{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:47:33Z","timestamp":1760028453258,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":30,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Horizon 2020","award":["647158"],"award-info":[{"award-number":["647158"]}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["1863\/8-1"],"award-info":[{"award-number":["1863\/8-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3341216.3342207","type":"proceedings-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T19:32:36Z","timestamp":1565811156000},"page":"8-14","source":"Crossref","is-referenced-by-count":13,"title":["NetBOA"],"prefix":"10.1145","author":[{"given":"Johannes","family":"Zerwas","sequence":"first","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Patrick","family":"Kalmbach","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Laurenz","family":"Henkel","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"G\u00e1bor","family":"R\u00e9tv\u00e1ri","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics, Hungary"}]},{"given":"Wolfgang","family":"Kellerer","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Andreas","family":"Blenk","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[{"name":"University of Vienna, Austria"}]}],"member":"320","reference":[{"key":"key-10.1145\/3341216.3342207-1","unstructured":"Omid Alipourfard, Hongqiang Harry Liu, Jianshu Chen, Shivaram Venkataraman, Minlan Yu, and Ming Zhang. 2017. CherryPick: Adaptively Unearthing the Best Cloud Configurations for Big Data Analytics. Proc. USENIX NSDI (2017), 469--482."},{"key":"key-10.1145\/3341216.3342207-2","doi-asserted-by":"crossref","unstructured":"Simon Bauer, Daniel Raumer, Paul Emmerich, and Georg Carle. 2018. Behind the scenes: what device benchmarks can tell us. (2018).","DOI":"10.1145\/3232755.3232776"},{"key":"key-10.1145\/3341216.3342207-3","unstructured":"Ryan Beckett, Aarti Gupta, Ratul Mahajan, and David Walker. 2017. A General Approach to Network Configuration Verification. In Proc. ACM SIGCOMM. Los Angeles, CA, USA, 155--168."},{"key":"key-10.1145\/3341216.3342207-4","doi-asserted-by":"crossref","unstructured":"Andreas Blenk, Patrick Kalmbach, Stefan Schmid, and Wolfgang Kellerer. 2017. o'zapft is: Tap Your Network Algorithm's Big Data!. In Proc. ACM SIGCOMM Big-DAMA. Los Angeles, CA, USA.","DOI":"10.1145\/3098593.3098597"},{"key":"key-10.1145\/3341216.3342207-5","doi-asserted-by":"crossref","unstructured":"S. Bradner and J. McQuaid. 1999. Benchmarking Methodology for Network Interconnect Devices. RFC 2544. (March 1999).","DOI":"10.17487\/rfc2544"},{"key":"key-10.1145\/3341216.3342207-6","unstructured":"Levente Csikor, Christian Rothenberg, Dimitrios P. Pezaros, Stefan Schmid, L&#225;szl&#243; Toka, and G&#225;bor R&#233;tv&#225;ri. 2018. Policy Injection: A Cloud Dataplane DoS Attack. In Proc. ACM SIGCOMM Conference on Posters and Demos. Budapest, Hungary, 147--149."},{"key":"key-10.1145\/3341216.3342207-7","unstructured":"Paul Emmerich, Daniel Raumer, Florian Wohlfart, and Georg Carle. 2014. Performance characteristics of virtual switching. In Proc. IEEE CloudNet. IEEE, Luxembourg, Luxembourg, 120--125."},{"key":"key-10.1145\/3341216.3342207-8","unstructured":"Vlad M. Cora Eric Brochu and Nando de Freitas. 