{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:30:33Z","timestamp":1773117033923,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,3]],"date-time":"2019-12-03T00:00:00Z","timestamp":1575331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","award":["310408\/2017-2"],"award-info":[{"award-number":["310408\/2017-2"]}]},{"name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","award":["Finance Code 001"],"award-info":[{"award-number":["Finance Code 001"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1724853, 1937165"],"award-info":[{"award-number":["1724853, 1937165"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,3]]},"DOI":"10.1145\/3359989.3365422","type":"proceedings-article","created":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T14:07:37Z","timestamp":1575554857000},"page":"96-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Challenges in inferring spoofed traffic at IXPs"],"prefix":"10.1145","author":[{"given":"Lucas","family":"M\u00fcller","sequence":"first","affiliation":[{"name":"UFRGS \/ CAIDA"}]},{"given":"Matthew","family":"Luckie","sequence":"additional","affiliation":[{"name":"University of Waikato"}]},{"given":"Bradley","family":"Huffaker","sequence":"additional","affiliation":[{"name":"CAIDA \/ UC San Diego"}]},{"given":"Kc","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA \/ UC San Diego"}]},{"given":"Marinho","family":"Barcellos","sequence":"additional","affiliation":[{"name":"UFRGS and University of Waikato"}]}],"member":"320","published-online":{"date-parts":[[2019,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Bernhard Ager Nikolaos Chatzis Anja Feldmann Nadi Sarrar Steve Uhlig and Walter Willinger. 2012. Anatomy of a Large European IXP. In ACM SIGCOMM. 163--174.  Bernhard Ager Nikolaos Chatzis Anja Feldmann Nadi Sarrar Steve Uhlig and Walter Willinger. 2012. Anatomy of a Large European IXP. In ACM SIGCOMM. 163--174.","DOI":"10.1145\/2377677.2377714"},{"key":"e_1_3_2_1_2_1","unstructured":"AMS-IX. 2019. AMS-IX Partner Program. https:\/\/www.ams-ix.net\/ams\/partners.  AMS-IX. 2019. AMS-IX Partner Program. https:\/\/www.ams-ix.net\/ams\/partners."},{"key":"e_1_3_2_1_3_1","unstructured":"AMS-IX. 2019. AMS-IX Private Interconnect Service. https:\/\/www.ams-ix.net\/ams\/service\/private-interconnect.  AMS-IX. 2019. AMS-IX Private Interconnect Service. https:\/\/www.ams-ix.net\/ams\/service\/private-interconnect."},{"key":"e_1_3_2_1_4_1","unstructured":"AMS-IX. 2019. Amsterdam Internet Exchange (AMS-IX). https:\/\/www.amsix.net\/.  AMS-IX. 2019. Amsterdam Internet Exchange (AMS-IX). https:\/\/www.amsix.net\/."},{"key":"e_1_3_2_1_5_1","unstructured":"AMS-IX and DE-CIX and LINX. 2019. IX-API Simplify your IX services. https:\/\/ix-api.net\/.  AMS-IX and DE-CIX and LINX. 2019. IX-API Simplify your IX services. https:\/\/ix-api.net\/."},{"key":"e_1_3_2_1_6_1","unstructured":"APNIC. 2019. Weekly Routing Table Report. http:\/\/thyme.apnic.net\/current\/data-summary  APNIC. 2019. Weekly Routing Table Report. http:\/\/thyme.apnic.net\/current\/data-summary"},{"key":"e_1_3_2_1_7_1","first-page":"10","article-title":"Encouraging Reproducibility in Scientific Research of the Internet","volume":"8","author":"Bajpai V.","year":"2019","unstructured":"V. Bajpai , O. Bonaventure , k. claffy, and D. Karrenberg . 2019 . Encouraging Reproducibility in Scientific Research of the Internet . Dagstuhl Reports 8 , 10 (Jan 2019), 41--62. V. Bajpai, O. Bonaventure, k. claffy, and D. Karrenberg. 