{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T17:34:26Z","timestamp":1771522466195,"version":"3.50.1"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319155081","type":"print"},{"value":"9783319155098","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15509-8_16","type":"book-chapter","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T07:09:05Z","timestamp":1425366545000},"page":"206-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Internet Outages, the Eyewitness Accounts: Analysis of the Outages Mailing List"],"prefix":"10.1007","author":[{"given":"Ritwik","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Abbas","family":"Razaghpanah","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Chiang","sequence":"additional","affiliation":[]},{"given":"Akassh","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[]},{"given":"Yejin","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Phillipa","family":"Gill","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,4]]},"reference":[{"key":"16_CR1","unstructured":"Deep inside a DNS amplification DDoS Attack. http:\/\/blog.cloudflare.com\/deep-inside-a-dns-amplification-ddos-attack"},{"key":"16_CR2","unstructured":"FCC network outage reporting system (NORS). http:\/\/transition.fcc.gov\/pshs\/services\/cip\/nors\/nors.html"},{"key":"16_CR3","unstructured":"Spamhaus DDoS grows to internet-threatening size. http:\/\/arstechnica.com\/security\/2013\/03\/spamhaus-ddos-grows-to-internet-threatening-size\/"},{"key":"16_CR4","unstructured":"Stanford corenlp. http:\/\/nlp.stanford.edu\/software\/corenlp.shtml"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Alimi, R., Wang, Y., Yang, Y.R.: Shadow configuration as a network management primitive. In: SIGCOMM (2008)","DOI":"10.1145\/1402958.1402972"},{"key":"16_CR6","first-page":"27","volume":"2","author":"S Basu","year":"2002","unstructured":"Basu, S., Banerjee, A., Mooney, R.J.: Semi-supervised clustering by seeding. Int. Conf. Mach. Learn. 2, 27\u201334 (2002)","journal-title":"Int. Conf. Mach. Learn."},{"key":"16_CR7","unstructured":"Benson, T., Sahu, S., Akella, A., Shaikh, A.: A first look at problems in the cloud. In: HotCloud (2010)"},{"key":"16_CR8","unstructured":"Brandenburg, M.: Determining the impact of wide area network outages. http:\/\/searchenterprisewan.techtarget.com\/feature\/Determining-the-impact-of-wide-area-network-outages"},{"key":"16_CR9","unstructured":"Brodkin, J.: Amazon ec2 outage calls \u2018availability zones\u2019 into question. http:\/\/www.networkworld.com\/news\/2011\/042111-amazon-ec2-zones.html (2011)"},{"key":"16_CR10","unstructured":"Growing business dependence on the internet: new risks require CEO action. http:\/\/businessroundtable.org\/sites\/default\/files\/200709_Growing_Business_Dependence_on_the_Internet.pdf (2007)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Chen, X., Mao, Y., Mao, Z.M., van de Merwe, K: Declarative configuration management for complex and dynamic networks. In: CoNEXT (2010)","DOI":"10.1145\/1921168.1921176"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Cheng, Y.-C., Bellardo, J., Benko, P., Snoeren, A., Voelker, G., Savage, S.: Jigsaw: solving the puzzle of enterprise 802.11 analysis. In: SIGCOMM (2006)","DOI":"10.1145\/1159913.1159920"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Choffnes, D., Bustamante, F., Ge. Z.: Crowdsourcing service-level network event detection. In: SIGCOMM (2010)","DOI":"10.1145\/1851182.1851228"},{"key":"16_CR14","unstructured":"Cowie, J.: Renesys blog: China\u2019s 18-minute mystery. http:\/\/www.renesys.com\/blog\/2010\/11\/chinas-18-minute-mystery.shtml"},{"key":"16_CR15","unstructured":"Darrow, B.: Superstorm Sandy wreaks havoc on internet