{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:46:27Z","timestamp":1772822787049,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T00:00:00Z","timestamp":1257292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,4]]},"DOI":"10.1145\/1644893.1644936","type":"proceedings-article","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T18:29:35Z","timestamp":1257359375000},"page":"356-369","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":85,"title":["Understanding the efficacy of deployed internet source address validation filtering"],"prefix":"10.1145","author":[{"given":"Robert","family":"Beverly","sequence":"first","affiliation":[{"name":"Massachusettes Institute of Technology, Cambridge, MA, USA"}]},{"given":"Arthur","family":"Berger","sequence":"additional","affiliation":[{"name":"Massachusettes Institute of Technology, Cambridge, MA, USA"}]},{"given":"Young","family":"Hyun","sequence":"additional","affiliation":[{"name":"CAIDA, La Jolla, CA, USA"}]},{"given":"k","family":"claffy","sequence":"additional","affiliation":[{"name":"CAIDA, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Netacuity IP intelligence 2009. http:\/\/www.digital-element.com\/.  Netacuity IP intelligence 2009. http:\/\/www.digital-element.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Private communication with Cisco engineering May 2009.  Private communication with Cisco engineering May 2009."},{"key":"e_1_3_2_1_3_1","volume-title":"Report from the IAB workshop on Unwanted Traffic. RFC","author":"Andersson L.","year":"2007","unstructured":"L. Andersson , E. Davies , and L. Zhang . Report from the IAB workshop on Unwanted Traffic. RFC 4948, Aug. 2007 . L. Andersson, E. Davies, and L. Zhang. Report from the IAB workshop on Unwanted Traffic. RFC 4948, Aug. 2007."},{"key":"e_1_3_2_1_4_1","volume-title":"Worldwide infrastructure security report","author":"Networks Arbor","year":"2008","unstructured":"Arbor Networks . Worldwide infrastructure security report , 2008 . http:\/\/www.arbornetworks.com\/report. Arbor Networks. Worldwide infrastructure security report, 2008. http:\/\/www.arbornetworks.com\/report."},{"key":"e_1_3_2_1_5_1","volume-title":"Ingress Filtering for Multihomed Networks. RFC","author":"Baker F.","year":"2004","unstructured":"F. Baker and P. Savola . Ingress Filtering for Multihomed Networks. RFC 3704, Mar. 2004 . F. Baker and P. Savola. Ingress Filtering for Multihomed Networks. RFC 3704, Mar. 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"CIDR Report","author":"Bates T.","year":"2009","unstructured":"T. Bates , P. Smith , and G. Huston . CIDR Report , 2009 . http:\/\/www.cidr-report.org. T. Bates, P. Smith, and G. Huston. CIDR Report, 2009. http:\/\/www.cidr-report.org."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"e_1_3_2_1_8_1","volume-title":"IETF Internet Draft","author":"Bellovin S. M.","year":"2000","unstructured":"S. M. Bellovin . ICMP traceback messages . IETF Internet Draft , Sept. 2000 . http:\/\/www.cs.columbia.edu\/~smb\/papers\/draft-bellovin-itrace-00.txt. S. M. Bellovin. ICMP traceback messages. IETF Internet Draft, Sept. 2000. http:\/\/www.cs.columbia.edu\/~smb\/papers\/draft-bellovin-itrace-00.txt."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of USENIX SRUTI Workshop","author":"Beverly R.","year":"2005","unstructured":"R. Beverly and S. Bauer . The Spoofer Project: Inferring the extent of source address Filtering on the Internet . In Proceedings of USENIX SRUTI Workshop , July 2005 . R. Beverly and S. Bauer. The Spoofer Project: Inferring the extent of source address Filtering on the Internet. In Proceedings of USENIX SRUTI Workshop, July 2005."},{"key":"e_1_3_2_1_11_1","volume-title":"Slashdot","author":"Beverly R.","year":"2006","unstructured":"R. Beverly and S. Bauer . Can you spoof IP addresses ? Slashdot , May 2006 . http:\/\/it.slashdot.org\/article.pl?sid=06\/05\/02\/1729257. R. Beverly and S. Bauer. Can you spoof IP addresses? Slashdot, May 2006. http:\/\/it.slashdot.org\/article.pl?sid=06\/05\/02\/1729257."},{"key":"e_1_3_2_1_12_1","volume-title":"Requirements for Internet Hosts - Communication Layers. RFC","author":"Braden R.","year":"1989","unstructured":"R. Braden . Requirements for Internet Hosts - Communication Layers. RFC 1122, Oct. 1989 . R. Braden. Requirements for Internet Hosts - Communication Layers. RFC 1122, Oct. 1989."