{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:39:14Z","timestamp":1774946354359,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,8,17]],"date-time":"2008-08-17T00:00:00Z","timestamp":1218931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,8,17]]},"DOI":"10.1145\/1402958.1402997","type":"proceedings-article","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T08:38:39Z","timestamp":1219135119000},"page":"339-350","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":173,"title":["Accountable internet protocol (aip)"],"prefix":"10.1145","author":[{"given":"David G.","family":"Andersen","sequence":"first","affiliation":[{"name":"CMU, Pittsburgh, PA, USA"}]},{"given":"Hari","family":"Balakrishnan","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Teemu","family":"Koponen","sequence":"additional","affiliation":[{"name":"ICSI and HIIT, Berkeley, CA, USA"}]},{"given":"Daekyeong","family":"Moon","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ITRS international technology roadmap for semiconductors 2006.  ITRS international technology roadmap for semiconductors 2006."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72792-7_1"},{"key":"e_1_3_2_1_3_1","unstructured":"APNIC. The APNIC Resource Certification Page. http:\/\/mirin.apnic.net\/resourcecerts\/.  APNIC. The APNIC Resource Certification Page. http:\/\/mirin.apnic.net\/resourcecerts\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. USENIX Annual Technical Conference","author":"Argyraki K.","year":"2005","unstructured":"K. Argyraki and D. R. Cheriton . Active Internet traffic filtering: Real-time response to denial-of-service attacks . In Proc. USENIX Annual Technical Conference , Apr. 2005 . K. Argyraki and D. R. Cheriton. Active Internet traffic filtering: Real-time response to denial-of-service attacks. In Proc. USENIX Annual Technical Conference, Apr. 2005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3972"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. SRUTI Workshop","author":"Beverly R.","year":"2005","unstructured":"R. Beverly and S. Bauer . The Spoofer project: Inferring the extent of source address filtering on the Internet . In Proc. SRUTI Workshop , July 2005 . R. Beverly and S. Bauer. The Spoofer project: Inferring the extent of source address filtering on the Internet. In Proc. SRUTI Workshop, July 2005."},{"key":"e_1_3_2_1_7_1","first-page":"279235","volume":"2100","author":"CNET","unstructured":"CNET News.com. Router Glitch Cuts Net Access. http:\/\/news.com.com\/ 2100-1033 - 279235 .html, Apr. 1997. CNET News.com. Router Glitch Cuts Net Access. http:\/\/news.com.com\/2100-1033-279235.html, Apr. 1997.","journal-title":"News.com. Router Glitch Cuts Net Access. http:\/\/news.com.com\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.128"},{"key":"e_1_3_2_1_9_1","volume-title":"Internet Engineering Task Force","author":"Farinacci D.","year":"2008","unstructured":"D. Farinacci , V. Fuller , D. Oran , and D. Meyer . Locator\/ID Separation Protocol (LISP) . Internet Engineering Task Force , Apr. 2008 . Internet Draft (http:\/\/tools.ietf.org\/html\/draft-farinacci-lisp-07). Work in progress, expires October 2008. D. Farinacci, V. Fuller, D. Oran, and D. Meyer. Locator\/ID Separation Protocol (LISP). Internet Engineering Task Force, Apr. 2008. Internet Draft (http:\/\/tools.ietf.org\/html\/draft-farinacci-lisp-07). Work in progress, expires October 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2267"},{"key":"e_1_3_2_1_11_1","volume-title":"Internet Engineering Task Force","author":"Ferguson P.","year":"2000","unstructured":"P. Ferguson and D. Senie . Network Ingress Filtering . Internet Engineering Task Force , May 2000 . BCP 38, RFC 2827. P. Ferguson and D. Senie. Network Ingress Filtering. Internet Engineering Task Force, May 2000. BCP 38, RFC 2827."},{"key":"e_1_3_2_1_12_1","volume-title":"Feb.","author":"Fuller V.","year":"2007","unstructured":"V. Fuller . Scaling issues with routing+multihoming , Feb. 2007 . Plenary session at APRICOT, the Asia Pacific Regional Internet Conference on Operational Technologies . V. Fuller. Scaling issues with routing+multihoming, Feb. 2007. Plenary session at APRICOT, the Asia Pacific Regional Internet Conference on Operational Technologies."