2019. Encouraging Reproducibility in Scientific Research of the Internet. Dagstuhl Reports 8, 10 (Jan 2019), 41--62.","journal-title":"Dagstuhl Reports"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314212.3314217"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"F. Baker and P. Savola. 2004. Ingress Filtering for Multihomed Networks. RFC 3704 (BCP 84).  F. Baker and P. Savola. 2004. Ingress Filtering for Multihomed Networks. RFC 3704 (BCP 84).","DOI":"10.17487\/rfc3704"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"e_1_3_2_1_11_1","volume-title":"Leveraging Internet Background Radiation for Opportunistic Network Analysis. In ACM Internet Measurement Conference (IMC). 423--436","author":"Benson Karyn","year":"2015","unstructured":"Karyn Benson , Alberto Dainotti , kc claffy, Alex C. Snoeren , and Michael Kallitsis . 2015 . Leveraging Internet Background Radiation for Opportunistic Network Analysis. In ACM Internet Measurement Conference (IMC). 423--436 . Karyn Benson, Alberto Dainotti, kc claffy, Alex C. Snoeren, and Michael Kallitsis. 2015. Leveraging Internet Background Radiation for Opportunistic Network Analysis. In ACM Internet Measurement Conference (IMC). 423--436."},{"key":"e_1_3_2_1_12_1","unstructured":"R. Beverly and S. Bauer. 2005. The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet. In USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI).  R. Beverly and S. Bauer. 2005. The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet. In USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI)."},{"key":"e_1_3_2_1_13_1","volume-title":"Understanding the Efficacy of Deployed Internet Source Address Validation Filtering. In ACM Internet Measurement Conference (IMC). 356--369","author":"Beverly Robert","year":"2009","unstructured":"Robert Beverly , Arthur Berger , Young Hyun , and k claffy. 2009 . Understanding the Efficacy of Deployed Internet Source Address Validation Filtering. In ACM Internet Measurement Conference (IMC). 356--369 . Robert Beverly, Arthur Berger, Young Hyun, and k claffy. 2009. Understanding the Efficacy of Deployed Internet Source Address Validation Filtering. In ACM Internet Measurement Conference (IMC). 356--369."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879166"},{"key":"e_1_3_2_1_15_1","unstructured":"CAIDA. 2019. CAIDA Spoofer Project. https:\/\/www.caida.org\/projects\/spoofer\/.  CAIDA. 2019. CAIDA Spoofer Project. https:\/\/www.caida.org\/projects\/spoofer\/."},{"key":"e_1_3_2_1_16_1","unstructured":"CAIDA. 2019. The CAIDA Internet Topology Data Kit. http:\/\/www.caida.org\/data\/internet-topology-data-kit.  CAIDA. 2019. The CAIDA Internet Topology Data Kit. http:\/\/www.caida.org\/data\/internet-topology-data-kit."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675013"},{"key":"e_1_3_2_1_18_1","first-page":"5","article-title":"There is More to IXPs than Meets the Eye","volume":"43","author":"Chatzis Nikolaos","year":"2013","unstructured":"Nikolaos Chatzis , Georgios Smaragdakis , Anja Feldmann , and Walter Willinger . 2013 . There is More to IXPs than Meets the Eye . ACM SIGCOMM Computer Communication Review (CCR) 43 , 5 (Oct. 2013), 19--28. Nikolaos Chatzis, Georgios Smaragdakis, Anja Feldmann, and Walter Willinger. 2013. There is More to IXPs than Meets the Eye. ACM SIGCOMM Computer Communication Review (CCR) 43, 5 (Oct. 2013), 19--28.","journal-title":"ACM SIGCOMM Computer Communication Review (CCR)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"B. Claise. 