{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T20:13:09Z","timestamp":1774987989205,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T00:00:00Z","timestamp":1344816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,13]]},"DOI":"10.1145\/2342356.2342435","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"395-406","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":57,"title":["LIFEGUARD"],"prefix":"10.1145","author":[{"given":"Ethan","family":"Katz-Bassett","sequence":"first","affiliation":[{"name":"University of Washington &amp; University of Southern California, Seattle, WA, USA"}]},{"given":"Colin","family":"Scott","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"David R.","family":"Choffnes","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"\u00cdtalo","family":"Cunha","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais, Belo Horizonte, MG, Brazil"}]},{"given":"Vytautas","family":"Valancius","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Harsha V.","family":"Madhyastha","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"Thomas","family":"Anderson","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Arvind","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,8,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Abilene Internet2 network. http:\/\/www.internet2.edu\/network\/.  Abilene Internet2 network. http:\/\/www.internet2.edu\/network\/."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"e_1_3_2_2_3_1","unstructured":"R. Austein S. Bellovin R. Bush R. Housley M. Lepinski S. Kent W. Kumari D. Montgomery K. Sriram and S. Weiler. BGPSEC protocol. http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-bgpsec-protocol.  R. Austein S. Bellovin R. Bush R. Housley M. Lepinski S. Kent W. Kumari D. Montgomery K. Sriram and S. Weiler. BGPSEC protocol. http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-bgpsec-protocol."},{"key":"e_1_3_2_2_4_1","unstructured":"The BGP Instability Report. http:\/\/bgpupdates.potaroo.net\/instability\/bgpupd.html.  The BGP Instability Report. http:\/\/bgpupdates.potaroo.net\/instability\/bgpupd.html."},{"key":"e_1_3_2_2_5_1","unstructured":"BGPMux Transit Portal. http:\/\/tp.gtnoise.net\/.  BGPMux Transit Portal. http:\/\/tp.gtnoise.net\/."},{"key":"e_1_3_2_2_6_1","volume-title":"MIT OpenCourseWare 18.996","author":"Bornstein C.","year":"2002","unstructured":"C. Bornstein , T. Canfield , and G. Miller . Akarouting: A better way to go . In MIT OpenCourseWare 18.996 , 2002 . C. Bornstein, T. Canfield, and G. Miller. Akarouting: A better way to go. In MIT OpenCourseWare 18.996, 2002."},{"key":"e_1_3_2_2_7_1","volume-title":"NANOG","author":"Brown M. A.","year":"2009","unstructured":"M. A. Brown , C. Hepner , and A. C. Popescu . Internet captivity and the de-peering menace . In NANOG , 2009 . M. A. Brown, C. Hepner, and A. C. Popescu. Internet captivity and the de-peering menace. In NANOG, 2009."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644923"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658964"},{"key":"e_1_3_2_2_10_1","unstructured":"L. Colitti. Internet Topology Discovery Using Active Probing. PhD thesis University di \"Roma Tre\" 2006.  L. Colitti. Internet Topology Discovery Using Active Probing. PhD thesis University di \"Roma Tre\" 2006."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018451"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064256"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/885651.781043"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015491"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_2_16_1","volume-title":"OSDI","author":"Gummadi K. P.","year":"2004","unstructured":"K. P. Gummadi , H. V. Madhyastha , S. D. Gribble , H. M. Levy , and D. Wetherall . Improving the reliability of Internet paths with one-hop source routing . In OSDI , 2004 . K. P. Gummadi, H. V. Madhyastha, S. D. Gribble, H. M. Levy, and D. Wetherall. Improving the reliability of Internet paths with one-hop source routing. In OSDI, 2004."},{"key":"e_1_3_2_2_17_1","unstructured":"iPlane. http:\/\/iplane.cs.washington.edu.  iPlane. http:\/\/iplane.cs.washington.edu."},{"key":"e_1_3_2_2_18_1","volume-title":"NSDI","author":"John J. P.","year":"2008","unstructured":"J. P. John , E. Katz-Bassett , A. Krishnamurthy , T. Anderson , and A. Venkataramani . Consensus routing: The Internet as a distributed system . In NSDI , 2008 . J. P. John, E. Katz-Bassett, A. Krishnamurthy, T. Anderson, and A. Venkataramani. Consensus routing: The Internet as a distributed system. In NSDI, 2008."},{"key":"e_1_3_2_2_19_1","volume-title":"NSDI","author":"Katz-Bassett E.","year":"2010","unstructured":"E. Katz-Bassett , H. V. Madhyastha , V. K. Adhikari , C. Scott , J. Sherry , P. van Wesep , A. Krishnamurthy , and T. Anderson . Reverse traceroute . In NSDI , 2010 . E. Katz-Bassett, H. V. Madhyastha, V. K. Adhikari, C. Scott, J. Sherry, P. van Wesep, A. Krishnamurthy, and T. Anderson. Reverse traceroute. In NSDI, 2010."},{"key":"e_1_3_2_2_20_1","volume-title":"NSDI","author":"Katz-Bassett E.","year":"2008","unstructured":"E. Katz-Bassett , H. V. Madhyastha , J. P. John , A. Krishnamurthy , D. Wetherall , and T. Anderson . Studying black holes in the Internet with Hubble . In NSDI , 2008 . E. Katz-Bassett, H. V. Madhyastha, J. P. John, A. Krishnamurthy, D. Wetherall, and T. Anderson. Studying black holes in the Internet with Hubble. In NSDI, 2008."