End-to-end routing behavior in the Internet
IEEE/ACM Transactions on Networking (TON)
The end-to-end effects of Internet path selection
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Delayed Internet routing convergence
IEEE/ACM Transactions on Networking (TON)
On inferring autonomous system relationships in the internet
IEEE/ACM Transactions on Networking (TON)
On the marginal utility of network topology measurements
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
An analysis of BGP multiple origin AS (MOAS) conflicts
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
Understanding BGP misconfiguration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
On the correctness of IBGP configuration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Measuring ISP topologies with rocketfuel
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
User-level internet path diagnosis
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Reverse engineering the Internet
ACM SIGCOMM Computer Communication Review
Locating internet bottlenecks: algorithms, measurements, and implications
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
A comparison of overlay routing and multihoming route control
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Identifying IPv6 network problems in the dual-stack world
Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality
A measurement framework for pin-pointing routing changes
Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality
The case for separating routing from routers
Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Exploiting as hierarchy for scalable route selection in multi-homed stub networks
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Location diversity in anonymity networks
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
ATMEN: a triggered network measurement infrastructure
WWW '05 Proceedings of the 14th international conference on World Wide Web
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Algorithmic foundations of the internet
ACM SIGACT News
Bounded-Latency Content Distribution: Feasibility and Evaluation
IEEE Transactions on Computers
The internet AS-level topology: three data sources and one definitive metric
ACM SIGCOMM Computer Communication Review
Scalable routing overlay networks
ACM SIGOPS Operating Systems Review
Locality in structured peer-to-peer networks
Journal of Parallel and Distributed Computing
Building an AS-topology model that captures route diversity
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Touring the internet in a TCP sidecar
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Exploiting internet route sharing for large scale available bandwidth estimation
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Flooding attacks by exploiting persistent forwarding loops
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Listen and whisper: security mechanisms for BGP
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
PlanetSeer: internet path failure monitoring and characterization in wide-area services
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Truth in advertising: lightweight verification of route integrity
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
An active approach to measuring routing dynamics induced by autonomous systems
Proceedings of the 2007 workshop on Experimental computer science
In search for an appropriate granularity to model routing policies
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
A study of prefix hijacking and interception in the internet
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
A light-weight distributed scheme for detecting ip prefix hijacks in real-time
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Observing the evolution of internet as topology
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Investigating prefix propagation through active BGP probing
Microprocessors & Microsystems
An active approach to measuring routing dynamics induced by autonomous systems
ecs'07 Experimental computer science on Experimental computer science
A measurement study of persistent forwarding loops on the Internet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Measuring load-balanced paths in the internet
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Testing the reachability of (new) address space
Proceedings of the 2007 SIGCOMM workshop on Internet network management
Detection, understanding, and prevention of traceroute measurement artifacts
Computer Networks: The International Journal of Computer and Telecommunications Networking
NetDiagnoser: troubleshooting network unreachabilities using end-to-end probes and routing data
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Economizing Isp Interconnections At Internet Exchange Points
Journal of Integrated Design & Process Science
In search of the elusive ground truth: the internet's as-level connectivity structure
SIGMETRICS '08 Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Effective diagnosis of routing disruptions from end systems
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Passport: secure and adoptable source authentication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Rationality and traffic attraction: incentives for honest path announcements in bgp
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Discarte: a disjunctive internet cartographer
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Ispy: detecting ip prefix hijacking on my own
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet
IPOM '08 Proceedings of the 8th IEEE international workshop on IP Operations and Management
Enhancing end-to-end availability and performance via topology-aware overlay networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cyclops: the AS-level connectivity observatory
ACM SIGCOMM Computer Communication Review
Traceroute probe method and forward IP path inference
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution
Information Networking. Towards Ubiquitous Networking and Services
Fast autonomous system traceback
Journal of Network and Computer Applications
Lord of the links: a framework for discovering missing links in the internet topology
IEEE/ACM Transactions on Networking (TON)
Reliable publish/subscribe middleware for time-sensitive internet-scale applications
