{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:46:45Z","timestamp":1774716405901,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354232","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"465-480","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Network Hygiene, Incentives, and Regulation"],"prefix":"10.1145","author":[{"given":"Matthew","family":"Luckie","sequence":"first","affiliation":[{"name":"University of Waikato, Hamilton, New Zealand"}]},{"given":"Robert","family":"Beverly","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School, Monterey, CA, USA"}]},{"given":"Ryan","family":"Koga","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Ken","family":"Keys","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Joshua A.","family":"Kroll","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School, Monterey, CA, USA"}]},{"given":"k","family":"claffy","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis , Tim April , Michael Bailey , Matt Bernhard , Elie Bursztein , Jaime Cochran , Zakir Durumeric , J. Alex Halderman , Luca Invernizzi , Michalis Kallitsis , Deepak Kumar , Chaz Lever , Zane Ma , Joshua Mason , Damian Menscher , Chad Seaman , Nick Sullivan , Kurt Thomas , and Yi Zhou . 2017 . Understanding the Mirai Botnet. In 26th USENIX Security Symposium . Vancouver, BC, 1093--1110. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium. Vancouver, BC, 1093--1110."},{"key":"e_1_3_2_1_2_1","unstructured":"Arbor Networks. 2018. Worldwide Infrastructure Security Report. https:\/\/resources.arbornetworks.com\/.  Arbor Networks. 2018. Worldwide Infrastructure Security Report. https:\/\/resources.arbornetworks.com\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"F. Baker and P. Savola. 2004. Ingress Filtering for Multihomed Networks. RFC 3704.  F. Baker and P. Savola. 2004. Ingress Filtering for Multihomed Networks. RFC 3704.","DOI":"10.17487\/rfc3704"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI).","author":"Beverly Robert","year":"2005","unstructured":"Robert Beverly and Steven Bauer . 2005 . The spoofer project: inferring the extent of source address filtering on the internet . In Proceedings of the USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI). Robert Beverly and Steven Bauer. 2005. The spoofer project: inferring the extent of source address filtering on the internet. In Proceedings of the USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Robert Beverly Arthur Berger Young Hyun and kc claffy. 2009. Understanding the efficacy of deployed Internet source address validation filtering. In IMC.  Robert Beverly Arthur Berger Young Hyun and kc claffy. 2009. Understanding the efficacy of deployed Internet source address validation filtering. In IMC.","DOI":"10.1145\/1644893.1644936"},{"key":"e_1_3_2_1_6_1","unstructured":"Brian Krebs. 2016. https:\/\/www.zdnet.com\/article\/krebs-on-security-booted-off-akamai-network-after-ddos-attack-proves-pricey\/.  Brian Krebs. 2016. https:\/\/www.zdnet.com\/article\/krebs-on-security-booted-off-akamai-network-after-ddos-attack-proves-pricey\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Cablelabs. 2006. Data Over Cable Service Interface Specification (DOCSIS). http:\/\/www.cablemodem.com\/.  Cablelabs. 2006. Data Over Cable Service Interface Specification (DOCSIS). http:\/\/www.cablemodem.com\/."},{"key":"e_1_3_2_1_8_1","volume-title":"PCI DSS: A Pocket Guide","author":"Calder Alan","year":"2015","unstructured":"Alan Calder and Geraint Williams . 2015 . PCI DSS: A Pocket Guide 4 th ed.). It Governance Ltd . Alan Calder and Geraint Williams. 2015. PCI DSS: A Pocket Guide 4th ed.). It Governance Ltd.","edition":"4"},{"key":"e_1_3_2_1_9_1","volume-title":"Ethan Katz-Bassett, and Ramesh Govindan.","author":"Chiu Yi-Ching","year":"2015","unstructured":"Yi-Ching Chiu , Brandon Schlinker , Abhishek Balaji Radhakrishnan , Ethan Katz-Bassett, and Ramesh Govindan. 2015 . Are We One Hop Away from a Better Internet?. In IMC. Yi-Ching Chiu, Brandon Schlinker, Abhishek Balaji Radhakrishnan, Ethan Katz-Bassett, and Ramesh Govindan. 