2004. Cisco Systems NetFlow Services Export Version 9. RFC 3954.  B. Claise. 2004. Cisco Systems NetFlow Services Export Version 9. RFC 3954.","DOI":"10.17487\/rfc3954"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504771"},{"key":"e_1_3_2_1_21_1","unstructured":"Console. 2019. Console - The Cloud Connection Company. https:\/\/www.consoleconnect.com\/.  Console. 2019. Console - The Cloud Connection Company. https:\/\/www.consoleconnect.com\/."},{"key":"e_1_3_2_1_22_1","volume-title":"Bonica, and B. Haberman","author":"Cotton M.","year":"2013","unstructured":"M. Cotton , L. Vegoda , Ed. R. Bonica, and B. Haberman . 2013 . Special-Purpose IP Address Registries. RFC 6890 (BCP 153). Updated by RFC 8190. M. Cotton, L. Vegoda, Ed. R. Bonica, and B. Haberman. 2013. Special-Purpose IP Address Registries. RFC 6890 (BCP 153). Updated by RFC 8190."},{"key":"e_1_3_2_1_23_1","unstructured":"DE-CIX. 2019. DE-CIX Internet Exchange. https:\/\/www.de-cix.net\/en\/.  DE-CIX. 2019. DE-CIX Internet Exchange. https:\/\/www.de-cix.net\/en\/."},{"key":"e_1_3_2_1_24_1","unstructured":"DE-CIX. 2019. DEC-IX MetroVLAN. https:\/\/www.de-cix.net\/en\/de-cix-service-world\/metrovlan.  DE-CIX. 2019. DEC-IX MetroVLAN. https:\/\/www.de-cix.net\/en\/de-cix-service-world\/metrovlan."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Z. Duan X. Yuan and J. Chandrashekar. 2006. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In IEEE INFOCOM. 1--12.  Z. Duan X. Yuan and J. Chandrashekar. 2006. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In IEEE INFOCOM. 1--12.","DOI":"10.1109\/INFOCOM.2006.128"},{"key":"e_1_3_2_1_26_1","unstructured":"Epsilon. 2019. Epsilon Telecommunications Limited - Connectivity made simple. www.epsilontel.com\/.  Epsilon. 2019. Epsilon Telecommunications Limited - Connectivity made simple. www.epsilontel.com\/."},{"key":"e_1_3_2_1_27_1","unstructured":"Euro-IX. 2019. IXP BCOPs (Best Current Operational Practices). https:\/\/www.euro-ix.net\/en\/forixps\/set-ixp\/ixp-bcops\/.  Euro-IX. 2019. IXP BCOPs (Best Current Operational Practices). https:\/\/www.euro-ix.net\/en\/forixps\/set-ixp\/ixp-bcops\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Euro-IX. 2019. IXP BCOPs (Best Current Operational Practices) Technical Recommendations. https:\/\/www.euro-ix.net\/en\/forixps\/set-ixp\/ixp-bcops\/technical-recommendations\/.  Euro-IX. 2019. IXP BCOPs (Best Current Operational Practices) Technical Recommendations. https:\/\/www.euro-ix.net\/en\/forixps\/set-ixp\/ixp-bcops\/technical-recommendations\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"P. Ferguson and D. Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (BCP 38). Updated by RFC 3704.  P. Ferguson and D. Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827 (BCP 38). Updated by RFC 3704.","DOI":"10.17487\/rfc2827"},{"key":"e_1_3_2_1_30_1","unstructured":"David Freedman Brian Foust Barry Greene Ben Maddison Andrei Robachevsky Job Snijders and Sander Steffann. 2019. Mutually Agreed Norms for Routing Security (MANRS) Implementation Guide. https:\/\/www.ripe.net\/publications\/docs\/ripe-706.  David Freedman Brian Foust Barry Greene Ben Maddison Andrei Robachevsky Job Snijders and Sander Steffann. 2019. Mutually Agreed Norms for Routing Security (MANRS) Implementation Guide. https:\/\/www.ripe.net\/publications\/docs\/ripe-706."