{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:31Z","timestamp":1750307251493,"version":"3.41.0"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2010,10,22]],"date-time":"2010-10-22T00:00:00Z","timestamp":1287705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2010,10,22]]},"abstract":"<jats:p>On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshops. The goals of this workshop were to further our understanding of the potential and limitations of active measurement research and infrastructure in the wide-area Internet, and to promote cooperative solutions and coordinated strategies to addressing future data needs of the network and security research communities. The three-day workshop included presentations, group discussion and analysis, and focused interaction between participating researchers, operators, and policymakers from all over the world. This report describes the motivation and findings of the workshop, and reviews progress on recommendations developed at the 1st Active Internet Measurements Workshop in 2009 [18]. Slides from the workshop presentations are available at [9].<\/jats:p>","DOI":"10.1145\/1880153.1880162","type":"journal-article","created":{"date-parts":[[2010,11,9]],"date-time":"2010-11-09T13:52:03Z","timestamp":1289310723000},"page":"53-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The 2nd workshop on active internet measurements (AIMS-2) report"],"prefix":"10.1145","volume":"40","author":[{"given":"kc","family":"claffy","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Emile","family":"Aben","sequence":"additional","affiliation":[{"name":"RIPE-NCC, Amsterdam, Netherlands"}]},{"given":"Jordan","family":"Auge","sequence":"additional","affiliation":[{"name":"University Pierre &amp; Marie Curie, Paris, France"}]},{"given":"Robert","family":"Beverly","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School, Monterey, CA, USA"}]},{"given":"Fabian","family":"Bustamante","sequence":"additional","affiliation":[{"name":"Northwestern University, Chicago, IL, USA"}]},{"given":"Benoit","family":"Donnet","sequence":"additional","affiliation":[{"name":"Universite catholique de Louvin \/ FNRS, Louvain-la-Neuve, Belgium"}]},{"given":"Timur","family":"Friedman","sequence":"additional","affiliation":[{"name":"University Pierre &amp; Marie Curie, Paris, France"}]},{"given":"Marina","family":"Fomenkov","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Peter","family":"Haga","sequence":"additional","affiliation":[{"name":"Eotvos Lorand University, Budapest, Hungary"}]},{"given":"Matthew","family":"Luckie","sequence":"additional","affiliation":[{"name":"University of Waikato, Waikato, New Zealand"}]},{"given":"Yuval","family":"Shavitt","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]}],"member":"320","published-online":{"date-parts":[[2010,10,22]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Iplane.http:\/\/iplane.cs.washington.edu.  Iplane.http:\/\/iplane.cs.washington.edu."},{"key":"e_1_2_1_2_1","unstructured":"AquaLab@Northwestern. EdgeScope -- Sharing the view from a distributed Internet telescope. http:\/\/www.aqualab.cs.northwestern.edu\/projects\/EdgeScope.html.  AquaLab@Northwestern. EdgeScope -- Sharing the view from a distributed Internet telescope. http:\/\/www.aqualab.cs.northwestern.edu\/projects\/EdgeScope.html."},{"key":"e_1_2_1_3_1","volume-title":"Ietf working group on geographic location\/privacy","author":"Barnes Richard","year":"2009","unstructured":"Richard Barnes . Ietf working group on geographic location\/privacy , 2009 . http:\/\/tools.ietf.org\/wg\/geopriv\/,rbarnes@bbn.com. Richard Barnes. Ietf working group on geographic location\/privacy, 2009. http:\/\/tools.ietf.org\/wg\/geopriv\/,rbarnes@bbn.com."