},{"key":"e_1_3_2_1_13_1","volume-title":"NANOG","author":"Bush R.","year":"2007","unstructured":"R. Bush , J. Hiebert , O. Maennel , M. Roughan , and S. Uhlig . Diagnosing the location of bogon Filters . NANOG 40, June 2007 . R. Bush, J. Hiebert, O. Maennel, M. Roughan, and S. Uhlig. Diagnosing the location of bogon Filters. NANOG 40, June 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"Data over cable service interface specification (DOCSIS)","year":"2006","unstructured":"Cablelabs. Data over cable service interface specification (DOCSIS) , 2006 . http:\/\/www.cablemodem.com\/. Cablelabs. Data over cable service interface specification (DOCSIS), 2006. http:\/\/www.cablemodem.com\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of IEEE INFOCOM","author":"Duan Z.","year":"2006","unstructured":"Z. Duan , X. Yuan , and J. Chandrashekar . Constructing inter-domain packet filters to control IP spooffing based on BGP updates . In Proceedings of IEEE INFOCOM , 2006 . Z. Duan, X. Yuan, and J. Chandrashekar. Constructing inter-domain packet filters to control IP spooffing based on BGP updates. In Proceedings of IEEE INFOCOM, 2006."},{"key":"e_1_3_2_1_17_1","volume-title":"Observing routing asymmetry in internet traffic","author":"Dusi M.","year":"2009","unstructured":"M. Dusi and W. John . Observing routing asymmetry in internet traffic , 2009 . http:\/\/www.caida.org\/research\/traffic-analysis\/asymmetry\/. M. Dusi and W. John. Observing routing asymmetry in internet traffic, 2009. http:\/\/www.caida.org\/research\/traffic-analysis\/asymmetry\/."},{"key":"e_1_3_2_1_18_1","volume-title":"Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC","author":"Ferguson P.","year":"2000","unstructured":"P. Ferguson and D. Senie . Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827, May 2000 . P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827, May 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_20_1","volume-title":"NANOG","author":"Greene B. R.","year":"2001","unstructured":"B. R. Greene , C. Morrow , and B. W. Gemberling . ISP security: Real world techniques . NANOG 23, Oct. 2001 . B. R. Greene, C. Morrow, and B. W. Gemberling. ISP security: Real world techniques. NANOG 23, Oct. 2001."},{"key":"e_1_3_2_1_21_1","volume-title":"claffy. Archipelago measurement infrastructure","author":"Hyun Y.","year":"2009","unstructured":"Y. Hyun and k. claffy. Archipelago measurement infrastructure , 2009 . http:\/\/www.caida.org\/projects\/ark\/. Y. Hyun and k. claffy. Archipelago measurement infrastructure, 2009. http:\/\/www.caida.org\/projects\/ark\/."},{"key":"e_1_3_2_1_22_1","volume-title":"Special-Use IPv4 Addresses. RFC","author":"IANA.","year":"2002","unstructured":"IANA. Special-Use IPv4 Addresses. RFC 3330, Sept. 2002 . IANA. Special-Use IPv4 Addresses. RFC 3330, Sept. 2002."},{"key":"e_1_3_2_1_23_1","unstructured":"V. Jacobsen. Traceroute 1988. ftp:\/\/ftp.ee.lbl.gov.  V. Jacobsen. Traceroute 1988. ftp:\/\/ftp.ee.lbl.gov."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"},{"key":"e_1_3_2_1_25_1","volume-title":"NANOG","author":"Katz-Bassett E.","year":"2009","unstructured":"E. Katz-Bassett . Practical reverse traceroute . NANOG 45, Jan. 2009 . E. Katz-Bassett. Practical reverse traceroute. NANOG 45, Jan. 2009."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of USENIX NSDI","author":"Liu X.","year":"2008","unstructured":"X. Liu , A. Li , X. Yang , and D. Wetherall . Passport: Secure and adoptable source authentication . In Proceedings of USENIX NSDI , 2008 . X. Liu, A. Li, X. Yang, and D. Wetherall. Passport: Secure and adoptable source authentication. In Proceedings of USENIX NSDI, 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1762888.1762920"},{"key":"e_1_3_2_1_28_1","volume-title":"University of Oregon RouteViews","author":"Meyer D.","year":"2007","unstructured":"D. Meyer . University of Oregon RouteViews , 2007 . http:\/\/www.routeviews.org. D. Meyer. University of Oregon RouteViews, 2007. http:\/\/www.routeviews.org."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"e_1_3_2_1_31_1","volume-title":"BLS FastAccess internal tech needed","author":"Morrow C.","year":"2006","unstructured":"C. Morrow . BLS FastAccess internal tech needed , 2006 . http:\/\/www.merit.edu\/mail.archives\/nanog\/2006-01\/msg00220.html. C. Morrow. BLS FastAccess internal tech needed, 2006. http:\/\/www.merit.edu\/mail.archives\/nanog\/2006-01\/msg00220.html."},{"key":"e_1_3_2_1_32_1","volume-title":"DoS attack against DNS?","author":"NANOG.","year":"2006","unstructured":"NANOG. DoS attack against DNS? , 2006 . http:\/\/www.merit.edu\/mail.archives\/nanog\/2006-01\/msg00279.html. NANOG. DoS attack against DNS?, 2006. http:\/\/www.merit.edu\/mail.archives\/nanog\/2006-01\/msg00279.html."