2015. Are We One Hop Away from a Better Internet?. In IMC."},{"key":"e_1_3_2_1_10_1","unstructured":"Cisco. 2019. IPv6 Source Guard and Prefix Guard. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios-xml\/ios\/ipv6_fhsec\/configuration\/xe-3s\/ip6f-xe-3s-book\/ip6-src-guard.html.  Cisco. 2019. IPv6 Source Guard and Prefix Guard. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios-xml\/ios\/ipv6_fhsec\/configuration\/xe-3s\/ip6f-xe-3s-book\/ip6-src-guard.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Jakub Czyz Michael Kallitsis Manaf Gharaibeh Christos Papadopoulos Michael Bailey and Manish Karir. 2014. Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks. In IMC. 435--448.  Jakub Czyz Michael Kallitsis Manaf Gharaibeh Christos Papadopoulos Michael Bailey and Manish Karir. 2014. Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks. In IMC. 435--448.","DOI":"10.1145\/2663716.2663717"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Jakub Czyz Matthew Luckie Mark Allman and Michael Bailey. 2016. Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. In NDSS.  Jakub Czyz Matthew Luckie Mark Allman and Michael Bailey. 2016. Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. In NDSS.","DOI":"10.14722\/ndss.2016.23047"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"L. Daigle. 2004. WHOIS Protocol Specification. RFC 3912.  L. Daigle. 2004. WHOIS Protocol Specification. RFC 3912.","DOI":"10.17487\/rfc3912"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Z. Duan X. Yuan and J. Chandrashekar. 2006. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In INFOCOM.  Z. Duan X. Yuan and J. Chandrashekar. 2006. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In INFOCOM.","DOI":"10.1109\/INFOCOM.2006.128"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Zakir Durumeric James Kasten David Adrian J. Alex Halderman Michael Bailey Frank Li Nicholas Weaver Johanna Amann Jethro Beekman Mathias Payer and Vern Paxson. 2014. The Matter of Heartbleed. In IMC.  Zakir Durumeric James Kasten David Adrian J. Alex Halderman Michael Bailey Frank Li Nicholas Weaver Johanna Amann Jethro Beekman Mathias Payer and Vern Paxson. 2014. The Matter of Heartbleed. In IMC.","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"W. Eddy. 2007. TCP SYN Flooding Attacks and Common Mitigations. RFC 4987.  W. Eddy. 2007. TCP SYN Flooding Attacks and Common Mitigations. RFC 4987.","DOI":"10.17487\/rfc4987"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"K. Egevang and P. Francis. 1994. The IP Network Address Translator (NAT). RFC 1631.  K. Egevang and P. Francis. 1994. The IP Network Address Translator (NAT). RFC 1631.","DOI":"10.17487\/rfc1631"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"P. Ferguson and D. Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827.  P. Ferguson and D. Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827.","DOI":"10.17487\/rfc2827"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Marcella Hastings Joshua Fried and Nadia Heninger. 2016. Weak keys remain widespread in network devices. In IMC. 49--63.  Marcella Hastings Joshua Fried and Nadia Heninger. 2016. Weak keys remain widespread in network devices. In IMC. 49--63.","DOI":"10.1145\/2987443.2987486"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2787394.2787399"},{"key":"e_1_3_2_1_21_1","unstructured":"Internet Society. 2019. Mutually Agreed Norms for Routing Security (MANRS). https:\/\/www.manrs.org\/.  Internet Society. 2019. Mutually Agreed Norms for Routing Security (MANRS). https:\/\/www.manrs.org\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1091721"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Mattijs Jonker Alistair King Johannes Krupp Christian Rossow Anna Sperotto and Alberto Dainotti. 2017. Millions of Targets Under Attack: a Macroscopic Characterization of the DoS Ecosystem. In IMC.  Mattijs Jonker Alistair King Johannes Krupp Christian Rossow Anna Sperotto and Alberto Dainotti. 