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644936"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879162"},{"key":"e_1_2_1_6_1","volume-title":"CAIDA's Geolocation ToolsComparison","author":"Huffaker Bradley","year":"2010","unstructured":"Bradley Huffaker and kc claffy. CAIDA's Geolocation ToolsComparison , 2010 . http:\/\/www.caida.org\/projects\/cybersecurity\/geolocation\/. Bradley Huffaker and kc claffy. CAIDA's Geolocation ToolsComparison, 2010. http:\/\/www.caida.org\/projects\/cybersecurity\/geolocation\/."},{"key":"e_1_2_1_7_1","unstructured":"CAIDA. The DHS PREDICT project.http:\/\/www.caida.org\/projects\/predict\/.  CAIDA. The DHS PREDICT project.http:\/\/www.caida.org\/projects\/predict\/."},{"key":"e_1_2_1_8_1","unstructured":"CAIDA. Netgeo ref.http:\/\/www.caida.org\/utilities\/netgeo\/.  CAIDA. Netgeo ref.http:\/\/www.caida.org\/utilities\/netgeo\/."},{"key":"e_1_2_1_9_1","volume-title":"ISMA 2009 AIMS - Workshop on Active InternetMeasurements","author":"CAIDA.","year":"2009","unstructured":"CAIDA. ISMA 2009 AIMS - Workshop on Active InternetMeasurements , 2009 .http:\/\/www.caida.org\/workshops\/isma\/0902\/. CAIDA. ISMA 2009 AIMS - Workshop on Active InternetMeasurements, 2009.http:\/\/www.caida.org\/workshops\/isma\/0902\/."},{"key":"e_1_2_1_10_1","volume-title":"ISMA 2010 AIMS-2 - Workshop on ActiveInternet Measurements","author":"CAIDA.","year":"2010","unstructured":"CAIDA. ISMA 2010 AIMS-2 - Workshop on ActiveInternet Measurements , 2010 .http:\/\/www.caida.org\/workshops\/isma\/1002\/. CAIDA. ISMA 2010 AIMS-2 - Workshop on ActiveInternet Measurements, 2010.http:\/\/www.caida.org\/workshops\/isma\/1002\/."},{"key":"e_1_2_1_11_1","volume-title":"Where the SidewalkEnds: Extending the Internet AS Graph Using TraceroutesFrom P2P Users","author":"Chen Kai","year":"2009","unstructured":"Kai Chen , David Choffnes , Rahul Potharaju , Yan Chen , Fabian Bustamante , and Yao Zhao . Where the SidewalkEnds: Extending the Internet AS Graph Using TraceroutesFrom P2P Users . Rome, Italy , December 2009 . Kai Chen, David Choffnes, Rahul Potharaju, Yan Chen,Fabian Bustamante, and Yao Zhao. Where the SidewalkEnds: Extending the Internet AS Graph Using TraceroutesFrom P2P Users. Rome, Italy, December 2009."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764880"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1403000"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851228"},{"key":"e_1_2_1_15_1","volume-title":"Ethics inComputer Security Research (WECSR","author":"Erin Kenneally Douglas Maughan","year":"2010","unstructured":"Douglas Maughan Erin Kenneally , Michael Bailey . AFramework for Understanding and Applying EthicalPrinciples in Network and Security Research . In Ethics inComputer Security Research (WECSR 2010 ), January2010. Douglas Maughan Erin Kenneally, Michael Bailey. AFramework for Understanding and Applying EthicalPrinciples in Network and Security Research. In Ethics inComputer Security Research (WECSR 2010), January2010."},{"key":"e_1_2_1_16_1","unstructured":"Cooperative Association for Internet Data Analysis.Internet Topology Data Kit April 2010. http:\/\/www.caida.org\/data\/active\/internet-topology-data-kit\/.  Cooperative Association for Internet Data Analysis.Internet Topology Data Kit April 2010. http:\/\/www.caida.org\/data\/active\/internet-topology-data-kit\/."},{"key":"e_1_2_1_17_1","volume-title":"Institutionalreview boards and your research: A proposal for improvingthe review procedures for research projects that involvehuman subjects and their associated identifiable privateinformation","author":"Garfinkel Simson","year":"2010","unstructured":"Simson Garfinkel and Lorrie Faith Cranor . Institutionalreview boards and your research: A proposal for improvingthe review procedures for research projects that involvehuman subjects and their associated identifiable privateinformation . 