{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:30:42Z","timestamp":1773117042219,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,1]],"date-time":"2010-11-01T00:00:00Z","timestamp":1288569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1145\/1879141.1879149","type":"proceedings-article","created":{"date-parts":[[2010,11,9]],"date-time":"2010-11-09T15:01:31Z","timestamp":1289314891000},"page":"62-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":114,"title":["Internet background radiation revisited"],"prefix":"10.1145","author":[{"given":"Eric","family":"Wustrow","sequence":"first","affiliation":[{"name":"Merit Network, Inc, Ann Arbor, MI, USA"}]},{"given":"Manish","family":"Karir","sequence":"additional","affiliation":[{"name":"Merit Networks, Inc., Ann Arbor, MI, USA"}]},{"given":"Michael","family":"Bailey","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Farnam","family":"Jahanian","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Geoff","family":"Huston","sequence":"additional","affiliation":[{"name":"Asia Pacific Network Information Centre, Brisbane, Australia"}]}],"member":"320","published-online":{"date-parts":[[2010,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.106"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251327.1251329"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286376"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029627"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_8"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS)","author":"Bailey M.","year":"2005","unstructured":"M. Bailey , E. Cooke , D. Watson , F. Jahanian , and N. Provos . The In- ternet Motion Sensor - A Distributed Blackhole Monitoring System . In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS) , Feb 2005 . M. Bailey, E. Cooke, D. Watson, F. Jahanian, and N. Provos. The In- ternet Motion Sensor - A Distributed Blackhole Monitoring System. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS), Feb 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop)","author":"Cooke Evan","year":"2005","unstructured":"Evan Cooke , Farnam Jahanian , and Danny McPherson . The Zombie roundup: Understanding, detecting, and disrupting botnets . In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop) , Cambridge, MA , July 2005 . Evan Cooke, Farnam Jahanian, and Danny McPherson. The Zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop), Cambridge, MA, July 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(06)70398-0"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851194"},{"key":"e_1_3_2_1_15_1","volume-title":"The Internet Protocol Journal","author":"Huston Geo\u00fd","year":"2008","unstructured":"Geo\u00fd Huston . The changing Foundation of the Internet: confronting IPv4 Address Exhaustion . The Internet Protocol Journal , September 2008 . Geo\u00fd Huston. The changing Foundation of the Internet: confronting IPv4 Address Exhaustion. The Internet Protocol Journal, September 2008."},{"key":"e_1_3_2_1_16_1","unstructured":"Protected Repository for the Defense of Infrastructure Against Cyber Threats. http:\/\/www.predict.org.  Protected Repository for the Defense of Infrastructure Against Cyber Threats. http:\/\/www.predict.org."},{"key":"e_1_3_2_1_17_1","volume-title":"David Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. Proceedings of the USENIX\/ACM Internet Measurement Conference","author":"Bailey Michael","year":"2005","unstructured":"Michael Bailey , Evan Cooke , Farnam Jahanian , Niels Provos , Karl Rosaen , and David Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. Proceedings of the USENIX\/ACM Internet Measurement Conference , October 2005 . Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, and David Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. Proceedings of the USENIX\/ACM Internet Measurement Conference, October 2005."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of Network and Distributed System Security Symposium (NDSS '07)","author":"Sinha Sushant","year":"2007","unstructured":"Sushant Sinha , Michael Bailey , and Farnam Jahanian . Shedding light on the configuration of dark addresses . In Proceedings of Network and Distributed System Security Symposium (NDSS '07) , February 2007 . Sushant Sinha, Michael Bailey, and Farnam Jahanian. Shedding light on the configuration of dark addresses. In Proceedings of Network and Distributed System Security Symposium (NDSS '07), February 2007."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 14th USENIX Security Symposium","author":"Bethencourt John","year":"2005","unstructured":"John Bethencourt , Jason Franklin , and Mary Vernon . Mapping Internet sensors with probe response attacks . In Proceedings of the 14th USENIX Security Symposium , Baltimore, MD , August 2005 . John Bethencourt, Jason Franklin, and Mary Vernon. Mapping Internet sensors with probe response attacks. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 14th USENIX Security Symposium","author":"Moheeb Abu","year":"2005","unstructured":"Moheeb Abu Ra jab, Fabian Monrose , and Andreas Terzis . On the e\u00fdective- ness of distributed worm monitoring . In Proceedings of the 14th USENIX Security Symposium , Baltimore, MD , August 2005 . Moheeb Abu Ra jab, Fabian Monrose, and Andreas Terzis. On the e\u00fdective- ness of distributed worm monitoring. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.39"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251119"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298316"},{"key":"e_1_3_2_1_24_1","unstructured":"Route Views Pro ject. University of Oregon Route Views Project. http:\/\/archive.routeviews.org\/ Aug 2010.  Route Views Pro ject. University of Oregon Route Views Project. http:\/\/archive.routeviews.org\/ Aug 2010."},{"key":"e_1_3_2_1_25_1","unstructured":"RIPE (Rseaux IP Europens). RIS Raw Data. http:\/\/www.ripe.net\/projects\/ris\/rawdata.html Aug 2010.  RIPE (Rseaux IP Europens). RIS Raw Data. http:\/\/www.ripe.net\/projects\/ris\/rawdata.html Aug 2010."},{"key":"e_1_3_2_1_26_1","unstructured":"RADb: Merit network inc. routing assets database. http:\/\/www.radb. net\/.  RADb: Merit network inc. routing assets database. http:\/\/www.radb. net\/."},{"key":"e_1_3_2_1_27_1","volume-title":"J. Wolfgang, and Castro S. Conflicker\/Conflicker\/Downadup as seen from the UCSD Network Telescope -","author":"Kantor B.","year":"2009","unstructured":"B. Kantor , S. Savage , R. Wesson , B. Enright , P. Porras , V. Yeg- neswaran , J. Wolfgang, and Castro S. Conflicker\/Conflicker\/Downadup as seen from the UCSD Network Telescope - Feb 2009 . http:\/\/www.caida.org\/research\/security\/ms08-067\/conflicker.xml. B. Kantor, S. Savage, R. Wesson, B. Enright, P. Porras, V. Yeg- neswaran, J. Wolfgang, and Castro S. Conflicker\/Conflicker\/Downadup as seen from the UCSD Network Telescope - Feb 2009. http:\/\/www.caida.org\/research\/security\/ms08-067\/conflicker.xml."},{"key":"e_1_3_2_1_28_1","volume-title":"RTP Traffic to 1.1.1.1 -","author":"Gauci S.","year":"2010","unstructured":"S. Gauci . RTP Traffic to 1.1.1.1 - Feb 2010 . http:\/\/blog.sipvicious.org\/2010\/02\/rtp-traffic-to-1111.html. S. Gauci. RTP Traffic to 1.1.1.1 - Feb 2010. http:\/\/blog.sipvicious.org\/2010\/02\/rtp-traffic-to-1111.html."},{"key":"e_1_3_2_1_29_1","volume-title":"usken.no - VoIP news! -","author":"Eivind S.","year":"2010","unstructured":"S. Eivind . usken.no - VoIP news! - Feb 2010 . http:\/\/www.usken.no\/2010\/02\/sip-scanning-causes-ddos-on-ip-1-1-1-1\/. S. Eivind. usken.no - VoIP news! - Feb 2010. http:\/\/www.usken.no\/2010\/02\/sip-scanning-causes-ddos-on-ip-1-1-1-1\/."},{"key":"e_1_3_2_1_30_1","volume-title":"Fake Servers List - Official eMule-Board -","author":"Adrian","year":"2010","unstructured":"Adrian Mari\u00c3{o. Fake Servers List - Official eMule-Board - Apr 2010 . http:\/\/forum.emule-project.net\/index.php?showtopic=139609&st=60. Adrian Mari\u00c3{o. Fake Servers List - Official eMule-Board - Apr 2010. http:\/\/forum.emule-project.net\/index.php?showtopic=139609&st=60."},{"key":"e_1_3_2_1_31_1","first-page":"101","volume-title":"Proceedings of the 3rd Symposium on Networked Systems Design & Implementation (NSDI'06)","author":"Cooke Evan","year":"2006","unstructured":"Evan Cooke , Michael Bailey , Farnam Jahanian , and Richard Mortier . The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discov- ery . In Proceedings of the 3rd Symposium on Networked Systems Design & Implementation (NSDI'06) , pages 101 -- 114 , San Jose, California, USA , May 2006 . Evan Cooke, Michael Bailey, Farnam Jahanian, and Richard Mortier. The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discov- ery. In Proceedings of the 3rd Symposium on Networked Systems Design & Implementation (NSDI'06), pages 101--114, San Jose, California, USA, May 2006."}],"event":{"name":"IMC '10: Internet Measurement Conference","location":"Melbourne Australia","acronym":"IMC '10","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 10th ACM SIGCOMM conference on Internet measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1879141.1879149","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1879141.1879149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:39Z","timestamp":1750249059000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1879141.1879149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":30,"alternative-id":["10.1145\/1879141.1879149","10.1145\/1879141"],"URL":"https:\/\/doi.org\/10.1145\/1879141.1879149","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]},"assertion":[{"value":"2010-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}