2017. Millions of Targets Under Attack: a Macroscopic Characterization of the DoS Ecosystem. In IMC.","DOI":"10.1145\/3131365.3131383"},{"key":"e_1_3_2_1_24_1","volume-title":"Workshop of Internet Economics 2019 Final Report. https:\/\/www.caida.org\/outreach\/workshops\/wie\/.","author":"Claffy K.","unstructured":"K. Claffy and D. Clark . 2019 . Workshop of Internet Economics 2019 Final Report. https:\/\/www.caida.org\/outreach\/workshops\/wie\/. K. Claffy and D. Clark. 2019. Workshop of Internet Economics 2019 Final Report. https:\/\/www.caida.org\/outreach\/workshops\/wie\/."},{"key":"e_1_3_2_1_25_1","unstructured":"Sam Kottler. 2018. GitHub Engineering DDoS Incident Report. https:\/\/githubengineering.com\/ddos-incident-report\/.  Sam Kottler. 2018. GitHub Engineering DDoS Incident Report. https:\/\/githubengineering.com\/ddos-incident-report\/."},{"key":"e_1_3_2_1_26_1","unstructured":"Brian Krebs. 2016. The Democratization of Censorship. https:\/\/krebsonsecurity.com\/2016\/09\/the-democratization-of-censorship\/.  Brian Krebs. 2016. The Democratization of Censorship. https:\/\/krebsonsecurity.com\/2016\/09\/the-democratization-of-censorship\/."},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security Symposium. 1033--1050","author":"Li Frank","year":"2016","unstructured":"Frank Li , Zakir Durumeric , Jakub Czyz , Mohammad Karami , Michael Bailey , Damon McCoy , Stefan Savage , and Vern Paxson . 2016 a. You've Got Vulnerability: Exploring Effective Vulnerability Notifications . In USENIX Security Symposium. 1033--1050 . Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael Bailey, Damon McCoy, Stefan Savage, and Vern Paxson. 2016a. You've Got Vulnerability: Exploring Effective Vulnerability Notifications. In USENIX Security Symposium. 1033--1050."},{"key":"e_1_3_2_1_28_1","unstructured":"Frank Li Grant Ho Eric Kuan Yuan Niu Lucas Ballard Kurt Thomas Elie Bursztein and Vern Paxson. 2016b. Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. In WWW. 1009--1019.  Frank Li Grant Ho Eric Kuan Yuan Niu Lucas Ballard Kurt Thomas Elie Bursztein and Vern Paxson. 2016b. Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. In WWW. 1009--1019."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Franziska Lichtblau Florian Streibelt Thorben Kr\u00fcger Philipp Richter and Anja Feldmann. 2017. Detection Classification and Analysis of Inter-domain Traffic with Spoofed Source IP Addresses. In IMC.  Franziska Lichtblau Florian Streibelt Thorben Kr\u00fcger Philipp Richter and Anja Feldmann. 2017. Detection Classification and Analysis of Inter-domain Traffic with Spoofed Source IP Addresses. In IMC.","DOI":"10.1145\/3131365.3131367"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296437"},{"key":"e_1_3_2_1_31_1","volume-title":"Passport: Secure and Adoptable Source Authentication. In NSDI. USENIX.","author":"Liu Xin","year":"2008","unstructured":"Xin Liu , Ang Li , Xiaowei Yang , and David Wetherall . 2008 . Passport: Secure and Adoptable Source Authentication. In NSDI. USENIX. Xin Liu, Ang Li, Xiaowei Yang, and David Wetherall. 2008. Passport: Secure and Adoptable Source Authentication. In NSDI. USENIX."},{"key":"e_1_3_2_1_32_1","volume-title":"Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer. In Network Traffic Measurement and Analysis Conference (TMA). 1--8.","author":"Lone Qasim","year":"2018","unstructured":"Qasim Lone , Matthew Luckie , Maciej Korczy'nski , Hadi Asghari , Mobin Javed , and Michel van Eeten . 2018 . Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer. In Network Traffic Measurement and Analysis Conference (TMA). 1--8. Qasim Lone, Matthew Luckie, Maciej Korczy'nski, Hadi Asghari, Mobin Javed, and Michel van Eeten. 2018. Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer. In Network Traffic Measurement and Analysis Conference (TMA). 1--8."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_17"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Matthew Luckie Bradley Huffaker Amogh Dhamdhere Vasilieos Giotsas and kclaffy. 2013. AS Relationships Customer Cones and Validation. In IMC. 243--256.  Matthew Luckie Bradley Huffaker Amogh Dhamdhere Vasilieos Giotsas and kclaffy. 