{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T15:10:19Z","timestamp":1766848219424,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T00:00:00Z","timestamp":1224460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,20]]},"DOI":"10.1145\/1452520.1452542","type":"proceedings-article","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T12:25:44Z","timestamp":1224678344000},"page":"169-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":115,"title":["Census and survey of the visible internet"],"prefix":"10.1145","author":[{"given":"John","family":"Heidemann","sequence":"first","affiliation":[{"name":"USC, Marina del Rey, CA, USA"}]},{"given":"Yuri","family":"Pradkin","sequence":"additional","affiliation":[{"name":"USC, Marina del Rey, CA, USA"}]},{"given":"Ramesh","family":"Govindan","sequence":"additional","affiliation":[{"name":"USC, Los Angeles, CA, USA"}]},{"given":"Christos","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Genevieve","family":"Bartlett","sequence":"additional","affiliation":[{"name":"USC, Los Angeles, CA, USA"}]},{"given":"Joseph","family":"Bannister","sequence":"additional","affiliation":[{"name":"Aerospace Corporation, El Segundo, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/974036.974038"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298314"},{"key":"e_1_3_2_1_3_1","article-title":"OS fingerprint evasion","author":"Beck R.","year":"2001","unstructured":"R. Beck . Passive-aggressive resistance : OS fingerprint evasion . The Linux Journal , Sept. 2001 . R. Beck. Passive-aggressive resistance: OS fingerprint evasion. The Linux Journal, Sept. 2001.","journal-title":"The Linux Journal"},{"key":"e_1_3_2_1_4_1","volume-title":"Internet Request For Comments","author":"Braden R.","year":"1989","unstructured":"R. Braden . Requirements for Internet hosts - communication layers. RFC 1122 , Internet Request For Comments , Oct. 1989 . R. Braden. Requirements for Internet hosts - communication layers. RFC 1122, Internet Request For Comments, Oct. 1989."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of the IEEE Global Internet","author":"Bu T.","year":"2002","unstructured":"T. Bu , L. Gao , and D. Towsley . On characterizing BGP routing table growth . Proc. of the IEEE Global Internet , November 2002 . T. Bu, L. Gao, and D. Towsley. On characterizing BGP routing table growth. Proc. of the IEEE Global Internet, November 2002."},{"key":"e_1_3_2_1_6_1","volume-title":"Internet Request For Comments","author":"Deering S.","year":"1998","unstructured":"S. Deering and R. Hinden . Internet protocol, IP version 6 specification. RFC 2460 , Internet Request For Comments , Dec. 1998 . S. Deering and R. Hinden. Internet protocol, IP version 6 specification. RFC 2460, Internet Request For Comments, Dec. 1998."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347555"},{"key":"e_1_3_2_1_9_1","unstructured":"Ed3f. Firewall spotting and networks analysis with a broken CRC. http:\/\/www.phrack.org\/archives\/60\/p60-0x0c.txt Dec. 2002.  Ed3f. Firewall spotting and networks analysis with a broken CRC. http:\/\/www.phrack.org\/archives\/60\/p60-0x0c.txt Dec. 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316229"},{"key":"e_1_3_2_1_11_1","volume-title":"Internet Request For Comments","author":"Fuller V.","year":"1993","unstructured":"V. Fuller , T. Li , J. Yu , and K. Varadhan . Classless inter-domain routing (CIDR): an address assignment and aggregation strategy. RFC 1519 , Internet Request For Comments , Sept. 1993 . V. Fuller, T. Li, J. Yu, and K. Varadhan. Classless inter-domain routing (CIDR): an address assignment and aggregation strategy. RFC 1519, Internet Request For Comments, Sept. 1993."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832534"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945475"},{"issue":"3","key":"e_1_3_2_1_15_1","article-title":"A pragmatic report on IPv4 address space consumption","volume":"8","author":"Hain T.","year":"2004","unstructured":"T. Hain . A pragmatic report on IPv4 address space consumption . The Internet Protocol Journal , 8 ( 3 ), 2004 . T. Hain. A pragmatic report on IPv4 address space consumption. The Internet Protocol Journal, 8(3), 2004.","journal-title":"The Internet Protocol Journal"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1230819.1241670"},{"key":"e_1_3_2_1_17_1","volume-title":"Design and Inference in Finite Population Sampling","author":"Hedayat A. S.","year":"1991","unstructured":"A. S. Hedayat and B. K. Sinha . Design and Inference in Finite Population Sampling . John Wiley & Sons, Inc. , 1991 . A. S. Hedayat and B. K. Sinha. Design and Inference in Finite Population Sampling. John Wiley & Sons, Inc., 1991."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/580055.829312"},{"issue":"1","key":"e_1_3_2_1_20_1","article-title":"Analyzing the Internet's BGP routing table","volume":"4","author":"Huston G.","year":"2001","unstructured":"G. Huston . Analyzing the Internet's BGP routing table . Internet Protocol Journal , 4 ( 1 ), March 2001 . G. Huston. Analyzing the Internet's BGP routing table. Internet Protocol Journal, 4(1), March 2001.","journal-title":"Internet Protocol Journal"},{"key":"e_1_3_2_1_21_1","volume-title":"June","author":"Huston G.","year":"2006","unstructured":"G. Huston . IPv4 address report. http:\/\/bgp.potaroo.net\/ipv4\/ , June 2006 . G. Huston. IPv4 address report. http:\/\/bgp.potaroo.net\/ipv4\/, June 2006."