infrastructure. https:\/\/gigaom.com\/2012\/10\/30\/superstorm-sandy-wreaks-havoc-on-internet-infrastructure\/ (2012)"},{"key":"16_CR16","unstructured":"Dimitropoulos, X., Djatmiko, M.: Analysis of outage posts in the nanog and outages mailing lists. https:\/\/tnc2013.terena.org\/core\/presentation\/146 (2013)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Ding, C., Li, T., Peng, W., Park, H.: Orthogonal nonnegative matrix t-factorizations for clustering. In: Proceedings of KDD (2006)","DOI":"10.1145\/1150402.1150420"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Dynes, S., Andrijcic, E., Johnson, M.E.: Costs to the US economy of information infrastructure failures: estimates from field studies and economic data. In: WEIS (2006)","DOI":"10.1108\/09574090710835147"},{"key":"16_CR19","first-page":"1871","volume":"9","author":"R-E Fan","year":"2008","unstructured":"Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J.: Liblinear: a library for large linear classification. J. Mach. Learn. Res. 9, 1871\u20131874 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"16_CR20","unstructured":"Feamster, N., Balakrishnan, H.: Detecting BGP configuration faults with static analysis. In: Sigcomm (2005)"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by gibbs sampling. In: Proceedings of ACL (2005)","DOI":"10.3115\/1219840.1219885"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. In: SIGCOMM (2011)","DOI":"10.1145\/2018436.2018477"},{"key":"16_CR23","unstructured":"Japkowicz, N.: The class imbalance problem: significance and strategies. In: Proceedings of the International Conference on Artificial Intelligence, Citeseer (2000)"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Javed, U., Cunha, I., Choffnes, D.R., Katz-Bassett, E., Anderson, T., Krishnamurthy, A.: PoiRoot: investigating the root cause of interdomain path changes. In: SIGCOMM (2013)","DOI":"10.1145\/2486001.2486036"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Kandula, S., Mahajan, R., Verkaik, P., Agarwal, S., Padhye, J., Bahl, P.: Detailed diagnosis in enterprise networks. In: SIGCOMM (2010)","DOI":"10.1145\/1592568.1592597"},{"key":"16_CR26","unstructured":"Katz-Bassett, E., Madhyastha, H., John, J., Krishnamurthy, A., Wetherall, D., Anderson, T.: Studying black holes in the internet with hubble. In: NSDI (2008)"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Katz-Bassett, E., Scott, C., Choffnes, D.R., Cunha, I., Valancius, V., Feamster, N., Madhyastha, H.V., Anderson, T., Krishnamurthy, A.: LIFEGUARD: Practical repair of persistent route failures. In: SIGCOMM (2012)","DOI":"10.1145\/2342356.2342435"},{"key":"16_CR28","first-page":"179","volume":"97","author":"M Kubat","year":"1997","unstructured":"Kubat, M., Matwin, S., et al.: Addressing the curse of imbalanced training sets: one-sided selection. Int. Conf. Mach. Learn. 97, 179\u2013186 (1997)","journal-title":"Int. Conf. Mach. Learn."},{"issue":"1","key":"16_CR29","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis, J.R., Koch, G.G., et al.: The measurement of observer agreement for categorical data. Biometrics 33(1), 159\u2013174 (1977)","journal-title":"Biometrics"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Mahimkar, A., Song, H.H., Ge, Z., Shaikh, A., Wang, J., Yates, J., Zhang, Y., Emmons, J.: Detecting the performance impact of upgrades in large operational networks. In: Sigcomm (2010)","DOI":"10.1145\/1851182.1851219"},{"key":"16_CR31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval, vol. 1. Cambridge University Press, Cambridge (2008)"},{"issue":"4","key":"16_CR32","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/TNET.2007.902727","volume":"16","author":"A Markopoulou","year":"2008","unstructured":"Markopoulou, A., Iannaccone, G., Bhattacharyya, S., Chuah, C.