{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:49:12Z","timestamp":1742982552092,"version":"3.40.3"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030440800"},{"type":"electronic","value":"9783030440817"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44081-7_6","type":"book-chapter","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T12:02:38Z","timestamp":1584446558000},"page":"88-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A First Look at the Misuse and Abuse of the IPv4 Transfer Market"],"prefix":"10.1007","author":[{"given":"Vasileios","family":"Giotsas","sequence":"first","affiliation":[]},{"given":"Ioana","family":"Livadariu","sequence":"additional","affiliation":[]},{"given":"Petros","family":"Gigis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,18]]},"reference":[{"key":"6_CR1","unstructured":"IPv4 Market Group. https:\/\/ipv4marketgroup.com\/broker-services\/buy"},{"key":"6_CR2","unstructured":"PeeringDB. https:\/\/www.peeringdb.com"},{"key":"6_CR3","unstructured":"AFRINIC: IPv4 Resources transfer within the AFRINIC Region. http:\/\/bit.ly\/2sFjUZu"},{"issue":"7","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1007\/s00521-015-2128-0","volume":"28","author":"K Alieyan","year":"2017","unstructured":"Alieyan, K., ALmomani, A., Manasrah, A., Kadhum, M.M.: A survey of botnet detection based on DNS. Neural Comput. Appl. 28(7), 1541\u20131558 (2017)","journal-title":"Neural Comput. Appl."},{"key":"6_CR5","unstructured":"Anderson, T., Hutty, M.: Post depletion adjustment of procedures to match policy objectives, and clean-up of obsolete policy text. RIPE policy proposal, November 2013"},{"key":"6_CR6","unstructured":"APNIC: APNIC transfer, merger, acquisition, and takeover policy (2010). https:\/\/www.apnic.net\/policy\/transfer-policy_obsolete"},{"key":"6_CR7","unstructured":"APNIC blog, Huberman, D.: Seven steps to successful IPv4 transfers (2017)"},{"key":"6_CR8","unstructured":"APNIC blog, Huston, G.: IPv4 Address Exhaustion in APNIC (2015). https:\/\/blog.apnic.net\/2015\/08\/07\/ipv4-address-exhaustion-in-apnic"},{"key":"6_CR9","unstructured":"ARIN: ARIN Number Resource Policy Manual (Version 2010.1) (2009). https:\/\/www.arin.net\/policy\/nrpm.html"},{"key":"6_CR10","unstructured":"ARIN: ARIN Number Resource Policy Manual (Version 2012.3) (2012). https:\/\/www.arin.net\/policy\/nrpm.html"},{"key":"6_CR11","unstructured":"BadPackets: Cyber-Threat Intelligence: Botnet C2 Detections (2019). https:\/\/badpackets.net\/botnet-c2-detections"},{"key":"6_CR12","unstructured":"BinaryEdge: HoneyPots\/Sensors (2019). https:\/\/www.binaryedge.io\/data.html"},{"issue":"3","key":"6_CR13","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/3276799.3276801","volume":"48","author":"T B\u00f6ttger","year":"2018","unstructured":"B\u00f6ttger, T., Cuadrado, F., Uhlig, S.: Looking for hypergiants in peeringDB. ACM SIGCOMM Comput. Commun. Rev. 48(3), 13\u201319 (2018)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"6_CR14","unstructured":"CAIDA: Inferred AS to Organization Mapping Dataset. http:\/\/www.caida.org\/data\/as_organizations.xml"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Cho, S., Fontugne, R., Cho, K., Dainotti, A., Gill, P.: BGP hijacking classification. In: 2019 TMA, pp. 25\u201332. IEEE (2019)","DOI":"10.23919\/TMA.2019.8784511"},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2567561.2567568","volume":"44","author":"A Dainotti","year":"2013","unstructured":"Dainotti, A., et al.: Estimating internet address space usage through passive measurements. SIGCOMM Comput. Commun. Rev. 44(1), 42\u201349 (2013)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"6_CR17","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-03821-1_16","volume-title":"Auctions, Market Mechanisms and Their Applications","author":"B Edelman","year":"2009","unstructured":"Edelman, B.: Running out of numbers: scarcity of IP addresses and what to do about it. In: Das, S., Ostrovsky, M., Pennock, D., Szymanksi, B. (eds.) AMMA 2009. LNICST, vol. 14, pp. 95\u2013106. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03821-1_16"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Heidemann, J., Pradkin, Y., Govindan, R., Papadopoulos, C., Bartlett, G., Bannister, J.: Census and survey of the visible internet. In: Proceedings of the ACM Internet Measurement Conference, pp. 169\u2013182. ACM, October 2008","DOI":"10.1145\/1452520.1452542"},{"key":"6_CR19","unstructured":"Huberman, D.: Smarter purchasing of IPv4 addresses in the market. NANOG 68, October 2016. http:\/\/bit.ly\/36H7LkJ"},{"key":"6_CR20","unstructured":"Huston, G.: How Big is that Network? October 2014. http:\/\/bit.ly\/367t6DD"},{"key":"6_CR21","unstructured":"Huston, G.: IPv4 Address Report, October 2019. https:\/\/ipv4.potaroo.net"},{"key":"6_CR22","unstructured":"Huston, G.: IPv6\/IPv4 Comparative Statistics, October 2019. http:\/\/bit.ly\/36G7sGN"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.comcom.2017.07.012","volume":"111","author":"I Livadariu","year":"2017","unstructured":"Livadariu, I., Elmokashfi, A., Dhamdhere, A.: On IPv4 transfer markets: analyzing reported transfers and inferring transfers in the wild. Comput. Commun. 111, 105\u2013119 (2017)","journal-title":"Comput. Commun."},{"key":"6_CR24","unstructured":"Internet Archive: Wayback Machine (2001). https:\/\/archive.org\/web"},{"key":"6_CR25","unstructured":"IPv4 Brokers: IPv4 blacklist removal service. https:\/\/ipv4brokers.net\/ipv4-sales"},{"key":"6_CR26","unstructured":"IPv4 Market Group: IPv4 blacklist removal service. http:\/\/bit.ly\/37dfDM3"},{"issue":"4","key":"6_CR27","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1145\/2829988.2787494","volume":"45","author":"M Konte","year":"2015","unstructured":"Konte, M., Perdisci, R., Feamster, N.: ASwatch: an as reputation system to expose bulletproof hosting ASes. ACM SIGCOMM CCR 45(4), 625\u2013638 (2015)","journal-title":"ACM SIGCOMM CCR"},{"key":"6_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-11379-1_1","volume-title":"Research in Attacks, Intrusions and Defenses","author":"M K\u00fchrer","year":"2014","unstructured":"K\u00fchrer, M., Rossow, C., Holz, T.: Paint it black: evaluating the effectiveness of malware blacklists. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 1\u201321. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11379-1_1"},{"key":"6_CR29","unstructured":"LACNIC: One-way interregional transfers to LACNIC (2017). http:\/\/bit.ly\/369F5kd"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Lehr, W., Vest, T., Lear, E.: Running on empty: the challenge of managing internet addresses. In: TPRC (2008)","DOI":"10.2139\/ssrn.3498649"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V., et al.: AS relationships, customer cones, and validation. In: Proceedings of the 2013 ACM IMC (2013)","DOI":"10.1145\/2504730.2504735"},{"key":"6_CR32","unstructured":"Torres, M.: Purchasing IPv4 space - due diligence homework. NANOG mailing list, March 2018. http:\/\/bit.ly\/36L5Trg"},{"key":"6_CR33","unstructured":"McMillen, D.: The inside story on botnets. IBM X-Force Research, September 2016"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Mueller, M., Kuerbis, B.: Buying numbers: an empirical analysis of the IPv4 number market. In: Proceedings of iConference (2013)","DOI":"10.1108\/info-07-2013-0039"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Mueller, M., Kuerbis, B., Asghari, H.: Dimensioning the elephant: an empirical analysis of the IPv4 number market. In: GigaNet: Global Internet Governance Academic Network, Annual Symposium (2012)","DOI":"10.1108\/info-07-2013-0039"},{"issue":"1\u20134","key":"6_CR36","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/BF01840446","volume":"1","author":"EW Myers","year":"1986","unstructured":"Myers, E.W.: An O(ND) difference algorithm and its variations. Algorithmica 1(1\u20134), 251\u2013266 (1986)","journal-title":"Algorithmica"},{"key":"6_CR37","unstructured":"NANOG 68, Potter, A.: How to Navigate Getting IPv4 Space in a Post-Run-Out World (2017)"},{"key":"6_CR38","unstructured":"Nobile, L.: Who is accuracy. ARIN 39, April 2017"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: ACM SIGCOMM CCR, vol. 36, pp. 291\u2013302. ACM (2006)","DOI":"10.1145\/1151659.1159947"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., Feamster, N., Vempala, S.: Filtering spam with behavioral blacklisting. In: Proceedings of the 14th ACM conference CCS. ACM (2007)","DOI":"10.1145\/1315245.1315288"},{"key":"6_CR41","unstructured":"RAPID7: Project Sonar TCP Scans. RAPID7 Open Data (2019). https:\/\/opendata.rapid7.com\/sonar.tcp"},{"key":"6_CR42","unstructured":"RAPID7: Project Sonar UDP Scans. RAPID7 Open Data (2019). https:\/\/opendata.rapid7.com\/sonar.udp"},{"key":"6_CR43","unstructured":"Reddit Networking: What are your experiences with the IPv4 secondary market? March 2018. https:\/\/tinyurl.com\/yyumhax5"},{"issue":"2","key":"6_CR44","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/2766330.2766335","volume":"45","author":"P