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.252"},{"key":"e_1_3_2_2_22_1","volume-title":"NSDI","author":"Kushman N.","year":"2007","unstructured":"N. Kushman , S. Kandula , and D. Katabi . R-BGP: Staying connected in a connected world . In NSDI , 2007 . N. Kushman, S. Kandula, and D. Katabi. R-BGP: Staying connected in a connected world. In NSDI, 2007."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347428"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282408"},{"key":"e_1_3_2_2_25_1","volume-title":"NSDI","author":"Madhyastha H.","year":"2009","unstructured":"H. Madhyastha , E. Katz-Bassett , T. Anderson , A. Krishnamurthy , and A. Venkataramani . iPlane Nano: Path Prediction for Peer-to-Peer Applications . In NSDI , 2009 . H. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane Nano: Path Prediction for Peer-to-Peer Applications. In NSDI, 2009."},{"key":"e_1_3_2_2_26_1","unstructured":"D. Meyer. RouteViews. http:\/\/www.routeviews.org.  D. Meyer. RouteViews. http:\/\/www.routeviews.org."},{"key":"e_1_3_2_2_27_1","unstructured":"P. Mohapatra J. Scudder D. Ward R. Bush and R. Austein. BGP prefix origin validation. http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-pfx-validate.  P. Mohapatra J. Scudder D. Ward R. Bush and R. Austein. BGP prefix origin validation. http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-pfx-validate."},{"key":"e_1_3_2_2_28_1","unstructured":"Outages mailing list. http:\/\/isotf.org\/mailman\/listinfo\/outages.  Outages mailing list. http:\/\/isotf.org\/mailman\/listinfo\/outages."},{"key":"e_1_3_2_2_29_1","unstructured":"Packet clearing house. http:\/\/www.pch.net\/home\/index.php.  Packet clearing house. http:\/\/www.pch.net\/home\/index.php."},{"key":"e_1_3_2_2_30_1","volume-title":"A survey of the utilization of the BGP community attribute. Internet draft, draft-quoitin-bgp-comm-survey-00","author":"Quoitin B.","year":"2002","unstructured":"B. Quoitin and O. Bonaventure . A survey of the utilization of the BGP community attribute. Internet draft, draft-quoitin-bgp-comm-survey-00 , 2002 . B. Quoitin and O. Bonaventure. A survey of the utilization of the BGP community attribute. Internet draft, draft-quoitin-bgp-comm-survey-00, 2002."},{"key":"e_1_3_2_2_31_1","unstructured":"RIPE RIS. http:\/\/www.ripe.net\/ris\/.  RIPE RIS. http:\/\/www.ripe.net\/ris\/."},{"key":"e_1_3_2_2_32_1","volume-title":"LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically. Technical report","author":"Scott C.","year":"2012","unstructured":"C. Scott . LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically. Technical report , Univ. of Washington , 2012 . C. Scott. LIFEGUARD: Locating Internet Failures Effectively and Generating Usable Alternate Routes Dynamically. Technical report, Univ. of Washington, 2012."},{"key":"e_1_3_2_2_33_1","unstructured":"UCLA Internet topology. http:\/\/irl.cs.ucla.edu\/topology\/.  UCLA Internet topology. http:\/\/irl.cs.ucla.edu\/topology\/."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159934"},{"key":"e_1_3_2_2_35_1","volume-title":"AT&T Labs","author":"Yates J.","year":"2009","unstructured":"J. Yates and Z. Ge . Network Management: Fault Management, Performance Management and Planned Maintenance. Technical report , AT&T Labs , 2009 . J. Yates and Z. Ge. Network Management: Fault Management, Performance Management and Planned Maintenance. Technical report, AT&T Labs, 2009."},{"key":"e_1_3_2_2_36_1","volume-title":"OSDI","author":"Zhang M.","year":"2004","unstructured":"M. Zhang , C. Zhang , V. Pai , L. Peterson , and R. Wang . PlanetSeer : Internet path failure monitoring and characterization in wide-area services . In OSDI , 2004 . M. Zhang, C. Zhang, V. Pai, L. Peterson, and R.Wang. PlanetSeer: Internet path failure monitoring and characterization in wide-area services. In OSDI, 2004."},{"key":"e_1_3_2_2_38_1","volume-title":"NSDI","author":"Zhang Z.","year":"2010","unstructured":"Z. Zhang , M. Zhang , A. Greenberg , Y. C. Hu , R. Mahajan , and B. Christian . Optimizing cost and performance in online service provider networks . In NSDI , 2010 . Z. Zhang, M. Zhang, A. Greenberg, Y. C. Hu, R. Mahajan, and B. Christian. Optimizing cost and performance in online service provider networks. In NSDI, 2010."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402996"}],"event":{"name":"SIGCOMM '12: ACM SIGCOMM 2012 Conference","location":"Helsinki Finland","acronym":"SIGCOMM '12","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342435","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2342356.2342435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:23Z","timestamp":1750238483000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342356.2342435"}},"subtitle":["practical repair of persistent route failures"],"short-title":[],"issued":{"date-parts":[[2012,8,13]]},"references-count":38,"alternative-id":["10.1145\/2342356.2342435","10.1145\/2342356"],"URL":"https:\/\/doi.org\/10.1145\/2342356.2342435","relation":{},"subject":[],"published":{"date-parts":[[2012,8,13]]},"assertion":[{"value":"2012-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}