-N., Ganjali, Y., Diot, C.: Characterization of failures in an operational IP backbone network. IEEE\/ACM ToN 16(4), 749\u2013762 (2008)","journal-title":"IEEE\/ACM ToN"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Padmanabhan, V., Ramabhadran, S., Agarwal, S., Padhye, J.: A study of end-to-end web access failures. In: CoNEXT (2006)","DOI":"10.1145\/1368436.1368457"},{"key":"16_CR34","unstructured":"cost of data center outages. http:\/\/www.emersonnetworkpower.com\/documentation\/en-us\/brands\/liebert\/documents\/white%20papers\/2013_emerson_data_center_cost_downtime_sl-24680.pdf (2013)"},{"key":"16_CR35","unstructured":"Prince, M.: How to launch a 65Gbps DDoS, and how to stop one. http:\/\/blog.cloudflare.com\/65gbps-ddos-no-problem (2012)"},{"key":"16_CR36","unstructured":"Ramos, J.: Using TF-IDF to determine word relevance in document queries. In: Proceedings of the International Conference on Machine Learning (ICML) (2003)"},{"key":"16_CR37","unstructured":"Rocchio, J.J.: Relevance feedback in information retrieval. http:\/\/jmlr.org\/papers\/volume5\/lewis04a\/a11-smart-stop-list\/english.stop (1971)"},{"key":"16_CR38","unstructured":"Rode, V.: Outages - outages (planned & unplanned) reporting. https:\/\/puck.nether.net\/mailman\/listinfo\/outages"},{"key":"16_CR39","doi-asserted-by":"crossref","unstructured":"Shaikh, A., Isett, C., Greenberg, A., Roughan, M., Gottlieb, J.: A case study of OSPF behavior in a large enterprise network. In: ACM IMW (2002)","DOI":"10.1145\/637201.637236"},{"key":"16_CR40","unstructured":"Sophos user bulletin board. https:\/\/www.astaro.org\/gateway-products\/general-discussion\/44500-ddos-attack-via-dns.html"},{"key":"16_CR41","doi-asserted-by":"crossref","unstructured":"Tariq, M.B., Zeitoun, A., Valancius, V., Feamster, N., Ammar, M.: Answering \u201cwhat-if\u201d deployment and configuration questions with WISE. In: Sigcomm (2008)","DOI":"10.1145\/1402958.1402971"},{"key":"16_CR42","doi-asserted-by":"crossref","unstructured":"Toutanova, K., Klein, D., Manning, C.D., Singer, Y.: Feature-rich part-of-speech tagging with a cyclic dependency network. In: Proceedings of NAACL (2003)","DOI":"10.3115\/1073445.1073478"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Turner, D., Levchenko, K., Snoeren, A.C., Savage, S.: California fault lines: understanding the causes and impact of network failures. In: SIGCOMM (2010)","DOI":"10.1145\/1851182.1851220"},{"key":"16_CR44","unstructured":"Veropoulos, K., Campbell, C., Cristianini, N., et al.: Controlling the sensitivity of support vector machines. In: Proceedings of the International Joint Conference on Artificial Intelligence, vol. 1999, pp. 55\u201360. Citeseer (1999)"},{"key":"16_CR45","unstructured":"Vielmetti, E.: http:\/\/goo.gl\/ODnq5q (2012)"},{"key":"16_CR46","first-page":"577","volume":"1","author":"K Wagstaff","year":"2001","unstructured":"Wagstaff, K., Cardie, C., Rogers, S., Schr\u00f6dl, S., et al.: Constrained k-means clustering with background knowledge. Int. Conf. Mach. Learn. 1, 577\u2013584 (2001)","journal-title":"Int. Conf. Mach. Learn."},{"key":"16_CR47","unstructured":"Watson, D., Jahanian, F., Labovitz, C.: Experiences with monitoring OSPF on a regional service provider network. In: ICDCS (2003)"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15509-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T06:10:30Z","timestamp":1676441430000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15509-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319155081","9783319155098"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15509-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"4 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}