2010. \"A Tutorial on Bayesian Optimization of Expensive Cost Functions, with Application to Active User Modeling and Hierarchical Reinforcement Learning\". arXiv preprint (2010). https:\/\/arxiv.org\/pdf\/1012.2599.pdf"},{"key":"key-10.1145\/3341216.3342207-9","unstructured":"Vivian Fang, Tam&#225;s L&#233;vai, Sangjin Han, Sylvia Ratnasamy, Barath Raghavan, and Justine Sherry. 2018. Evaluating Software Switches: Hard or Hopeless? Technical Report. 8 pages."},{"key":"key-10.1145\/3341216.3342207-10","doi-asserted-by":"crossref","unstructured":"Nick Feamster and Jennifer Rexford. 2017. Why (and how) networks should run themselves. arXiv preprint arXiv:1710.11583 (2017).","DOI":"10.1145\/3232755.3234555"},{"key":"key-10.1145\/3341216.3342207-11","unstructured":"Matthias Feurer, Jost Tobias Springenberg, and Frank Hutter. 2015. Initializing Bayesian Hyperparameter Optimization via Meta-learning. In Proc. AAAI (AAAI'15). AAAI Press, Austin, Texas, USA, 1128--1135."},{"key":"key-10.1145\/3341216.3342207-12","unstructured":"Chin-Jung Hsu, Vivek Nair, Tim Menzies, and Vincent W. Freeh. 2018. Scout: An Experienced Guide to Find the Best Cloud Configuration. arXiv:1803.01296 [cs] (March 2018). http:\/\/arxiv.org\/abs\/1803.01296"},{"key":"key-10.1145\/3341216.3342207-13","unstructured":"Danny Yuxing Huang, Kenneth Yocum, and Alex C Snoeren. 2013. High-fidelity switch models for software-defined network emulation. In Proc. of the second ACM SIGCOMM workshop on HotSDN. 43--48."},{"key":"key-10.1145\/3341216.3342207-14","unstructured":"Rishabh Iyer, Luis Pedrosa, Arseniy Zaostrovnykh, Solal Pirelli, Katerina Argyraki, and George Candea. 2019. Performance Contracts for Software Network Functions. In Proc. USENIX NSDI. Boston, MA, USA, 517--530."},{"key":"key-10.1145\/3341216.3342207-15","unstructured":"Michael Jarschel, Simon Oechsner, Daniel Schlosser, Rastin Pries, Sebastian Goll, and Phuoc Tran-Gia. 2011. Modeling and performance evaluation of an OpenFlow architecture. In Proc. ITC. San Francisco, CA, USA, 1--7."},{"key":"key-10.1145\/3341216.3342207-16","doi-asserted-by":"crossref","unstructured":"Patrick Kalmbach, Johannes Zerwas, Peter Babarczi, Andreas Blenk, Wolfgang Kellerer, and Stefan Schmid. 2018. Empowering Self-Driving Networks. In Proc. ACM SIGCOMM 2018 Workshop on Self-Driving Networks (SDN). Budapest, Hungary.","DOI":"10.1145\/3229584.3229587"},{"key":"key-10.1145\/3341216.3342207-17","unstructured":"Wolfgang Kellerer, Patrick Kalmbach, Andreas Blenk, Arsany Basta, Martin Reisslein, and Stefan Schmid. 2019. Adaptable and Data-Driven Softwarized Networks: Review, Opportunities, and Challenges. Proc. IEEE 107, 4 (April 2019), 711--731."},{"key":"key-10.1145\/3341216.3342207-18","unstructured":"Maciej Ku&#378;niar, Peter Pere&#353;&#237;ni, and Dejan Kosti&#263;. 2015. What you need to know about SDN flow tables. In Passive and Active Measurement. Springer, 347--359."},{"key":"key-10.1145\/3341216.3342207-19","unstructured":"Caroline Lemieux, Rohan Padhye, Koushik Sen, and Dawn Song. 2018. Perf-Fuzz: automatically generating pathological inputs. In Proc. ACM SIGSOFT. ACM, Amsterdam, Netherlands, 254--265."},{"key":"key-10.1145\/3341216.3342207-20","unstructured":"T. L&#233;vai, G. Pongr&#225;cz, P. Megyesi, P. V&#246;r&#246;s, S. Laki, F. N&#233;meth, and G. R&#233;tv&#225;ri. 2018. The Price for Programmability in the Software Data Plane: The Vendor Perspective. IEEE Jrnl. on Sel. Ar. in Com. 36, 12 (Dec. 2018), 2621--2630."},{"key":"key-10.1145\/3341216.3342207-21","unstructured":"Jed Liu, William Hallahan, Cole Schlesinger, Milad Sharif, Jeongkeun Lee, Robert Soul&#233;, Han Wang, C&#259;lin Ca&#351;caval, Nick McKeown, and Nate Foster. 