{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:58Z","timestamp":1750221298995,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T00:00:00Z","timestamp":1548633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2019,1,28]]},"abstract":"<jats:p>On 13--15 March 2018, CAIDA hosted its tenth Workshop on Active Internet Measurements (AIMS-10). This workshop series provides a forum for stakeholders in Internet active measurement projects to communicate their interests and concerns, and explore cooperative approaches to maximizing the collective benefit of deployed infrastructure and gathered data. An overarching theme this year was how to inform new legislation of communications policy in the U.S. Given the continued limited insight into Internet operations by researchers and policymakers, we tried to focus these discussions on what data is or could be measured to shape and support current and emerging policy debates. Materials related to the workshop are at http:\/\/www.caida.org\/workshops\/aims\/1803\/.<\/jats:p>","DOI":"10.1145\/3310165.3310171","type":"journal-article","created":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T13:16:22Z","timestamp":1548767782000},"page":"41-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The 10th workshop on active internet measurements (AIMS-10) report"],"prefix":"10.1145","volume":"48","author":[{"given":"kc","family":"claffy","sequence":"first","affiliation":[{"name":"UCSD\/CAIDA"}]},{"given":"David","family":"Clark","sequence":"additional","affiliation":[{"name":"MIT\/CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2019,1,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"volume-title":"2017 29th International Teletraffic Congress (ITC 29)","author":"Barik R.","key":"e_1_2_1_2_1","unstructured":"R. Barik , M. Welzl , A. M. Elmokashfi , S. Gjessing , and S. Islam . 2017. fling: A Flexible Ping for Middlebox Measurements . In 2017 29th International Teletraffic Congress (ITC 29) . R. Barik, M. Welzl, A. M. Elmokashfi, S. Gjessing, and S. Islam. 2017. fling: A Flexible Ping for Middlebox Measurements. In 2017 29th International Teletraffic Congress (ITC 29)."},{"key":"e_1_2_1_3_1","unstructured":"CAIDA. {n. d.}. Archipelago Measurement Infrastructure. http:\/\/www.caida.org\/projects\/ark\/.  CAIDA. {n. d.}. Archipelago Measurement Infrastructure. http:\/\/www.caida.org\/projects\/ark\/."},{"key":"e_1_2_1_4_1","unstructured":"CAIDA. {n. d.}. AS-rank. http:\/\/as-rank.caida.org.  CAIDA. {n. d.}. AS-rank. http:\/\/as-rank.caida.org."},{"key":"e_1_2_1_5_1","volume-title":"Vela: On-Demand Topology Measurement Service. https:\/\/www.caida.org\/projects\/ark\/vela\/.","author":"CAIDA.","year":"2016","unstructured":"CAIDA. 2016 . Vela: On-Demand Topology Measurement Service. https:\/\/www.caida.org\/projects\/ark\/vela\/. CAIDA. 2016. Vela: On-Demand Topology Measurement Service. https:\/\/www.caida.org\/projects\/ark\/vela\/."},{"key":"e_1_2_1_6_1","unstructured":"CAIDA. 2018. BGPStream V2 Private Beta. https:\/\/bgpstream.caida.org\/v2-beta.  CAIDA. 2018. BGPStream V2 Private Beta. https:\/\/bgpstream.caida.org\/v2-beta."},{"key":"e_1_2_1_7_1","unstructured":"CAIDA's Macroscopic Internet Topology Data Kit (ITDK). {n. d.}. http:\/\/www.caida.org\/data\/active\/internet-topology-data-kit\/.  CAIDA's Macroscopic Internet Topology Data Kit (ITDK). {n. d.}. http:\/\/www.caida.org\/data\/active\/internet-topology-data-kit\/."},{"key":"e_1_2_1_8_1","unstructured":"Federal Communications Commission. 2018. Restoring Internet Freedom Order Taking Effect. https:\/\/transition.fcc.gov\/Daily_Releases\/Daily_Business\/2018\/db0510\/DOC-350643A1.pdf.  Federal Communications Commission. 2018. Restoring Internet Freedom Order Taking Effect. https:\/\/transition.fcc.gov\/Daily_Releases\/Daily_Business\/2018\/db0510\/DOC-350643A1.pdf."},{"key":"e_1_2_1_9_1","unstructured":"Federal Communications Commission. 2018. Transparency Disclosures Portal. http:\/\/www.fcc.gov\/disclosures.  Federal Communications Commission. 2018. Transparency Disclosures Portal. http:\/\/www.fcc.gov\/disclosures."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230549"},{"key":"e_1_2_1_11_1","volume-title":"IMPACT: Information Marketplace for Policy and Analysis of Cyber-risk and Trust. https:\/\/impactcybertrust.org\/.","author":"Science DHS","year":"2016","unstructured":"DHS Science & Technology. 2016 . IMPACT: Information Marketplace for Policy and Analysis of Cyber-risk and Trust. https:\/\/impactcybertrust.org\/. DHS Science & Technology. 2016. IMPACT: Information Marketplace for Policy and Analysis of Cyber-risk and Trust. https:\/\/impactcybertrust.org\/."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.23919\/ITC.2017.8064352"},{"key":"e_1_2_1_13_1","unstructured":"Ethan Katz-Bassett. 2010. Reverse Traceroute. http:\/\/research.cs.washington.edu\/networking\/astronomy\/reverse-traceroute.html.  Ethan Katz-Bassett. 