{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:19Z","timestamp":1763468119139},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642365157"},{"type":"electronic","value":"9783642365164"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36516-4_3","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T09:11:01Z","timestamp":1363165861000},"page":"21-30","source":"Crossref","is-referenced-by-count":17,"title":["Detecting Third-Party Addresses in Traceroute Traces with IP Timestamp Option"],"prefix":"10.1007","author":[{"given":"Pietro","family":"Marchetta","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Walter","family":"de Donato","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Antonio","family":"Pescap\u00e9","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"The CAIDA AS Relationships Dataset (June 2012), \n                    \n                      http:\/\/www.caida.org\/data\/active\/as-relationships\/"},{"key":"3_CR2","unstructured":"IP Address Hitlist, PREDICT ID USC-LANDER internet- address- hitlist- it47w-20120427, 2010-03-29 to 2012-05-30, \n                    \n                      http:\/\/www.isi.edu\/ant\/lander\n                    \n                    \n                  ."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Augustin, B., Cuvellier, X., Orgogozo, B., Viger, F., Friedman, T., Latapy, M., Magnien, C., Teixeira, R.: Avoiding traceroute anomalies with paris traceroute. In: Proc. ACM SIGCOMM IMC (2006)","DOI":"10.1145\/1177080.1177100"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Augustin, B., Krishnamurthy, B., Willinger, W.: IXPs: mapped? In: ACM SIGCOMM IMC (2009)","DOI":"10.1145\/1644893.1644934"},{"key":"3_CR5","unstructured":"Baker, F.: IETF RFC1812: Requirements for IP version 4 routers"},{"key":"3_CR6","unstructured":"Bavier, A., Bowman, M., Chun, B., Culler, D., Karlin, S., Muir, S., Peterson, L., Roscoe, T., Spalink, T., Wawrzoniak, M.: Operating system support for planetary-scale network services. In: NSDI (2004)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Botta, A., de Donato, W., Pescap\u00e8, A., Ventre, G.: Discovering topologies at router level: Part ii. In: GLOBECOM, pp. 2696\u20132701 (2007)","DOI":"10.1109\/GLOCOM.2007.511"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Chen, K., Choffnes, D., Potharaju, R., Chen, Y., Bustamante, F., Pei, D., Zhao, Y.: Where the sidewalk ends. In: Proc. ACM CoNEXT (2009)","DOI":"10.1145\/1658939.1658964"},{"key":"3_CR9","unstructured":"Cymru, T.: IP to ASN mapping (2012), \n                    \n                      http:\/\/www.team-cymru.org\/Services\/ip-to-asn.html"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-642-28537-0_19","volume-title":"Passive and Active Measurement","author":"W. Donato de","year":"2012","unstructured":"de Donato, W., Marchetta, P., Pescap\u00e9, A.: A Hands-on Look at Active Probing Using the IP Prespecified Timestamp Option. In: Taft, N., Ricciato, F. (eds.) PAM 2012. LNCS, vol.\u00a07192, pp. 189\u2013199. Springer, Heidelberg (2012)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Donnet, B., Friedman, T.: Internet topology discovery: a survey. IEEE Communications Surveys and Tutorials (2007)","DOI":"10.1109\/COMST.2007.4444750"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Gregori, E., Improta, A., Lenzini, L., Rossi, L., Sani, L.: On the incompleteness of the AS-level graph: a novel methodology for BGP route collector placement. In: Proc. ACM SIGCOMM IMC (2012)","DOI":"10.1145\/2398776.2398803"},{"key":"3_CR13","unstructured":"He, Y., Siganos, G., Faloutsos, M., Krishnamurthy, S.: Lord of the links: a framework for discovering missing links in the internet topology. IEEE\/ACM Transactions on Networking (2009)"},{"key":"3_CR14","unstructured":"Hyun, Y., Broido, A., Claffy, K.C.: On third-party addresses in traceroute paths. In: Proc. PAM (2003)"},{"key":"3_CR15","unstructured":"Hyun, Y., Broido, A., Claffy, K.C.: Traceroute and BGP AS path incongruities. Technical report, CAIDA (2003)"},{"key":"3_CR16","unstructured":"Katz-Bassett, E., Madhyastha, H.V., Adhikari, V.K., Scott, C., Sherry, J., van Wesep, P., Anderson, T.E., Krishnamurthy, A.: Reverse traceroute. In: Proc. NSDI (2010)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Luckie, M., Dhamdhere, A., Murrell, D., et al.: Measured impact of crooked traceroute. ACM SIGCOMM Computer Communication Review (2011)","DOI":"10.1145\/1925861.1925864"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Marchetta, P., de Donato, W., Pescap\u00e9, A.: Detecting third-party addresses in traceroute ip paths. In: Proc. ACM SIGCOMM (2012)","DOI":"10.1145\/2342356.2342384"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Marchetta, P., M\u00e9rindol, P., Donnet, B., Pescap\u00e8, A., Pansiot, J.-J.: Topology discovery at the router level: A new hybrid tool targeting isp networks. IEEE JSAC (2011)","DOI":"10.1109\/JSAC.2011.111003"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Marchetta, P., M\u00e9rindol, P., Donnet, B., Pescap\u00e9, A., Pansiot, J.J.: Quantifying and Mitigating IGMP Filtering in Topology Discovery. In: Proc. IEEE GLOBECOM (2012)","DOI":"10.1109\/GLOCOM.2012.6503388"},{"key":"3_CR21","unstructured":"Packet Clearing House. IXP directory, \n                    \n                      https:\/\/prefix.pch.net\/"},{"key":"3_CR22","unstructured":"PeeringDB. Exchange points list, \n                    \n                      https:\/\/www.peeringdb.com\/"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Postel, J.: Internet Protocol. RFC 791 (Standard) (September 1981)","DOI":"10.17487\/rfc0791"},{"key":"3_CR24","first-page":"172","volume-title":"IMC 2010","author":"J. Sherry","year":"2010","unstructured":"Sherry, J., Katz-Bassett, E., Pimenova, M., Madhyastha, H.V., Anderson, T., Krishnamurthy, A.: Resolving ip aliases with prespecified timestamps. In: IMC 2010, pp. 172\u2013178. ACM, New York (2010)"},{"key":"3_CR25","unstructured":"Tozal, M., Sarac, K.: Palmtree: An ip alias resolution algorithm with linear probing complexity. Computer Communications (2010)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Tozal, M., Sarac, K.: Tracenet: an internet topology data collector. In: Proc. ACM SIGCOMM IMC (2010)","DOI":"10.1145\/1879141.1879188"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Oliveira, R., Wang, Y., Su, S., Zhang, B., Bi, J., Zhang, H., Zhang, L.: A framework to quantify the pitfalls of using traceroute in as-level topology measurement. IEEE JSAC (2011)","DOI":"10.1109\/JSAC.2011.111007"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36516-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T15:23:14Z","timestamp":1557588194000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36516-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642365157","9783642365164"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36516-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}