{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:05:37Z","timestamp":1758845137100,"version":"3.41.0"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2011,1,22]],"date-time":"2011-01-22T00:00:00Z","timestamp":1295654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2011,1,22]]},"abstract":"<jats:p>Data collected using traceroute-based algorithms underpins research into the Internet's router-level topology, though it is possible to infer false links from this data. One source of false inference is the combination of per-flow load-balancing, in which more than one path is active from a given source to destination, and classic traceroute, which varies the UDP destination port number or ICMP checksum of successive probe packets, which can cause per-flow load-balancers to treat successive packets as distinct flows and forward them along different paths. Consequently, successive probe packets can solicit responses from unconnected routers, leading to the inference of false links. This paper examines the inaccuracies induced from such false inferences, both on macroscopic and ISP topology mapping. We collected macroscopic topology data to 365k destinations, with techniques that both do and do not try to capture load balancing phenomena. We then use alias resolution techniques to infer if a measurement artifact of classic traceroute induces a false router-level link. This technique detected that 2.71% and 0.76% of the links in our UDP and ICMP graphs were falsely inferred due to the presence of load-balancing. We conclude that most per-flow load-balancing does not induce false links when macroscopic topology is inferred using classic traceroute. The effect of false links on ISP topology mapping is possibly much worse, because the degrees of a tier-1 ISP's routers derived from classic traceroute were inflated by a median factor of 2.9 as compared to those inferred with Paris traceroute.<\/jats:p>","DOI":"10.1145\/1925861.1925864","type":"journal-article","created":{"date-parts":[[2011,1,24]],"date-time":"2011-01-24T14:58:13Z","timestamp":1295881093000},"page":"14-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Measured impact of crooked traceroute"],"prefix":"10.1145","volume":"41","author":[{"given":"Matthew","family":"Luckie","sequence":"first","affiliation":[{"name":"University of Waikato, Hamilton, New Zealand"}]},{"given":"Amogh","family":"Dhamdhere","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"kc","family":"claffy","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"David","family":"Murrell","sequence":"additional","affiliation":[{"name":"University of Waikato, Hamilton, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2011,1,22]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Van Jacobson. traceroute. ftp:\/\/ftp.ee.lbl.gov\/traceroute.tar.gz.  Van Jacobson. traceroute. ftp:\/\/ftp.ee.lbl.gov\/traceroute.tar.gz."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/580055.829312"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096546"},{"volume-title":"OSDI","year":"2006","author":"Madhyastha Harsha V.","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633039"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298329"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316229"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948247"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254770"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658964"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926512"},{"volume-title":"Proceedings of SPIE ITCom","year":"2001","author":"Chang Hyunseok","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","unstructured":"R-fx Networks. Advanced policy firewall (APF).  R-fx Networks. Advanced policy firewall (APF)."},{"key":"e_1_2_1_15_1","first-page":"04","article-title":"How to resolve IP aliases","volume":"04","author":"Spring Neil","year":"2004","journal-title":"University of Washington UW-CSE-"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672318"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.649563"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832534"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452560"},{"key":"e_1_2_1_20_1","unstructured":"Ken Keys Young Hyun Matthew Luckie and kc claffy. Internet-Scale Alias Resolution with MIDAR. http:\/\/www.caida.org\/workshops\/isma\/1002\/.  Ken Keys Young Hyun Matthew Luckie and kc claffy. Internet-Scale Alias Resolution with MIDAR. http:\/\/www.caida.org\/workshops\/isma\/1002\/."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402993"},{"key":"e_1_2_1_22_1","unstructured":"CAIDA. Archipelago measurement infrastructure. http:\/\/www.caida.org\/projects\/ark\/.  CAIDA. Archipelago measurement infrastructure. http:\/\/www.caida.org\/projects\/ark\/."},{"key":"e_1_2_1_23_1","unstructured":"Matthew Luckie. Scamper. http:\/\/www.wand.net.nz\/scamper\/.  Matthew Luckie. Scamper. http:\/\/www.wand.net.nz\/scamper\/."},{"key":"e_1_2_1_24_1","unstructured":"University of Oregon route views project. http:\/\/www.routeviews.org\/.  University of Oregon route views project. http:\/\/www.routeviews.org\/."},{"key":"e_1_2_1_25_1","unstructured":"Team Cymru. Bogon bit notation list v5.0. http:\/\/www.cymru.com\/Documents\/bogon-bn.html.  Team Cymru. Bogon bit notation list v5.0. http:\/\/www.cymru.com\/Documents\/bogon-bn.html."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452557"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208685"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375482"},{"volume-title":"IEEE INFOCOM","year":"2004","author":"Mao Z. Morley","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282416"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1889324.1889334"},{"key":"e_1_2_1_32_1","unstructured":"UCLA. Internet topology collection. http:\/\/irl.cs.ucla.edu\/topology\/.  UCLA. Internet topology collection. http:\/\/irl.cs.ucla.edu\/topology\/."},{"key":"e_1_2_1_33_1","unstructured":"The CAIDA AS relationships dataset. http: \/\/www.caida.org\/data\/active\/as-relationships\/.  The CAIDA AS relationships dataset. http: \/\/www.caida.org\/data\/active\/as-relationships\/."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"volume-title":"Passive and Active Measurement Conference (PAM)","year":"2003","author":"Hyun Young","key":"e_1_2_1_35_1"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1925861.1925864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1925861.1925864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:33Z","timestamp":1750244373000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1925861.1925864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,22]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1,22]]}},"alternative-id":["10.1145\/1925861.1925864"],"URL":"https:\/\/doi.org\/10.1145\/1925861.1925864","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2011,1,22]]},"assertion":[{"value":"2011-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}