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems
Impact of prefix-match changes on IP reachability
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Internet optometry: assessing the broken glasses in internet reachability
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
An efficient algorithm for AS path inferring
Proceedings of the 2009 International Conference on Hybrid Information Technology
As-awareness in Tor path selection
Proceedings of the 16th ACM conference on Computer and communications security
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users
Proceedings of the 5th international conference on Emerging networking experiments and technologies
A reactive measurement framework
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Stealthy IP prefix hijacking: don't bite off more than you can chew
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
IP prefix hijacking detection using idle scan
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
The (in)completeness of the observed internet AS-level structure
IEEE/ACM Transactions on Networking (TON)
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
TopBT: a topology-aware and infrastructure-independent bittorrent client
INFOCOM'10 Proceedings of the 29th conference on Information communications
NetFence: preventing internet denial of service from inside out
Proceedings of the ACM SIGCOMM 2010 conference
Deconstructing internet paths: an approach for AS-level detour route discovery
IPTPS'09 Proceedings of the 8th international conference on Peer-to-peer systems
Locating prefix hijackers using LOCK
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Extracting intra-domain topology from mrinfo probing
PAM'10 Proceedings of the 11th international conference on Passive and active measurement
Quantifying the pitfalls of traceroute in AS connectivity inference
PAM'10 Proceedings of the 11th international conference on Passive and active measurement
Toward topology dualism: improving the accuracy of AS annotations for routers
PAM'10 Proceedings of the 11th international conference on Passive and active measurement
Measured impact of crooked traceroute
ACM SIGCOMM Computer Communication Review
Phase changes in the evolution of the IPv4 and IPv6 AS-Level Internet topologies
Computer Communications
Scalable and systematic Internet-wide path and delay estimation from existing measurements
Computer Networks: The International Journal of Computer and Telecommunications Networking
iSPY: detecting IP prefix hijacking on my own
IEEE/ACM Transactions on Networking (TON)
The case for an internet health monitoring system
HotDep'05 Proceedings of the First conference on Hot topics in system dependability
A systematic framework for unearthing the missing links: measurements and impact
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Predicting and tracking internet path changes
Proceedings of the ACM SIGCOMM 2011 conference
Measuring multipath routing in the internet
IEEE/ACM Transactions on Networking (TON)
Assessing IPv6 through web access a measurement study and its findings
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
Verifying and enforcing network paths with icing
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
Revisiting IP-to-AS mapping for AS-level traceroute
Proceedings of The ACM CoNEXT Student Workshop
Efficient blacklisting and pollution-level estimation in p2p file-sharing systems
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
Plethora: an efficient wide-area storage system
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
Algorithmic foundations of the internet: roundup
CAAN'04 Proceedings of the First international conference on Combinatorial and Algorithmic Aspects of Networking
Revisiting internet AS-level topology discovery
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Interdomain ingress traffic engineering through optimized AS-Path prepending
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
End-user perspectives of Internet connectivity problems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Border gateway protocol (BGP) and traceroute data workshop report
ACM SIGCOMM Computer Communication Review
Inferring visibility: who's (not) talking to whom?
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
Inferring visibility: who's (not) talking to whom?
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
A novel and efficient source-path discovery and maintenance method for application layer multicast
Computers and Electrical Engineering
Characterizing large-scale routing anomalies: a case study of the china telecom incident
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
PoiRoot: investigating the root cause of interdomain path changes
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Internet atlas: a geographic database of the internet
Proceedings of the 5th ACM workshop on HotPlanet
Don't trust traceroute (completely)
Proceedings of the 2013 workshop on Student workhop
DataTraffic Monitoring and Analysis
Journal of Network and Computer Applications
Hi-index | 0.00 |
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes) along the forwarding path would make traceroute even more valuable to researchers and network operators. However, conventional approaches to mapping traceroute hops to AS numbers are not accurate enough. Address registries are often incomplete and out-of-date. BGP routing tables provide a better IP-to-AS mapping, though this approach has significant limitations as well. Based on our extensive measurements, about 10% of the traceroute paths have one or more hops that do not map to a unique AS number, and around 15% of the traceroute AS paths have an AS loop. In addition, some traceroute AS paths have extra or missing AS hops due to Internet eXchange Points, sibling ASes managed by the same institution, and ASes that do not advertise routes to their infrastructure. Using the BGP tables as a starting point, we propose techniques for improving the IP-to-AS mapping as an important step toward an AS-level traceroute tool. Our algorithms draw on analysis of traceroute probes, reverse DNS lookups, BGP routing tables, and BGP update messages collected from multiple locations. We also discuss how the improved IP-to-AS mapping allows us to home in on cases where the BGP and traceroute AS paths differ for legitimate reasons.