2010. Reverse Traceroute. http:\/\/research.cs.washington.edu\/networking\/astronomy\/reverse-traceroute.html."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131383"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278536"},{"key":"e_1_2_1_16_1","unstructured":"kc claffy. 2017. \"DIBBs: Integrated Platform for Applied Network Data Analysis (PANDA)\". http:\/\/www.caida.org\/funding\/dibbs-panda\/.  kc claffy. 2017. \"DIBBs: Integrated Platform for Applied Network Data Analysis (PANDA)\". http:\/\/www.caida.org\/funding\/dibbs-panda\/."},{"key":"e_1_2_1_17_1","unstructured":"K. Keys and Y. Hyun. {n. d.}. MIDAR: Monotonic ID-Based Alias Resolution Tool. http:\/\/www.caida.org\/tools\/measurement\/midar\/.  K. Keys and Y. Hyun. {n. d.}. MIDAR: Monotonic ID-Based Alias Resolution Tool. http:\/\/www.caida.org\/tools\/measurement\/midar\/."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2198887"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_5"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987467"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987467"},{"key":"e_1_2_1_22_1","unstructured":"Matthew J. Luckie. {n. d.}. Scamper. http:\/\/www.caida.org\/tools\/measurement\/scamper\/.  Matthew J. Luckie. {n. d.}. Scamper. http:\/\/www.caida.org\/tools\/measurement\/scamper\/."},{"key":"e_1_2_1_23_1","volume-title":"kc claffy, and Jonathan M. Smith","author":"Marder Alexander","year":"2018","unstructured":"Alexander Marder , Matthew Luckie , Amogh Dhamdhere , Bradley Huffaker , kc claffy, and Jonathan M. Smith . 2018 . Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet Scale. In ACM SIGCOMM. Alexander Marder, Matthew Luckie, Amogh Dhamdhere, Bradley Huffaker, kc claffy, and Jonathan M. Smith. 2018. Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet Scale. In ACM SIGCOMM."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987468"},{"key":"e_1_2_1_25_1","unstructured":"University of Michigan. {n. d.}. Censored Planet. http:\/\/censoredplanet.com\/.  University of Michigan. {n. d.}. Censored Planet. http:\/\/censoredplanet.com\/."},{"key":"e_1_2_1_26_1","unstructured":"RIPE NCC. 1992--2018. RIPE NCC IPmap: A Collaborative Approach to Mapping Internet Infrastructure. https:\/\/openipmap.ripe.net\/.  RIPE NCC. 1992--2018. RIPE NCC IPmap: A Collaborative Approach to Mapping Internet Infrastructure. https:\/\/openipmap.ripe.net\/."},{"key":"e_1_2_1_27_1","unstructured":"Roderick Fanou. 2018. \"(ARDA) African Route-collectors Data Analyzer Source Code\". https:\/\/github.com\/rodricfanou\/African_Route-collectors_Data_Analyzer-ARDA.git.  Roderick Fanou. 2018. \"(ARDA) African Route-collectors Data Analyzer Source Code\". https:\/\/github.com\/rodricfanou\/African_Route-collectors_Data_Analyzer-ARDA.git."},{"key":"e_1_2_1_28_1","unstructured":"Roderick Fanou Victor Sanchez-Aguero Francisco Valera Michuki Mwangi Jane Coffin . 2017. (ARDA) African Route-collectors Data Analyzer. https:\/\/arda.af-ix.net\/.  Roderick Fanou Victor Sanchez-Aguero Francisco Valera Michuki Mwangi Jane Coffin . 2017. (ARDA) African Route-collectors Data Analyzer. https:\/\/arda.af-ix.net\/."},{"key":"e_1_2_1_29_1","volume-title":"ARTEMIS: Neutralizing BGP Hijacking within a Minute. Technical Report","author":"Sermpezis P.","year":"2018","unstructured":"P. Sermpezis , V. Kotronis , P. Gigis , X. Dimitropoulos , D. Cicalese , A. King , and A. Dainotti . 2018 . ARTEMIS: Neutralizing BGP Hijacking within a Minute. Technical Report . Center for Applied Internet Data Analysis (CAIDA) . P. Sermpezis, V. Kotronis, P. Gigis, X. Dimitropoulos, D. Cicalese, A. King, and A. Dainotti. 2018. ARTEMIS: Neutralizing BGP Hijacking within a Minute. Technical Report. Center for Applied Internet Data Analysis (CAIDA)."},{"key":"e_1_2_1_30_1","volume-title":"Quack: Scalable Remote Measurement of Application-Layer Censorship. In USENIX Security Symposium.","author":"VanderSloot Ben","year":"2018","unstructured":"Ben VanderSloot , Allison McDonald , Will Scott , J. Alex Halderman , and Roya Ensafi . 2018 . Quack: Scalable Remote Measurement of Application-Layer Censorship. In USENIX Security Symposium. Ben VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi. 2018. Quack: Scalable Remote Measurement of Application-Layer Censorship. In USENIX Security Symposium."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3310165.3310171","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3310165.3310171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:15Z","timestamp":1750212795000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3310165.3310171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,28]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,1,28]]}},"alternative-id":["10.1145\/3310165.3310171"],"URL":"https:\/\/doi.org\/10.1145\/3310165.3310171","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2019,1,28]]},"assertion":[{"value":"2019-01-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}