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. NDSS","author":"Goodell G.","year":"2003","unstructured":"G. Goodell , W. Aiello , T. Griffin , J. Ioannidis , P. McDaniel , and A. Rubin . Working around BGP: An incremental approach to improving security and accuracy in interdomain routing . In Proc. NDSS , Feb. 2003 . G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy in interdomain routing. In Proc. NDSS, Feb. 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"Internet Engineering Task Force","author":"Huston G.","year":"2006","unstructured":"G. Huston , G. Michaelson , and R. Loomans . A Profile for Resource Certificate Repository Structure . Internet Engineering Task Force , June 2006 . http:\/\/mirin.apnic.net\/resourcecerts\/project-notes\/draft-ietf-sidr-repos-struct-00.html. G. Huston, G. Michaelson, and R. Loomans. A Profile for Resource Certificate Repository Structure. Internet Engineering Task Force, June 2006. http:\/\/mirin.apnic.net\/resourcecerts\/project-notes\/draft-ietf-sidr-repos-struct-00.html."},{"key":"e_1_3_2_1_15_1","volume-title":"Pretty Good BGP: Protecting BGP by cautiously selecting routes. Technical report","author":"Karlin J.","year":"2005","unstructured":"J. Karlin , S. Forrest , and J. Rexford . Pretty Good BGP: Protecting BGP by cautiously selecting routes. Technical report , University of New Mexico , Oct. 2005 . TR-CS-2005-37. J. Karlin, S. Forrest, and J. Rexford. Pretty Good BGP: Protecting BGP by cautiously selecting routes. Technical report, University of New Mexico, Oct. 2005. TR-CS-2005-37."},{"key":"e_1_3_2_1_16_1","volume-title":"Internet Engineering Task Force","author":"Kastenholz F.","year":"2002","unstructured":"F. Kastenholz . ISLAY : A New Routing and Addressing Architecture . Internet Engineering Task Force , May 2002 . http:\/\/ietfreport.isoc.org\/idref\/draft-irtf-routing-islay\/. F. Kastenholz. ISLAY: A New Routing and Addressing Architecture. Internet Engineering Task Force, May 2002. http:\/\/ietfreport.isoc.org\/idref\/draft-irtf-routing-islay\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2401"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3013"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273445.1273450"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. 15th USENIX Security Symposium","author":"Lad M.","year":"2006","unstructured":"M. Lad , D. Massey , D. Pei , Y. Wu , B. Zhang , and L. Zhang . AS: A prefix hijack alert system . In Proc. 15th USENIX Security Symposium , Aug. 2006 . M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. AS: A prefix hijack alert system. In Proc. 15th USENIX Security Symposium, Aug. 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081893"},{"key":"e_1_3_2_1_23_1","volume-title":"Passive & Active Measurement (PAM)","author":"Li J.","year":"2006","unstructured":"J. Li , R. Bush , Z. M. Mao , T. Griffin , M. Roughan , D. Stutzbach , and E. Purpus . Watching data streams toward a multi-homed sink under routing changes introduced by a BGP beacon . In Passive & Active Measurement (PAM) , Mar. 2006 . J. Li, R. Bush, Z. M. Mao, T. Griffin, M. Roughan, D. Stutzbach, and E. Purpus. Watching data streams toward a multi-homed sink under routing changes introduced by a BGP beacon. In Passive & Active Measurement (PAM), Mar. 2006."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. 5th USENIX NSDI","author":"Liu X.","year":"2008","unstructured":"X. Liu , X. Yang , D. Wetherall , and A. Li . Passport: Secure and Adoptable Source Authentication . In Proc. 5th USENIX NSDI , Apr. 2008 . X. Liu, X. Yang, D. Wetherall, and A. Li. Passport: Secure and Adoptable Source Authentication. In Proc. 5th USENIX NSDI, Apr. 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"e_1_3_2_1_26_1","unstructured":"D. McCullagh. How Pakistan knocked YouTube offline. http:\/\/news.cnet.com\/8301-10784_3-9878655-7.html Feb. 2008.  D. McCullagh. How Pakistan knocked YouTube offline. http:\/\/news.cnet.com\/8301-10784_3-9878655-7.html Feb. 