2010 .http:\/\/simson.net\/clips\/academic\/2010.CACM.IRB.pdf. Simson Garfinkel and Lorrie Faith Cranor. Institutionalreview boards and your research: A proposal for improvingthe review procedures for research projects that involvehuman subjects and their associated identifiable privateinformation. 2010.http:\/\/simson.net\/clips\/academic\/2010.CACM.IRB.pdf."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1889324.1889335"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629607.1629614"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.38"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.57"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672318"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198267"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.12.004"},{"key":"e_1_2_1_25_1","volume-title":"OSDI","author":"Madhyastha Harsha V.","year":"2006","unstructured":"Harsha V. Madhyastha , Tomas Isdal , Michael Piatek , ColinDixon, Thomas Anderson , Arvind Krishnamurthy , and Arun Venkataramani . iPlane : An Information Plane forDistributed Services . In OSDI , 2006 . Harsha V. Madhyastha, Tomas Isdal, Michael Piatek, ColinDixon, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani. iPlane: An Information Plane forDistributed Services. In OSDI, 2006."},{"key":"e_1_2_1_26_1","volume-title":"NSDI","author":"Madhyastha Harsha V.","year":"2009","unstructured":"Harsha V. Madhyastha , Ethan Katz-Bassett , ThomasAnderson, Arvind Krishnamurthy , and ArunVenkataramani. i Plane Nano : Path Prediction forPeer-to-Peer Applications . In NSDI , 2009 . Harsha V. Madhyastha, Ethan Katz-Bassett, ThomasAnderson, Arvind Krishnamurthy, and ArunVenkataramani. iPlane Nano: Path Prediction forPeer-to-Peer Applications. In NSDI, 2009."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644937"},{"key":"e_1_2_1_28_1","unstructured":"Saverio Niccolini Sandra Tartarelli Juergen Quittek Thomas Dietz and Martin Swany. Information model andXML data model for traceroute measurements.http:\/\/www.ietf.org\/rfc\/rfc5388.txt.  Saverio Niccolini Sandra Tartarelli Juergen Quittek Thomas Dietz and Martin Swany. Information model andXML data model for traceroute measurements.http:\/\/www.ietf.org\/rfc\/rfc5388.txt."},{"key":"e_1_2_1_29_1","volume-title":"Spotter: A Model Based ActiveGeolocation Service","author":"Laki S.","year":"2010","unstructured":"S. Laki and P. Matray and P. Haga and T. Sebok and I. Csabai and G. Vattay . Spotter: A Model Based ActiveGeolocation Service , 2010 . in preparation. S. Laki and P. Matray and P. Haga and T. Sebok and I.Csabai and G. Vattay. Spotter: A Model Based ActiveGeolocation Service, 2010. in preparation."},{"key":"e_1_2_1_30_1","unstructured":"Yuval Shavitt and Noa Zilberman. A study of geolocationdatabases. Technical report.http:\/\/arxiv.org\/abs\/1005.5674.  Yuval Shavitt and Noa Zilberman. A study of geolocationdatabases. Technical report.http:\/\/arxiv.org\/abs\/1005.5674."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.11.017"},{"key":"e_1_2_1_32_1","volume-title":"Geolocation workinggroup","author":"Womer Team Contact","year":"2009","unstructured":"Team Contact W3C Womer , Matt. Geolocation workinggroup , 2009 . http:\/\/www.w3.org\/2008\/geolocation\/. Team Contact W3C Womer, Matt. Geolocation workinggroup, 2009. http:\/\/www.w3.org\/2008\/geolocation\/."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1880153.1880162","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1880153.1880162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:16Z","timestamp":1750243936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1880153.1880162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,22]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,10,22]]}},"alternative-id":["10.1145\/1880153.1880162"],"URL":"https:\/\/doi.org\/10.1145\/1880153.1880162","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2010,10,22]]},"assertion":[{"value":"2010-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}