},{"key":"e_1_3_2_1_33_1","volume-title":"BCP38 business case document","author":"NANOG.","year":"2007","unstructured":"NANOG. BCP38 business case document , 2007 . http:\/\/www.merit.edu\/mail.archives\/nanog\/2007-04\/msg00692.html. NANOG. BCP38 business case document, 2007. http:\/\/www.merit.edu\/mail.archives\/nanog\/2007-04\/msg00692.html."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/505659.505664"},{"key":"e_1_3_2_1_36_1","volume-title":"Address Allocation for Private Internets. RFC 1918","author":"Rekhter Y.","year":"1996","unstructured":"Y. Rekhter , B. Moskowitz , D. Karrenberg , G. J. de Groot , and E. Lear . Address Allocation for Private Internets. RFC 1918 , Feb. 1996 . Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, and E. Lear. Address Allocation for Private Internets. RFC 1918, Feb. 1996."},{"key":"e_1_3_2_1_37_1","volume-title":"Force10 gear","author":"Rhett J.","year":"2008","unstructured":"J. Rhett . Force10 gear , 2008 . http:\/\/mailman.nanog.org\/pipermail\/nanog\/2008-September\/003524.html. J. Rhett. Force10 gear, 2008. http:\/\/mailman.nanog.org\/pipermail\/nanog\/2008-September\/003524.html."},{"key":"e_1_3_2_1_38_1","volume-title":"An effect of ignoring BCP38","author":"Savola P.","year":"2008","unstructured":"P. Savola . An effect of ignoring BCP38 , 2008 . http:\/\/mailman.nanog.org\/pipermail\/nanog\/2008-September\/003758.html. P. Savola. An effect of ignoring BCP38, 2008. http:\/\/mailman.nanog.org\/pipermail\/nanog\/2008-September\/003758.html."},{"key":"e_1_3_2_1_39_1","volume-title":"IETF Internet Draft","author":"Savola P.","year":"2008","unstructured":"P. Savola . Experiences from Using Unicast RPF . IETF Internet Draft , Jan. 2008 . http:\/\/tools.ietf.org\/id\/draft-savola-bcp84-urpf-experiences-03.txt. P. Savola. Experiences from Using Unicast RPF. IETF Internet Draft, Jan. 2008. http:\/\/tools.ietf.org\/id\/draft-savola-bcp84-urpf-experiences-03.txt."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383060"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"e_1_3_2_1_42_1","unstructured":"R. Thomas. Team Cymru bogon route-server project. http:\/\/www.cymru.com\/.  R. Thomas. Team Cymru bogon route-server project. http:\/\/www.cymru.com\/."},{"key":"e_1_3_2_1_43_1","volume-title":"Defending TCP Against Spoofing Attacks. RFC","author":"Touch J.","year":"2007","unstructured":"J. Touch . Defending TCP Against Spoofing Attacks. RFC 4953, July 2007 . J. Touch. Defending TCP Against Spoofing Attacks. RFC 4953, July 2007."},{"key":"e_1_3_2_1_44_1","volume-title":"Multiple DNS implementations vulnerable to cache poisoning VU#800113","author":"CERT.","year":"2008","unstructured":"US- CERT. Multiple DNS implementations vulnerable to cache poisoning VU#800113 , 2008 . US-CERT. Multiple DNS implementations vulnerable to cache poisoning VU#800113, 2008."},{"key":"e_1_3_2_1_45_1","volume-title":"Oct.","author":"Vixie P.","year":"2002","unstructured":"P. Vixie . Securing the edge , Oct. 2002 . http:\/\/www.icann.org\/en\/committees\/security\/sac004.txt. P. Vixie. Securing the edge, Oct. 2002. http:\/\/www.icann.org\/en\/committees\/security\/sac004.txt."},{"key":"e_1_3_2_1_46_1","volume-title":"IETF Internet Draft","author":"Vogt C.","year":"2009","unstructured":"C. Vogt . A solution space analysis for first-hop ip source address validation . IETF Internet Draft , Jan. 2009 . http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-savi-rationale-00.txt. C. Vogt. A solution space analysis for first-hop ip source address validation. IETF Internet Draft, Jan. 2009. http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-savi-rationale-00.txt."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877138"}],"event":{"name":"IMC '09: Internet Measurement Conference","location":"Chicago Illinois USA","acronym":"IMC '09","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the 9th ACM SIGCOMM conference on Internet measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1644893.1644936","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1644893.1644936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:18Z","timestamp":1750250478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1644893.1644936"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,4]]},"references-count":45,"alternative-id":["10.1145\/1644893.1644936","10.1145\/1644893"],"URL":"https:\/\/doi.org\/10.1145\/1644893.1644936","relation":{},"subject":[],"published":{"date-parts":[[2009,11,4]]},"assertion":[{"value":"2009-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}