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4984"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4423"},{"key":"e_1_3_2_1_29_1","unstructured":"M. Ohta. 8+8 Addressing for IPv6 End to End Multihoming Jan. 2004. draft-ohta-multi6-8plus8-00 (Expired IETF Draft).  M. Ohta. 8+8 Addressing for IPv6 End to End Multihoming Jan. 2004. draft-ohta-multi6-8plus8-00 (Expired IETF Draft)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383061"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159947"},{"key":"e_1_3_2_1_33_1","unstructured":"Renesys. Renesys Routing Intelligence. http:\/\/www.renesys.com\/products_services\/routing_intelligence.shtml.  Renesys. Renesys Routing Intelligence. http:\/\/www.renesys.com\/products_services\/routing_intelligence.shtml."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. USENIX Steps to Reduce Unwanted Traffic on the Internet workshop","author":"Shaw M.","year":"2006","unstructured":"M. Shaw . Leveraging good intentions to reduce unwanted network traffic . In Proc. USENIX Steps to Reduce Unwanted Traffic on the Internet workshop , July 2006 . M. Shaw. Leveraging good intentions to reduce unwanted network traffic. In Proc. USENIX Steps to Reduce Unwanted Traffic on the Internet workshop, July 2006."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354576"},{"key":"e_1_3_2_1_36_1","unstructured":"T. L. Simon. oof. panix sidelined by incompetence... again. http:\/\/merit.edu\/mail.archives\/nanog\/2006-01\/msg00483.html Jan. 2006.  T. L. Simon. oof. panix sidelined by incompetence... again. http:\/\/merit.edu\/mail.archives\/nanog\/2006-01\/msg00483.html Jan. 2006."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345938"},{"key":"e_1_3_2_1_38_1","first-page":"40","volume-title":"Syngress","author":"X.","year":"2004","unstructured":"Spammer- X. Inside the SPAM Cartel . Syngress , 2004 . Page 40 . Spammer-X. Inside the SPAM Cartel. Syngress, 2004. Page 40."},{"key":"e_1_3_2_1_39_1","volume-title":"Network Algorithmics. Morgan Kaufmann","author":"Varghese G.","year":"2007","unstructured":"G. Varghese . Network Algorithmics. Morgan Kaufmann , 2007 . G. Varghese. Network Algorithmics. Morgan Kaufmann, 2007."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4893"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. 6th USENIX OSDI","author":"Walfish M.","year":"2004","unstructured":"M. Walfish , J. Stribling , M. Krohn , H. Balakrishnan , R. Morris , and S. Shenker . Middleboxes no longer considered harmful . In Proc. 6th USENIX OSDI , Dec. 2004 . M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes no longer considered harmful. In Proc. 6th USENIX OSDI, Dec. 2004."},{"issue":"3","key":"e_1_3_2_1_43_1","volume":"6","author":"White R.","year":"2003","unstructured":"R. White . Securing BGP through secure origin BGP. The Internet Protocol Journal , 6 ( 3 ), Sept. 2003 . http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_6-3\/ipj_6-3.pdf. R. White. Securing BGP through secure origin BGP. The Internet Protocol Journal, 6 (3), Sept. 2003. http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_6-3\/ipj_6-3.pdf.","journal-title":"BGP. The Internet Protocol Journal"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2007.4362183"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320208"}],"event":{"name":"SIGCOMM '08: ACM SIGCOMM 2008 Conference","location":"Seattle WA USA","acronym":"SIGCOMM '08","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the ACM SIGCOMM 2008 conference on Data communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1402958.1402997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1402958.1402997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:47:19Z","timestamp":1750243639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1402958.1402997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8,17]]},"references-count":44,"alternative-id":["10.1145\/1402958.1402997","10.1145\/1402958"],"URL":"https:\/\/doi.org\/10.1145\/1402958.1402997","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1402946.1402997","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,8,17]]},"assertion":[{"value":"2008-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}