2013. AS Relationships Customer Cones and Validation. In IMC. 243--256.","DOI":"10.1145\/2504730.2504735"},{"key":"e_1_3_2_1_35_1","unstructured":"Sean Lyngaas. 2019. Someone is spoofing big bank IP addresses -- possibly to embarrass security vendors. https:\/\/www.cyberscoop.com\/spoofed-bank-ip-address-greynoise-andrew-morris-bank-of-america\/.  Sean Lyngaas. 2019. Someone is spoofing big bank IP addresses -- possibly to embarrass security vendors. https:\/\/www.cyberscoop.com\/spoofed-bank-ip-address-greynoise-andrew-morris-bank-of-america\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Kieren McCarthy. 2018. It's begun: 'First' IPv6 denial-of-service attack puts IT bods on notice. https:\/\/www.theregister.co.uk\/2018\/03\/03\/ipv6_ddos\/.  Kieren McCarthy. 2018. It's begun: 'First' IPv6 denial-of-service attack puts IT bods on notice. https:\/\/www.theregister.co.uk\/2018\/03\/03\/ipv6_ddos\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Doug Montgomery and Kotikalapudi Sriram. 2017. Evaluation and Deployment of Advanced DDoS Mitigation Techniques. https:\/\/www.nist.gov\/sites\/default\/files\/documents\/2017\/09\/22\/ddosd-nist-2016-08-v3.pdf.  Doug Montgomery and Kotikalapudi Sriram. 2017. Evaluation and Deployment of Advanced DDoS Mitigation Techniques. https:\/\/www.nist.gov\/sites\/default\/files\/documents\/2017\/09\/22\/ddosd-nist-2016-08-v3.pdf."},{"key":"e_1_3_2_1_38_1","unstructured":"Christopher Morrow. 2006. BLS FastAccess internal tech needed. http:\/\/www.merit.edu\/mail.archives\/nanog\/2006-01\/msg00220.html.  Christopher Morrow. 2006. BLS FastAccess internal tech needed. http:\/\/www.merit.edu\/mail.archives\/nanog\/2006-01\/msg00220.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"T. Mrugalski M. Siodelski B. Volz A. Yourtchenko M. Richardson S. Jiang T. Lemon and T. Winters. 2018. Dynamic Host Configuration Protocol for IPv6 (DHCPv6). RFC 8415.  T. Mrugalski M. Siodelski B. Volz A. Yourtchenko M. Richardson S. Jiang T. Lemon and T. Winters. 2018. Dynamic Host Configuration Protocol for IPv6 (DHCPv6). RFC 8415.","DOI":"10.17487\/RFC8415"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"T. Narten R. Draves and S. Krishnan. 2007. Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 4941.  T. Narten R. Draves and S. Krishnan. 2007. Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 4941.","DOI":"10.17487\/rfc4941"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"T. Narten G. Huston and L. Roberts. 2011. IPv6 Address Assignment to End Sites. RFC 6177.  T. Narten G. Huston and L. Roberts. 2011. IPv6 Address Assignment to End Sites. RFC 6177.","DOI":"10.17487\/rfc6177"},{"key":"e_1_3_2_1_42_1","unstructured":"National Institutes of Standards and Technology. 1990. NIST Special Publication 800-series General Information. https:\/\/www.nist.gov\/itl\/nist-special-publication-800-series-general-information.  National Institutes of Standards and Technology. 1990. NIST Special Publication 800-series General Information. https:\/\/www.nist.gov\/itl\/nist-special-publication-800-series-general-information."},{"key":"e_1_3_2_1_43_1","unstructured":"National Science Foundation. 2016. Campus Cyberinfrastructure (CC*) NSF 16--567. https:\/\/www.nsf.gov\/pubs\/2016\/nsf16567\/nsf16567.htm.  National Science Foundation. 2016. Campus Cyberinfrastructure (CC*) NSF 16--567. https:\/\/www.nsf.gov\/pubs\/2016\/nsf16567\/nsf16567.htm."},{"key":"e_1_3_2_1_44_1","unstructured":"NIC.br. 2018. Program for a Safer Internet. https:\/\/bcp.nic.br\/i  NIC.br. 2018. Program for a Safer Internet. https:\/\/bcp.nic.br\/i"},{"key":"e_1_3_2_1_45_1","unstructured":"seg\/.  seg\/."},{"key":"e_1_3_2_1_46_1","volume-title":"Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique","author":"Qian Zhiyun","unstructured":"Zhiyun Qian , Z. Morley Mao , Yinglian Xie , and Fang Yu. 2010. Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique . In IEEE Security and Privacy . Zhiyun Qian, Z. Morley Mao, Yinglian Xie, and Fang Yu. 2010. Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. In IEEE Security and Privacy."