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/90.974527","article-title":"On Inferring Autonomous System Relationships in the Internet","volume":"9","author":"Gao Lixin","year":"2001","unstructured":"Lixin Gao . 2001 . On Inferring Autonomous System Relationships in the Internet . IEEE\/ACM Transactions on Networking 9 , 6 (Dec. 2001). Lixin Gao. 2001. On Inferring Autonomous System Relationships in the Internet. IEEE\/ACM Transactions on Networking 9, 6 (Dec. 2001).","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"e_1_3_2_1_32_1","unstructured":"B. Huffaker K. Keys R. Koga M. Luckie and kc claffy. 2019. CAIDA inferred AS to organization mapping dataset. https:\/\/www.caida.org\/data\/as-organizations\/.  B. Huffaker K. Keys R. Koga M. Luckie and kc claffy. 2019. CAIDA inferred AS to organization mapping dataset. https:\/\/www.caida.org\/data\/as-organizations\/."},{"key":"e_1_3_2_1_33_1","unstructured":"IANA. 2019. Autonomous System (AS) Numbers. https:\/\/www.iana.org\/assignments\/as-numbers\/as-numbers.xml.  IANA. 2019. Autonomous System (AS) Numbers. https:\/\/www.iana.org\/assignments\/as-numbers\/as-numbers.xml."},{"key":"e_1_3_2_1_34_1","unstructured":"IANA. 2019. IANA IPv4 Address Space Registry. https:\/\/www.iana.org\/assignments\/ipv4-address-space\/ipv4-address-space.xhtml.  IANA. 2019. IANA IPv4 Address Space Registry. https:\/\/www.iana.org\/assignments\/ipv4-address-space\/ipv4-address-space.xhtml."},{"key":"e_1_3_2_1_35_1","unstructured":"IANA. 2019. Internet Protocol Version 6 Address Space. https:\/\/www.iana.org\/assignments\/ipv6-address-space\/ipv6-address-space.xhtml.  IANA. 2019. Internet Protocol Version 6 Address Space. https:\/\/www.iana.org\/assignments\/ipv6-address-space\/ipv6-address-space.xhtml."},{"key":"e_1_3_2_1_36_1","unstructured":"Internet Society. 2019. IXP Participants. https:\/\/www.manrs.org\/participants\/ixp\/.  Internet Society. 2019. IXP Participants. https:\/\/www.manrs.org\/participants\/ixp\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Internet Society. 2019. MANRS IXP Programme. https:\/\/www.manrs.org\/ixps\/.  Internet Society. 2019. MANRS IXP Programme. https:\/\/www.manrs.org\/ixps\/."},{"key":"e_1_3_2_1_38_1","unstructured":"Internet Society. 2019. Mutually Agreed Norms for Routing Security (MANRS). http:\/\/www.manrs.org\/manrs.  Internet Society. 2019. Mutually Agreed Norms for Routing Security (MANRS). http:\/\/www.manrs.org\/manrs."},{"key":"e_1_3_2_1_39_1","unstructured":"IX Reach. 2019. IX Reach Remove Peering Services. https:\/\/www.ixreach.com\/services\/remote-peering\/.  IX Reach. 2019. IX Reach Remove Peering Services. https:\/\/www.ixreach.com\/services\/remote-peering\/."},{"key":"e_1_3_2_1_40_1","unstructured":"IX.br. 2019. IX.br - Internet Exchange Brazil. http:\/\/ix.br.  IX.br. 2019. IX.br - Internet Exchange Brazil. http:\/\/ix.br."},{"key":"e_1_3_2_1_41_1","unstructured":"IX.br Forum 12. 2019. Remote Peering Panel with DEC-IX AMS-IX LINX and IX.br. https:\/\/www.youtube.com\/watch?v=K283b3AKZ94.  IX.br Forum 12. 2019. Remote Peering Panel with DEC-IX AMS-IX LINX and IX.br. https:\/\/www.youtube.com\/watch?v=K283b3AKZ94."},{"key":"e_1_3_2_1_42_1","volume-title":"Practical everyday BGP filtering: Peer Locking (NANOG67). https:\/\/www.youtube.com\/watch?v=CSLpWBrHy10","author":"Snijders Job","unstructured":"Job Snijders . 2016. Practical everyday BGP filtering: Peer Locking (NANOG67). https:\/\/www.youtube.com\/watch?v=CSLpWBrHy10 . Job Snijders. 