system, called DEFT, that meets both elasticity and fault-tolerance goals. Our system also supports strong consistency on global state updates. While existing designs rely on a central controller or remote central storage to achieve strong consistency on state updates, DEFT utilizes distributed consensus mechanism to achieve the same. We have done a proof of concept implementation of DEFT and extensively tested DEFT under several model conditions to evaluate its scalability and performance. Our experimental results show that DEFT is scalable and maintains a considerably high throughput throughout. It incurs minimal performance overhead while achieving strong consistency on state updates.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (31)
  1. Rajagopalan, S., Williams, D., Jamjoom, H., Warfield, A.: Split/merge: System support for elastic execution in virtual middleboxes. In: Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pp. 227–240 (2013) Kablan et al. [2017] Kablan, M., Alsudais, A., Keller, E., Le, F.: Stateless network functions: Breaking the tight coupling of state and processing. In: Proccedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pp. 97–112 (2017) Woo et al. [2018] Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kablan, M., Alsudais, A., Keller, E., Le, F.: Stateless network functions: Breaking the tight coupling of state and processing. In: Proccedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pp. 97–112 (2017) Woo et al. [2018] Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  2. Kablan, M., Alsudais, A., Keller, E., Le, F.: Stateless network functions: Breaking the tight coupling of state and processing. In: Proccedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pp. 97–112 (2017) Woo et al. [2018] Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  3. Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  4. Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  5. Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  6. Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  7. Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  8. Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  9. Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  10. Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  11. Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  12. Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  13. Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  14. Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  15. Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  16. Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  17. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  18. S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  19. Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  20. Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  21. Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  22. Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  23. Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  24. Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  25. Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  26. Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  27. Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  28. Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  29. Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  30. Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
  31. Passive Real-time Asset Detection System. https://github.com/gamelinux/prads

Summary

We haven't generated a summary for this paper yet.