Richter","year":"2015","unstructured":"Richter, P., Allman, M., Bush, R., Paxson, V.: A primer on IPv4 scarcity. SIGCOMM Comput. Commun. Rev. 45(2), 21\u201331 (2015). http:\/\/bit.ly\/3b2878Q","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Richter, P., Smaragdakis, G., Plonka, D., Berger, A.: Beyond counting: new perspectives on the active IPv4 address space. In: Proceedings of the 2016 ACM IMC (2016)","DOI":"10.1145\/2987443.2987473"},{"key":"6_CR46","unstructured":"RIPE: Routing Information Service (RIS). http:\/\/www.ripe.net\/ris"},{"key":"6_CR47","unstructured":"RIPE Labs, Wilhem, R.: Developments in IPv4 Transfers (2016). https:\/\/labs.ripe.net\/Members\/wilhelm\/developments-in-ipv4-transfers"},{"key":"6_CR48","unstructured":"RIPE Labs, Wilhem, R.: Impact of IPv4 Transfers on Routing Table Fragmentation (2016). http:\/\/bit.ly\/30NCBHj"},{"key":"6_CR49","unstructured":"RIPE Labs, Wilhem, R.: Trends in RIPE NCC Service Region IPv4 Transfers (2017). https:\/\/labs.ripe.net\/Members\/wilhelm\/trends-in-ipv4-transfers"},{"key":"6_CR50","unstructured":"RIPE Labs, Wilhem, R.: A Shrinking Pie? The IPv4 Transfer Market in 2017 (2018). http:\/\/bit.ly\/2topCQ1"},{"key":"6_CR51","unstructured":"RIPE NCC: Intra-RIR Transfer Policy Proposal (2012). https:\/\/www.ripe.net\/participate\/policies\/proposals\/2012-03"},{"key":"6_CR52","unstructured":"RIPE NCC: Inter-RIR Transfers (2015). http:\/\/bit.ly\/2v8kShV"},{"key":"6_CR53","unstructured":"RIPE NCC: RIPE Stat Data API: Blacklists (2019). http:\/\/bit.ly\/2SafbId"},{"key":"6_CR54","unstructured":"RIPE NCC Address Policy Working Group: ASNs of organizations in reported IPv4 transfers. https:\/\/bit.ly\/2v8Krzp"},{"issue":"1","key":"6_CR55","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TNET.2011.2157699","volume":"20","author":"CA Shue","year":"2012","unstructured":"Shue, C.A., Kalafut, A.J., Gupta, M.: Abnormally malicious autonomous systems and their internet connectivity. IEEE\/ACM TON 20(1), 220\u2013230 (2012)","journal-title":"IEEE\/ACM TON"},{"key":"6_CR56","doi-asserted-by":"crossref","unstructured":"Sinha, S., Bailey, M., Jahanian, F.: Shades of grey: on the effectiveness of reputation-based \u201cblacklists\u201d. In: 3rd International Conference on Malicious and Unwanted Software (MALWARE), pp. 57\u201364. IEEE (2008)","DOI":"10.1109\/MALWARE.2008.4690858"},{"key":"6_CR57","unstructured":"Spamhaus: Don\u2019t Route Or Peer List (DROP). https:\/\/www.spamhaus.org\/drop"},{"key":"6_CR58","unstructured":"Streambank, H.: IPv4 Auctions. https:\/\/auctions.ipv4.global"},{"key":"6_CR59","unstructured":"WatchGuard Technologies: Internet Security Report: Q2 2019, September 2019"},{"key":"6_CR60","doi-asserted-by":"crossref","unstructured":"Testart, C., Richter, P., King, A., Dainotti, A., Clark, D.: Profiling BGP serial hijackers: capturing persistent misbehavior in the global routing table. In: Proceedings of the Internet Measurement Conference, pp. 420\u2013434. ACM (2019)","DOI":"10.1145\/3355369.3355581"},{"key":"6_CR61","unstructured":"UCEPROTECT: Network Project. http:\/\/www.uceprotect.net\/en"},{"key":"6_CR62","unstructured":"University of Oregon: The Route Views Project. http:\/\/www.routeviews.org"},{"key":"6_CR63","unstructured":"VirusTotal: Online Virus Malware and URL scanner. https:\/\/www.virustotal.com"},{"key":"6_CR64","doi-asserted-by":"crossref","unstructured":"Zhao, B.Z.H., Ikram, M., Asghar, H.J., Kaafar, M.A., Chaabane, A., Thilakarathna, K.: A decade of mal-activity reporting: a retrospective analysis of internet malicious activity blacklists. In: ASIACCS, pp. 193\u2013205. ACM (2019)","DOI":"10.1145\/3321705.3329834"},{"issue":"4","key":"6_CR65","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/3191329","volume":"51","author":"Y Zhauniarovich","year":"2018","unstructured":"Zhauniarovich, Y., Khalil, I., Yu, T., Dacier, M.: A survey on malicious domains detection through DNS data analysis. ACM Comput. Surv. 51(4), 67 (2018)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44081-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T17:54:08Z","timestamp":1614880448000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44081-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030440800","9783030440817"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44081-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Eugene, OR","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pam2020.cs.uoregon.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"JEMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}