2016. Practical everyday BGP filtering: Peer Locking (NANOG67). https:\/\/www.youtube.com\/watch?v=CSLpWBrHy10."},{"key":"e_1_3_2_1_43_1","unstructured":"O. Klaba. 2019. 1.3Tbps DDoS mitigated by our VAC. https:\/\/twitter.com\/olesovhcom\/status\/969328679410110466.  O. Klaba. 2019. 1.3Tbps DDoS mitigated by our VAC. https:\/\/twitter.com\/olesovhcom\/status\/969328679410110466."},{"key":"e_1_3_2_1_44_1","volume-title":"February 28th DDoS Incident Report. https:\/\/githubengineering.com\/ddos-incident-report\/","author":"Kottler S.","unstructured":"S. Kottler . 2019. February 28th DDoS Incident Report. https:\/\/githubengineering.com\/ddos-incident-report\/ . S. Kottler. 2019. February 28th DDoS Incident Report. https:\/\/githubengineering.com\/ddos-incident-report\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131367"},{"key":"e_1_3_2_1_46_1","unstructured":"LINX. 2019. ConneXions at London Internet Exchange Point. https:\/\/www.linx.net\/join-linx\/connexions\/.  LINX. 2019. ConneXions at London Internet Exchange Point. https:\/\/www.linx.net\/join-linx\/connexions\/."},{"key":"e_1_3_2_1_47_1","unstructured":"LINX. 2019. LINX Private VLAN. https:\/\/www.linx.net\/products-services\/private-vlan\/.  LINX. 2019. LINX Private VLAN. https:\/\/www.linx.net\/products-services\/private-vlan\/."},{"key":"e_1_3_2_1_48_1","unstructured":"LINX. 2019. London Internet Exchange (LINX). https:\/\/www.linx.net\/.  LINX. 2019. London Internet Exchange (LINX). https:\/\/www.linx.net\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"B. Liu J. Bi and A. V. Vasilakos. 2014. Toward Incentivizing Anti-Spoofing Deployment. IEEE ToIFS (2014) 436--450.  B. Liu J. Bi and A. V. Vasilakos. 2014. Toward Incentivizing Anti-Spoofing Deployment. IEEE ToIFS (2014) 436--450.","DOI":"10.1109\/TIFS.2013.2296437"},{"key":"e_1_3_2_1_50_1","volume-title":"Passport: Secure and Adoptable Source Authentication. In USENIX Symposium on Networked Systems Design and Implementation (NSDI). 365--378","author":"Liu Xin","year":"2008","unstructured":"Xin Liu , Ang Li , Xiaowei Yang , and David Wetherall . 2008 . Passport: Secure and Adoptable Source Authentication. In USENIX Symposium on Networked Systems Design and Implementation (NSDI). 365--378 . Xin Liu, Ang Li, Xiaowei Yang, and David Wetherall. 2008. Passport: Secure and Adoptable Source Authentication. In USENIX Symposium on Networked Systems Design and Implementation (NSDI). 365--378."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Qasim Lone Matthew Luckie Maciej Korczy\u0144ski and Michel van Eeten. 2017. Using Loops Observed in Traceroute to Infer the Ability to Spoof. In Passive and Active Measurement (PAM). 229--241.  Qasim Lone Matthew Luckie Maciej Korczy\u0144ski and Michel van Eeten. 2017. Using Loops Observed in Traceroute to Infer the Ability to Spoof. In Passive and Active Measurement (PAM). 229--241.","DOI":"10.1007\/978-3-319-54328-4_17"},{"key":"e_1_3_2_1_52_1","first-page":"3","article-title":"Spurious Routes in Public BGP Data","volume":"44","author":"Luckie Matthew","year":"2014","unstructured":"Matthew Luckie . 2014 . Spurious Routes in Public BGP Data . ACM SIGCOMM Computer Communication Review (CCR) 44 , 3 (July 2014), 14--21. Matthew Luckie. 2014. Spurious Routes in Public BGP Data. ACM SIGCOMM Computer Communication Review (CCR) 44, 3 (July 2014), 14--21.","journal-title":"ACM SIGCOMM Computer Communication Review (CCR)"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_1_54_1","volume-title":"ACM Internet Measurement Conference (IMC). 