End-to-end routing behavior in the Internet
IEEE/ACM Transactions on Networking (TON)
IEEE/ACM Transactions on Networking (TON)
Understanding BGP misconfiguration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Measuring ISP topologies with rocketfuel
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Route flap damping exacerbates internet routing convergence
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Quantifying Network Denial of Service: A Location Service Case Study
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Towards an accurate AS-level traceroute tool
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Towards capturing representative AS-level Internet topologies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Locating internet routing instabilities
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
An empirical study of "bogon" route advertisements
ACM SIGCOMM Computer Communication Review
Efficient algorithms for large-scale topology discovery
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
DIMES: let the internet measure itself
ACM SIGCOMM Computer Communication Review
A measurement study on the impact of routing events on end-to-end internet path performance
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Avoiding traceroute anomalies with Paris traceroute
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
The spoofer project: inferring the extent of source address filtering on the internet
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
PHAS: a prefix hijack alert system
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Observing the evolution of internet as topology
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
In search of the elusive ground truth: the internet's as-level connectivity structure
SIGMETRICS '08 Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Discarte: a disjunctive internet cartographer
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Census and survey of the visible internet
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Bigfoot, sasquatch, the yeti and other missing links: what we don't know about the as graph
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Internet Mapping: From Art to Science
CATCH '09 Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security
INTERNET TOPOLOGY DISCOVERY: A SURVEY
IEEE Communications Surveys & Tutorials
BGP routing policies in ISP networks
IEEE Network: The Magazine of Global Internetworking
Pitfalls for testbed evaluations of internet systems
ACM SIGCOMM Computer Communication Review
Impact of routing parameters on route diversity and path inflation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Selecting representative IP addresses for internet topology studies
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Prediction models for long-term Internet prefix availability
Computer Networks: The International Journal of Computer and Telecommunications Networking
FACT: flow-based approach for connectivity tracking
PAM'11 Proceedings of the 12th international conference on Passive and active measurement
Predicting and tracking internet path changes
Proceedings of the ACM SIGCOMM 2011 conference
Analysis of country-wide internet outages caused by censorship
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Machiavellian routing: improving internet availability with BGP poisoning
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
LIFEGUARD: practical repair of persistent route failures
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
LIFEGUARD: practical repair of persistent route failures
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
Quantifying the benefits of joint content and network routing
Proceedings of the ACM SIGMETRICS/international conference on Measurement and modeling of computer systems
Trinocular: understanding internet reliability through adaptive probing
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
PoiRoot: investigating the root cause of interdomain path changes
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Towards an efficient verification approach on network configuration
Proceedings of the 8th International Conference on Network and Service Management
RiskRoute: a framework for mitigating network outage threats
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
Hi-index | 0.00 |
Reachability is thought of as the most basic service provided by today's Internet. Unfortunately, this does not imply that the community has a deep understanding of it. Researchers and operators rely on two views of reachability: control/routing- and data-plane measurements, but both types of measurements suffer from biases and limitations. In this paper, we illustrate some of these biases, and show how to design controlled experiments which allow us to "see" through the limitations of previous measurement techniques. For example, we discover the extent of default routing and its impact on reachability. This explains some of the previous unexpected results from studies that compared control- and data-plane measurements. However, not all limitations of visibility given by routing and probing tools can be compensated for by methodological improvements. We will show in this paper, that some of the limitations can be carefully addressed when designing an experiment, e.g. not seeing the reverse path taken by a probe can be partly compensated for by our methodology, called dual probing. However, compensating for other biases through more measurements may not always be possible. Therefore, calibration of expectations and checks of assumptions are critical when conducting measurements that aim at making conclusions about topological properties of the Internet.