},{"key":"e_1_3_2_1_22_1","volume-title":"Sept.","author":"IANA.","year":"2002","unstructured":"IANA. Internet protocol v4 address space. web page http:\/\/www.iana.org\/assignments\/ipv4-address-space , Sept. 2002 . IANA. Internet protocol v4 address space. web page http:\/\/www.iana.org\/assignments\/ipv4-address-space, Sept. 2002."},{"key":"e_1_3_2_1_23_1","volume-title":"Mar.","author":"IANA.","year":"2007","unstructured":"IANA. ICMP type numbers. web page http:\/\/www.iana.org\/assignments\/icmp-parameters , Mar. 2007 . IANA. ICMP type numbers. web page http:\/\/www.iana.org\/assignments\/icmp-parameters, Mar. 2007."},{"key":"e_1_3_2_1_24_1","unstructured":"Internet Software Consortium. Internet domain survey. web page http:\/\/www.isc.org\/ds.  Internet Software Consortium. Internet domain survey. web page http:\/\/www.isc.org\/ds."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298315"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637242"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347428"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015470"},{"key":"e_1_3_2_1_30_1","volume-title":"Internet Request For Comments","author":"Lottor M.","year":"1981","unstructured":"M. Lottor . Internet growth ( 1981 -1991). RFC 1296 , Internet Request For Comments , Jan. 1992. M. Lottor. Internet growth (1981-1991). RFC 1296, Internet Request For Comments, Jan. 1992."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052812.1052827"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159937"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863971"},{"key":"e_1_3_2_1_34_1","unstructured":"NJABL. Not just another bogus list. http:\/\/www.njabl.org\/ 2007.  NJABL. Not just another bogus list. http:\/\/www.njabl.org\/ 2007."},{"key":"e_1_3_2_1_35_1","unstructured":"p0f Project. p0f passive OS fingerprinting. http:\/\/lcamtuf.coredump.cx\/p0f.shtml Sept. 2006.  p0f Project. p0f passive OS fingerprinting. http:\/\/lcamtuf.coredump.cx\/p0f.shtml Sept. 2006."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.779192"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/268437.268737"},{"key":"e_1_3_2_1_38_1","volume-title":"http:\/\/www.insecure.org\/nmap\/","author":"Project N.","year":"1997","unstructured":"N. Project . Nmap network security scanner. http:\/\/www.insecure.org\/nmap\/ , 1997 . N. Project. Nmap network security scanner. http:\/\/www.insecure.org\/nmap\/, 1997."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1918"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096546"},{"key":"e_1_3_2_1_41_1","volume-title":"Internet Request For Comments","author":"Smallberg D.","year":"1982","unstructured":"D. Smallberg . Who talks TCP? RFC 832 , Internet Request For Comments , Dec. 1982 . D. Smallberg. Who talks TCP? RFC 832, Internet Request For Comments, Dec. 1982."},{"key":"e_1_3_2_1_42_1","first-page":"229","volume-title":"Proc. of the USENIX Security Symposium","author":"Smart M.","year":"2000","unstructured":"M. Smart , G. R. Malan , and F. Jahanian . Defeating TCP\/IP stack fingerprinting . In Proc. of the USENIX Security Symposium , pages 229 -- 240 , Denver, Colorado, USA , Aug. 2000 . USENIX. M. Smart, G. R. Malan, and F. Jahanian. Defeating TCP\/IP stack fingerprinting. In Proc. of the USENIX Security Symposium, pages 229--240, Denver, Colorado, USA, Aug. 2000. USENIX."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/378420.378789"},{"key":"e_1_3_2_1_44_1","unstructured":"SORBS. Sorbs dynamic user and host list. http:\/\/www.au.sorbs.net\/faq\/dul.shtml 2004.  SORBS. Sorbs dynamic user and host list. http:\/\/www.au.sorbs.net\/faq\/dul.shtml 2004."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633040"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/173942.173944"},{"key":"e_1_3_2_1_49_1","volume-title":"Nov.","author":"Whittle R.","year":"2007","unstructured":"R. Whittle . Probing the density of ping-responsive-hosts in each \/8 IPv4 prefix and in different sizes of BGP advertised prefix. Web page http:\/\/www.firstpr.com.au\/ip\/host-density-per-prefix\/ , Nov. 2007 . R. Whittle. Probing the density of ping-responsive-hosts in each \/8 IPv4 prefix and in different sizes of BGP advertised prefix. Web page http:\/\/www.firstpr.com.au\/ip\/host-density-per-prefix\/, Nov. 2007."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282415"}],"event":{"name":"IMC08: Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"],"location":"Vouliagmeni Greece","acronym":"IMC08"},"container-title":["Proceedings of the 8th ACM SIGCOMM conference on Internet measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1452520.1452542","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1452520.1452542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:34Z","timestamp":1750254994000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1452520.1452542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,20]]},"references-count":49,"alternative-id":["10.1145\/1452520.1452542","10.1145\/1452520"],"URL":"https:\/\/doi.org\/10.1145\/1452520.1452542","relation":{},"subject":[],"published":{"date-parts":[[2008,10,20]]},"assertion":[{"value":"2008-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}