243--256","author":"Luckie Matthew","unstructured":"Matthew Luckie , Bradley Huffaker , Amogh Dhamdhere , Vasileios Giotsas , and kc claffy. 2013. AS Relationships, Customer Cones, and Validation . In ACM Internet Measurement Conference (IMC). 243--256 . Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileios Giotsas, and kc claffy. 2013. AS Relationships, Customer Cones, and Validation. In ACM Internet Measurement Conference (IMC). 243--256."},{"key":"e_1_3_2_1_55_1","unstructured":"Lynsey Buckingham. 2019. IX-API For the Good of the Internet. https:\/\/www.linx.net\/ix-api-for-the-good-of-the-internet\/.  Lynsey Buckingham. 2019. IX-API For the Good of the Internet. https:\/\/www.linx.net\/ix-api-for-the-good-of-the-internet\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281419"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278538"},{"key":"e_1_3_2_1_58_1","unstructured":"Megaport. 2019. Megaport - A Better way to connect. https:\/\/www.megaport.com.  Megaport. 2019. Megaport - A Better way to connect. https:\/\/www.megaport.com."},{"key":"e_1_3_2_1_59_1","volume-title":"NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack","author":"Morales C.","unstructured":"C. Morales . 2019. NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack ; The Terabit Attack Era Is Upon Us . https:\/\/www.arbornetworks.com\/blog\/asert\/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us\/. C. Morales. 2019. NETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack; The Terabit Attack Era Is Upon Us. https:\/\/www.arbornetworks.com\/blog\/asert\/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us\/."},{"key":"e_1_3_2_1_61_1","volume-title":"Address Allocation for Private Internets. RFC 1918 (BCP 5).","author":"Moskowitz R.","year":"1996","unstructured":"R. Moskowitz , D. Karrenberg , Y. Rekhter , E. Lear , and G. de Groot . 1996 . Address Allocation for Private Internets. RFC 1918 (BCP 5). R. Moskowitz, D. Karrenberg, Y. Rekhter, E. Lear, and G. de Groot. 1996. Address Allocation for Private Internets. RFC 1918 (BCP 5)."},{"key":"e_1_3_2_1_62_1","volume-title":"kc claffy, and M. Barcellos","author":"Muller L.","year":"2019","unstructured":"L. Muller , M. Luckie , B. Huffaker , kc claffy, and M. Barcellos . 2019 . Spoofer-IX sourcecode. https:\/\/github.com\/spoofer-ix\/spoofer-ix. L. Muller, M. Luckie, B. Huffaker, kc claffy, and M. Barcellos. 2019. Spoofer-IX sourcecode. https:\/\/github.com\/spoofer-ix\/spoofer-ix."},{"key":"e_1_3_2_1_63_1","unstructured":"NIC.br. 2019. Programa por uma Internet mais segura. https:\/\/bcp.nic.br\/i+seg\/.  NIC.br. 2019. Programa por uma Internet mais segura. https:\/\/bcp.nic.br\/i+seg\/."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278556"},{"key":"e_1_3_2_1_65_1","unstructured":"University of Oregon. 2019. Route Views Project. http:\/\/www.routeviews.org\/.  University of Oregon. 2019. Route Views Project. http:\/\/www.routeviews.org\/."},{"key":"e_1_3_2_1_66_1","volume-title":"and N. McKee","author":"Phaal P.","year":"2001","unstructured":"P. Phaal and S. Panchen , and N. McKee . 2001 . InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. RFC 3176. P. Phaal and S. Panchen, and N. McKee. 2001. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. RFC 3176."},{"key":"e_1_3_2_1_67_1","unstructured":"PacketFabric. 2019. PacketFabric. https:\/\/www.packetfabric.com\/.  