DEFT: Distributed, Elastic, and Fault-tolerant State Management of Network Functions (2311.18595v1)
Abstract: Network function virtualization is the key to developing elastically scalable and fault-tolerant network functions (e.g. load balancer, firewall etc.). By integrating NFV and SDN technologies, it is feasible to dynamically reroute traffic to new network function (NF) instances in the event of an NF failure or overload scenario. The fact that the majority of network functions are stateful makes the task more challenging. State migration and state replication are common approaches in achieving elasticity and fault tolerance. The majority of the studies in the literature either emphasize fault tolerance or elastic scalability while designing a state management system for network functions. In this paper, we have designed a complete state management system, called DEFT, that meets both elasticity and fault-tolerance goals. Our system also supports strong consistency on global state updates. While existing designs rely on a central controller or remote central storage to achieve strong consistency on state updates, DEFT utilizes distributed consensus mechanism to achieve the same. We have done a proof of concept implementation of DEFT and extensively tested DEFT under several model conditions to evaluate its scalability and performance. Our experimental results show that DEFT is scalable and maintains a considerably high throughput throughout. It incurs minimal performance overhead while achieving strong consistency on state updates.
- Rajagopalan, S., Williams, D., Jamjoom, H., Warfield, A.: Split/merge: System support for elastic execution in virtual middleboxes. In: Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pp. 227–240 (2013) Kablan et al. [2017] Kablan, M., Alsudais, A., Keller, E., Le, F.: Stateless network functions: Breaking the tight coupling of state and processing. In: Proccedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pp. 97–112 (2017) Woo et al. [2018] Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kablan, M., Alsudais, A., Keller, E., Le, F.: Stateless network functions: Breaking the tight coupling of state and processing. In: Proccedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pp. 97–112 (2017) Woo et al. [2018] Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Kablan, M., Alsudais, A., Keller, E., Le, F.: Stateless network functions: Breaking the tight coupling of state and processing. In: Proccedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pp. 97–112 (2017) Woo et al. [2018] Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Woo, S., Sherry, J., Han, S., Moon, S., Ratnasamy, S., Shenker, S.: Elastic scaling of stateful network functions. In: Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pp. 299–312 (2018) Rajagopalan et al. [2013] Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Rajagopalan, S., Williams, D., Jamjoom, H.: Pico replication: A high availability framework for middleboxes. In: Proceedings of the 4th Annual Symposium on Cloud Computing, pp. 1–15 (2013) Sherry et al. [2015] Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Sherry, J., Gao, P.X., Basu, S., Panda, A., Krishnamurthy, A., Maciocco, C., Manesh, M., Martins, J., Ratnasamy, S., Rizzo, L., et al.: Rollback-recovery for middleboxes. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 227–240 (2015) Kulkarni et al. [2018] Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Kulkarni, S.G., Liu, G., Ramakrishnan, K., Arumaithurai, M., Wood, T., Fu, X.: Reinforce: Achieving efficient failure resiliency for network function virtualization based services. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, pp. 41–53 (2018) Bailis and Ghodsi [2013] Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Bailis, P., Ghodsi, A.: Eventual consistency today: Limitations, extensions, and beyond. Communications of the ACM 56(5), 55–63 (2013) Burckhardt [2014] Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Burckhardt, S.: Principles of eventual consistency. Foundations and Trends® in Programming Languages 1(1-2), 1–150 (2014) Vogels [2008] Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Vogels, W.: Eventually consistent: Building reliable distributed systems at a worldwide scale demands trade-offs? between consistency and availability. Queue 6(6), 14–19 (2008) Vukolic [2016] Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Vukolic, M.: Eventually returning to strong consistency. IEEE Data Eng. Bull. 39(1), 39–44 (2016) Adve and Gharachorloo [1996] Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Adve, S.V., Gharachorloo, K.: Shared memory consistency models: A tutorial. Computer 29(12), 66–76 (1996) Mosberger [1993] Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Mosberger, D.: Memory consistency models. ACM SIGOPS Operating Systems Review 27(1), 18–26 (1993) Dixit et al. [2013] Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Dixit, A., Hao, F., Mukherjee, S., Lakshman, T., Kompella, R.: Towards an elastic distributed sdn controller. ACM SIGCOMM Computer Communication Review 43(4), 7–12 (2013) Carpenter and Brim [2002] Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Carpenter, B., Brim, S.: Middleboxes: Taxonomy and issues. Technical report, RFC 3234, February (2002) Sherry et al. [2012] Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making middleboxes someone else’s problem: Network processing as a cloud service. ACM SIGCOMM Computer Communication Review 42(4), 13–24 (2012) Szalay et al. [2019] Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Szalay, M., Nagy, M., Géhberger, D., Kiss, Z., Mátray, P., Németh, F., Pongrácz, G., Rétvári, G., Toka, L.: Industrial-scale stateless network functions. In: Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), pp. 383–390 (2019). IEEE Stoica et al. [2003] Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on networking 11(1), 17–32 (2003) S. [1995] S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- S., P.J.: Libckpt : Transparent checkpointing under unix. Proceedings of the Usenix Winter Technical Conference, 213–223 (1995) Cachin et al. [2016] Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Cachin, C., Schubert, S., Vukolić, M.: Non-determinism in byzantine fault-tolerant replication. arXiv preprint arXiv:1603.07351 (2016) Samaras et al. [1995] Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Samaras, G., Britton, K., Citron, A., Mohan, C.: Two-phase commit optimizations in a commercial distributed environment. Distributed and Parallel Databases 3(4), 325–360 (1995) Gill et al. [2011] Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: Proceedings of the ACM SIGCOMM 2011 Conference, pp. 350–361 (2011) Potharaju and Jain [2013] Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Potharaju, R., Jain, N.: Demystifying the dark side of the middle: a field study of middlebox failures in datacenters. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 9–22 (2013) Gunawi et al. [2014] Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Gunawi, H.S., Hao, M., Leesatapornwongsa, T., Patana-anake, T., Do, T., Adityatama, J., Eliazar, K.J., Laksono, A., Lukman, J.F., Martin, V., Satria, A.D.: What bugs live in the cloud? a study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1–14 (2014) Gunawi et al. [2016] Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Gunawi, H.S., Hao, M., Suminto, R.O., Laksono, A., Satria, A.D., Adityatama, J., Eliazar, K.J.: Why does the cloud stop computing? lessons from hundreds of service outages. In: Proceedings of the 7th ACM Symposium on Cloud Computing, pp. 1–16 (2016) Sahoo et al. [2010] Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485–494 (2010). IEEE [27] Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Python’s Queue Module, a Synchronized Queue Class. https://docs.python.org/3/library/queue.html [28] Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Distributed Computation and Storage Platform. https://github.com/hazelcast/hazelcast [29] Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Packet Sender, an Open Source Utility to Allow Sending and Receiving TCP and UDP Packets. https://packetsender.com/ [30] Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Twisted, An Event-driven Networking Engine. https://twisted.org/ Paxson [1999] Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Paxson, V.: Bro: a system for detecting network intruders in real-time. Computer networks 31(23-24), 2435–2463 (1999) [32] Passive Real-time Asset Detection System. https://github.com/gamelinux/prads Passive Real-time Asset Detection System. https://github.com/gamelinux/prads
- Passive Real-time Asset Detection System. https://github.com/gamelinux/prads