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Stefan Savage David Wetherall Anna Karlin and Tom Anderson. 2000. Practical Network Support for IP Traceback. In SIGCOMM. 295--306.  Stefan Savage David Wetherall Anna Karlin and Tom Anderson. 2000. Practical Network Support for IP Traceback. In SIGCOMM. 295--306.","DOI":"10.1145\/347057.347560"},{"key":"e_1_3_2_1_48_1","unstructured":"Tony Scott. 2015. M-15--13: Policy to Require Secure Connections across Federal Websites and Web Services. https:\/\/https.cio.gov\/.  Tony Scott. 2015. M-15--13: Policy to Require Secure Connections across Federal Websites and Web Services. https:\/\/https.cio.gov\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Alex C. Snoeren Craig Partridge Luis A. Sanchez Christine E. Jones Fabrice Tchakountio Stephen T. Kent and W. Timothy Strayer. 2001. Hash-based IP Traceback. In SIGCOMM. 3--14.  Alex C. Snoeren Craig Partridge Luis A. Sanchez Christine E. Jones Fabrice Tchakountio Stephen T. Kent and W. Timothy Strayer. 2001. Hash-based IP Traceback. In SIGCOMM. 3--14.","DOI":"10.1145\/964723.383060"},{"key":"e_1_3_2_1_50_1","volume-title":"Secure Interdomain Traffic Exchange - BGP Robustness and DDoS Mitigation","author":"Sriram Kotikalapudi","unstructured":"Kotikalapudi Sriram and Doug Montgomery . 2018. Secure Interdomain Traffic Exchange - BGP Robustness and DDoS Mitigation . ( National Institute of Standards and Technology , Gaithersburg, MD ), NIST Special Publication (SP) 800--189. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800--189\/draft. Kotikalapudi Sriram and Doug Montgomery. 2018. Secure Interdomain Traffic Exchange - BGP Robustness and DDoS Mitigation. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800--189. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800--189\/draft."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"K. Sriram D. Montgomery and J. Haas. 2019. Enhanced Feasible-Path Unicast Reverse Path Filtering. https:\/\/tools.ietf.org\/html\/draft-ietf-opsec-urpf-improvements-03.  K. Sriram D. Montgomery and J. Haas. 2019. Enhanced Feasible-Path Unicast Reverse Path Filtering. https:\/\/tools.ietf.org\/html\/draft-ietf-opsec-urpf-improvements-03.","DOI":"10.17487\/RFC8704"},{"key":"e_1_3_2_1_52_1","volume-title":"USENIX Security Symposium. 1015--1032","author":"Stock Ben","year":"2016","unstructured":"Ben Stock , Giancarlo Pellegrino , Christian Rossow , Martin Johns , and Michael Backes . 2016 . Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification . In USENIX Security Symposium. 1015--1032 . Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, and Michael Backes. 2016. Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification. In USENIX Security Symposium. 1015--1032."},{"key":"e_1_3_2_1_53_1","unstructured":"US-CERT. 2008. Multiple DNS implementations vulnerable to cache poisoning VU#800113.  US-CERT. 2008. Multiple DNS implementations vulnerable to cache poisoning VU#800113."},{"key":"e_1_3_2_1_54_1","volume-title":"Order Re: Motion to Dismiss: Federal Trade Commission v. D-link Systems. https:\/\/consumerist.com\/consumermediallc.files.wordpress.com\/2017\/09\/dlinkdismissal.pdf.","author":"U.S. District Court of Northern District of California.","year":"2017","unstructured":"U.S. District Court of Northern District of California. 2017 . Order Re: Motion to Dismiss: Federal Trade Commission v. D-link Systems. https:\/\/consumerist.com\/consumermediallc.files.wordpress.com\/2017\/09\/dlinkdismissal.pdf. U.S. District Court of Northern District of California. 2017. Order Re: Motion to Dismiss: Federal Trade Commission v. D-link Systems. https:\/\/consumerist.com\/consumermediallc.files.wordpress.com\/2017\/09\/dlinkdismissal.pdf."},{"key":"e_1_3_2_1_55_1","volume-title":"Final Report: U.S. Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs). https:\/\/transition.fcc.gov\/bureaus\/pshs\/advisory\/csric3\/CSRIC-III-WG7-Final-Report.pdf.","author":"U.S. Federal Communication Commission","year":"2012","unstructured":"U.S. Federal Communication Commission . 