{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:56Z","timestamp":1763468096282,"version":"3.41.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2010,1,7]],"date-time":"2010-01-07T00:00:00Z","timestamp":1262822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2010,1,7]]},"abstract":"<jats:p>The well-known traceroute probing method discovers links between interfaces on Internet routers. IP alias resolution, the process of identifying IP addresses belonging to the same router, is a critical step in producing Internet topology maps. We compare the performance and accuracy of known alias resolution techniques, propose some enhancements, and suggest a practical combination of techniques that can produce the most accurate and complete IP-to-router mapping at macroscopic scale.<\/jats:p>","DOI":"10.1145\/1672308.1672318","type":"journal-article","created":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T19:06:47Z","timestamp":1350068807000},"page":"50-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["Internet-scale IP alias resolution techniques"],"prefix":"10.1145","volume":"40","author":[{"given":"Ken","family":"Keys","sequence":"first","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,1,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"http:\/\/dooka.canet4.net\/.  http:\/\/dooka.canet4.net\/."},{"key":"e_1_2_1_2_1","unstructured":"http:\/\/stats.geant2.net\/lg\/.  http:\/\/stats.geant2.net\/lg\/."},{"key":"e_1_2_1_3_1","unstructured":"http:\/\/vn.grnoc.iu.edu\/Internet2.  http:\/\/vn.grnoc.iu.edu\/Internet2."},{"key":"e_1_2_1_4_1","unstructured":"http:\/\/routerproxy.grnoc.iu.edu\/nlr2\/.  http:\/\/routerproxy.grnoc.iu.edu\/nlr2\/."},{"key":"e_1_2_1_5_1","unstructured":"Private communication with Kenjiro Cho and Yuji Sekiya at WIDE.  Private communication with Kenjiro Cho and Yuji Sekiya at WIDE."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452560"},{"volume-title":"INFOCOM","year":"2000","author":"Govindam R.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","unstructured":"M.H. Gunes. APAR tool. http:\/\/itom.utdallas. edu\/data\/APAR.tar.gz (accessed 2008-07-02).  M.H. Gunes. APAR tool. http:\/\/itom.utdallas. edu\/data\/APAR.tar.gz (accessed 2008-07-02)."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254770"},{"key":"e_1_2_1_11_1","unstructured":"M.H. Gunes and K. Sarac. Resolving IP aliases in building traceroute-based internet maps. Technical report December 2006.  M.H. Gunes and K. Sarac. Resolving IP aliases in building traceroute-based internet maps. Technical report December 2006."},{"key":"e_1_2_1_12_1","unstructured":"Y. Hyun. Archipelago measurement infrastructure. http:\/\/www.caida.org\/projects\/ark\/.  Y. Hyun. Archipelago measurement infrastructure. http:\/\/www.caida.org\/projects\/ark\/."},{"key":"e_1_2_1_13_1","unstructured":"V. Jacobson. traceroute tool. ftp:\/\/ftp.ee.lbl.gov\/ traceroute.tar.gz.  V. Jacobson. traceroute tool. ftp:\/\/ftp.ee.lbl.gov\/ traceroute.tar.gz."},{"volume-title":"Nature","year":"1999","author":"Monk T.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","unstructured":"K. Keys. iunder tool 2000. http:\/\/www.caida.org\/ tools\/measurement\/iffinder\/.  K. Keys. iunder tool 2000. http:\/\/www.caida.org\/ tools\/measurement\/iffinder\/."},{"key":"e_1_2_1_16_1","unstructured":"M. Luckie. scamper tool. http:\/\/www.wand.net.nz\/ scamper\/.  M. Luckie. scamper tool. http:\/\/www.wand.net.nz\/ scamper\/."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/280549.280555"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096546"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402993"},{"key":"e_1_2_1_20_1","unstructured":"N. Spring M. Dontcheva M. Rodrig and D. Wetherall. How to resolve IP aliases. Technical report May 2004.  N. Spring M. Dontcheva M. Rodrig and D. Wetherall. How to resolve IP aliases. Technical report May 2004."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633039"},{"volume-title":"4th USENIX Symposium on Internet Technologies and Systems","year":"2002","author":"Spring N.","key":"e_1_2_1_22_1"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1672308.1672318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1672308.1672318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:24Z","timestamp":1750278384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1672308.1672318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,7]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1,7]]}},"alternative-id":["10.1145\/1672308.1672318"],"URL":"https:\/\/doi.org\/10.1145\/1672308.1672318","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2010,1,7]]},"assertion":[{"value":"2010-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}