PacketFabric. 2019. PacketFabric. https:\/\/www.packetfabric.com\/."},{"key":"e_1_3_2_1_68_1","unstructured":"PCH. 2019. Raw Routing Data. https:\/\/www.pch.net\/resources\/Raw_Routing_Data\/.  PCH. 2019. Raw Routing Data. https:\/\/www.pch.net\/resources\/Raw_Routing_Data\/."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987473"},{"key":"e_1_3_2_1_70_1","unstructured":"RIPE. 2019. Routing Information Service (RIS). http:\/\/www.ripe.net\/ris\/.  RIPE. 2019. Routing Information Service (RIS). http:\/\/www.ripe.net\/ris\/."},{"key":"e_1_3_2_1_71_1","unstructured":"T. Scheid. 2016. Defending the Olympics from DDoS. https:\/\/blog.apnic.net\/2016\/10\/17\/defending-olympics-ddos\/.  T. Scheid. 2016. Defending the Olympics from DDoS. https:\/\/blog.apnic.net\/2016\/10\/17\/defending-olympics-ddos\/."},{"key":"e_1_3_2_1_72_1","unstructured":"Team CYMRU. 2019. IPv4 Fullbogons. https:\/\/www.team-cymru.org\/Services\/Bogons\/fullbogons-ipv4.txt.  Team CYMRU. 2019. IPv4 Fullbogons. https:\/\/www.team-cymru.org\/Services\/Bogons\/fullbogons-ipv4.txt."},{"key":"e_1_3_2_1_73_1","unstructured":"Team CYMRU. 2019. The Bogon Reference. http:\/\/www.team-cymru.com\/bogon-reference.html.  Team CYMRU. 2019. The Bogon Reference. http:\/\/www.team-cymru.com\/bogon-reference.html."},{"key":"e_1_3_2_1_74_1","unstructured":"Tech Accord. 2019. Cybersecurity Tech Accord. https:\/\/cybertechaccord.org\/.  Tech Accord. 2019. Cybersecurity Tech Accord. https:\/\/cybertechaccord.org\/."},{"key":"e_1_3_2_1_75_1","unstructured":"The Number Resource Organization. 2019. NRO Extended Allocation and Assignment Reports. https:\/\/www.nro.net\/statistics\/.  The Number Resource Organization. 2019. NRO Extended Allocation and Assignment Reports. https:\/\/www.nro.net\/statistics\/."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"J. Weil V. Kuarsingh C. Donley C. Liljenstolpe and M. Azinger. 2013. IANA-Reserved IPv4 Prefix for Shared Address Space. RFC 6598 (BCP 153).  J. Weil V. Kuarsingh C. Donley C. Liljenstolpe and M. Azinger. 2013. IANA-Reserved IPv4 Prefix for Shared Address Space. RFC 6598 (BCP 153).","DOI":"10.17487\/rfc6598"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"A. Yaar A. Perrig and D. Song. 2006. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE Journal on Selected Areas in Communications (JSAC) (2006) 1853--1863.  A. Yaar A. Perrig and D. Song. 2006. StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE Journal on Selected Areas in Communications (JSAC) (2006) 1853--1863.","DOI":"10.1109\/JSAC.2006.877138"}],"event":{"name":"CoNEXT '19: The 15th International Conference on emerging Networking EXperiments and Technologies","location":"Orlando Florida","acronym":"CoNEXT '19","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359989.3365422","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359989.3365422","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359989.3365422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:27Z","timestamp":1750202007000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359989.3365422"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,3]]},"references-count":76,"alternative-id":["10.1145\/3359989.3365422","10.1145\/3359989"],"URL":"https:\/\/doi.org\/10.1145\/3359989.3365422","relation":{},"subject":[],"published":{"date-parts":[[2019,12,3]]},"assertion":[{"value":"2019-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}