2012 . Final Report: U.S. Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs). https:\/\/transition.fcc.gov\/bureaus\/pshs\/advisory\/csric3\/CSRIC-III-WG7-Final-Report.pdf. U.S. Federal Communication Commission. 2012. Final Report: U.S. Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs). https:\/\/transition.fcc.gov\/bureaus\/pshs\/advisory\/csric3\/CSRIC-III-WG7-Final-Report.pdf."},{"key":"e_1_3_2_1_56_1","volume-title":"Open Internet: Report and Order on Remand, Declaratory Ruling, and Order. 30 FCC Rcd 5601 (7;) 80 FR 19737.","author":"U.S. Federal Communication Commission","year":"2015","unstructured":"U.S. Federal Communication Commission . 2015 . In the Matter of Protecting and Promoting the Open Internet: Report and Order on Remand, Declaratory Ruling, and Order. 30 FCC Rcd 5601 (7;) 80 FR 19737. U.S. Federal Communication Commission. 2015. In the Matter of Protecting and Promoting the Open Internet: Report and Order on Remand, Declaratory Ruling, and Order. 30 FCC Rcd 5601 (7;) 80 FR 19737."},{"key":"e_1_3_2_1_57_1","unstructured":"U.S. Federal Communication Commission. 2018. Restoring Internet Freedom. 33 FCC Rcd 311 (1).  U.S. Federal Communication Commission. 2018. Restoring Internet Freedom. 33 FCC Rcd 311 (1)."},{"key":"e_1_3_2_1_58_1","unstructured":"U.S. Federal Trade Commission. 2017. FTC Charges D-Link Put Consumers' Privacy at Risk Due to the Inadequate Security of Its Computer Routers and Cameras. https:\/\/www.ftc.gov\/news-events\/press-releases\/2017\/01\/ftc-charges-d-link-put-consumers-privacy-risk-due-inadequate.  U.S. Federal Trade Commission. 2017. FTC Charges D-Link Put Consumers' Privacy at Risk Due to the Inadequate Security of Its Computer Routers and Cameras. https:\/\/www.ftc.gov\/news-events\/press-releases\/2017\/01\/ftc-charges-d-link-put-consumers-privacy-risk-due-inadequate."},{"key":"e_1_3_2_1_59_1","unstructured":"U.S. Government Office of Management and Budget. 2008. Securing the Federal Government's Domain Name System Infrastructure. https:\/\/www.whitehouse.gov\/sites\/whitehouse.gov\/files\/omb\/memoranda\/2008\/m08--23.pdf.  U.S. Government Office of Management and Budget. 2008. Securing the Federal Government's Domain Name System Infrastructure. https:\/\/www.whitehouse.gov\/sites\/whitehouse.gov\/files\/omb\/memoranda\/2008\/m08--23.pdf."},{"key":"e_1_3_2_1_60_1","unstructured":"U.S. Government Office of Management and Budget. 2010. Internet Protocol Version 6 (IPv6) mandated transition. https:\/\/obamawhitehouse.archives.gov\/sites\/default\/files\/omb\/assets\/egov_docs\/transition-to-ipv6.pdf.  U.S. Government Office of Management and Budget. 2010. Internet Protocol Version 6 (IPv6) mandated transition. https:\/\/obamawhitehouse.archives.gov\/sites\/default\/files\/omb\/assets\/egov_docs\/transition-to-ipv6.pdf."},{"key":"e_1_3_2_1_61_1","unstructured":"Nick Weaver. 2006. Can You Spoof IP Packets? https:\/\/slashdot.org\/story\/06\/05\/02\/1729257\/can-you-spoof-ip-packets.  Nick Weaver. 2006. Can You Spoof IP Packets? https:\/\/slashdot.org\/story\/06\/05\/02\/1729257\/can-you-spoof-ip-packets."},{"key":"e_1_3_2_1_62_1","first-page":"10","article-title":"StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense","volume":"24","author":"Yaar A.","year":"2006","unstructured":"A. Yaar , A. Perrig , and D. Song . 2006 . StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense . IEEE JSAC , Vol. 24 , 10 (Oct 2006). A. Yaar, A. Perrig, and D. Song. 2006. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE JSAC, Vol. 24, 10 (Oct 2006).","journal-title":"IEEE JSAC"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354232","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:03Z","timestamp":1750202643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354232"}},"subtitle":["Deployment of Source Address Validation in the Internet"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":62,"alternative-id":["10.1145\/3319535.3354232","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354232","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}