2018. P4V: Practical Verification for Programmable Data Planes. In Proc. ACM SIGCOMM. Budapest, Hungary, 490--503."},{"key":"key-10.1145\/3341216.3342207-22","unstructured":"Chenyang Lv, Shouling Ji, Yuwei Li, Junfeng Zhou, Jianhai Chen, Pan Zhou, and Jing Chen. 2018. SmartSeed: Smart Seed Generation for Efficient Fuzzing. arXiv:1807.02606 [cs] (July 2018)."},{"key":"key-10.1145\/3341216.3342207-23","unstructured":"Mark McLeod, Michael A. Osborne, and Stephen J. Roberts. 2018. Optimization, fast and slow: optimally switching between local and Bayesian optimization. arXiv:1805.08610 [cs, stat] (May 2018)."},{"key":"key-10.1145\/3341216.3342207-24","unstructured":"Wei Meng, Chenxiong Qian, Shuang Hao, Kevin Borgolte, Giovanni Vigna, Christopher Kruegel, and Wenke Lee. 2018. Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks. In USENIX Security. Baltimore, MD, USA, 393--410."},{"key":"key-10.1145\/3341216.3342207-25","unstructured":"Luis Pedrosa, Rishabh Iyer, Arseniy Zaostrovnykh, Jonas Fietz, and Katerina Argyraki. 2018. Automated Synthesis of Adversarial Workloads for Network Functions. In Proc. ACM SIGCOMM. Budapest, Hungary, 372--385."},{"key":"key-10.1145\/3341216.3342207-26","unstructured":"Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, and Suman Jana. 2017. SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. In Proc. ACM SIGSAC CCS. Dallas, Texas, USA, 2155--2168."},{"key":"key-10.1145\/3341216.3342207-27","unstructured":"Ben Pfaff, Justin Pettit, Teemu Koponen, Ethan Jackson, Andy Zhou, Jarno Rajahalme, Jesse Gross, Alex Wang, Joe Stringer, Pravin Shelar, Keith Amidon, and Martin Casado. 2015. The Design and Implementation of Open vSwitch. In Proc. USENIX NSDI. Oakland, CA, USA, 117--130."},{"key":"key-10.1145\/3341216.3342207-28","unstructured":"Daniel Raumer, Sebastian Gallenm&#252;ller, Florian Wohlfart, Paul Emmerich, Patrick Werneck, and Georg Carle. 2016. Revisiting benchmarking methodology for interconnect devices. In Proc. ACM ANRW. Berlin, Germany, 55--61."},{"key":"key-10.1145\/3341216.3342207-29","unstructured":"Jasper Snoek, Hugo Larochelle, and Ryan P. Adams. 2012. Practical Bayesian Optimization of Machine Learning Algorithms. arXiv:1206.2944 [cs, stat] (June 2012). http:\/\/arxiv.org\/abs\/1206.2944 arXiv: 1206.2944."},{"key":"key-10.1145\/3341216.3342207-30","unstructured":"Jiayi Wei, Jia Chen, Yu Feng, Kostas Ferles, and Isil Dillig. 2018. Singularity: Pattern Fuzzing for Worst Case Complexity. In Proc. ACM ESEC\/FSE. ACM, Lake Buena Vista, FL, USA, 213--223."}],"event":{"name":"the 2019 Workshop","start":{"date-parts":[[2019,8,23]]},"sponsor":["SIGCOMM, ACM Special Interest Group on Data Communication"],"location":"Beijing, China","end":{"date-parts":[[2019,8,23]]},"acronym":"NetAI'19"},"container-title":["Proceedings of the 2019 Workshop on Network Meets AI &amp; ML  - NetAI'19"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341216.3342207","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3342207&ftid=2079901&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:26Z","timestamp":1750202606000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3341216.3342207"}},"subtitle":["Self-Driving Network Benchmarking"],"proceedings-subject":"Network Meets AI & ML","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1145\/3341216.3342207","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}