{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:21Z","timestamp":1761402081371,"version":"3.41.0"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T00:00:00Z","timestamp":1591660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1937165,1724853"],"award-info":[{"award-number":["1937165,1724853"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR00112020014"],"award-info":[{"award-number":["HR00112020014"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Meas. Anal. Comput. Syst."],"published-print":{"date-parts":[[2020,6,9]]},"abstract":"<jats:p>Current methods to analyze the Internet's router-level topology with paths collected using traceroute assume that the source address for each router in the path is either an inbound or off-path address on each router. In this work, we show that outbound addresses are common in our Internet-wide traceroute dataset collected by CAIDA's Ark vantage points in January 2020, accounting for 1.7% - 5.8% of the addresses seen at some point before the end of a traceroute. This phenomenon can lead to mistakes in Internet topology analysis, such as inferring router ownership and identifying interdomain links. We hypothesize that the primary contributor to outbound addresses is Layer 3 Virtual Private Networks (L3VPNs), and propose vrfinder, a technique for identifying L3VPN outbound addresses in traceroute collections. We validate vrfinder against ground truth from two large research and education networks, demonstrating high precision (100.0%) and recall (82.1% - 95.3%). We also show the benefit of accounting for L3VPNs in traceroute analysis through extensions to bdrmapIT, increasing the accuracy of its router ownership inferences for L3VPN outbound addresses from 61.5% - 79.4% to 88.9% - 95.5%.<\/jats:p>","DOI":"10.1145\/3392158","type":"journal-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T22:10:12Z","timestamp":1591740612000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["vrfinder"],"prefix":"10.1145","volume":"4","author":[{"given":"Alexander","family":"Marder","sequence":"first","affiliation":[{"name":"CAIDA &amp; University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Matthew","family":"Luckie","sequence":"additional","affiliation":[{"name":"University of Waikato, Hamilton, New Zealand"}]},{"given":"Bradley","family":"Huffaker","sequence":"additional","affiliation":[{"name":"CAIDA &amp; University of California, San Diego, La Jolla, CA, USA"}]},{"given":"KC","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA &amp; University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n.d.]. AFRINIC Extended Allocation and Assignment Reports. ftp:\/\/ftp.afrinic.net\/pub\/stats\/afrinic.  [n.d.]. AFRINIC Extended Allocation and Assignment Reports. ftp:\/\/ftp.afrinic.net\/pub\/stats\/afrinic."},{"key":"e_1_2_1_2_1","unstructured":"[n.d.]. APNIC Extended Allocation and Assignment Reports. ftp:\/\/ftp.apnic.net\/pub\/stats\/apnic.  [n.d.]. APNIC Extended Allocation and Assignment Reports. ftp:\/\/ftp.apnic.net\/pub\/stats\/apnic."},{"key":"e_1_2_1_3_1","unstructured":"[n.d.]. ARIN Extended Allocation and Assignment Reports. ftp.arin.net\/pub\/stats\/arin.  [n.d.]. ARIN Extended Allocation and Assignment Reports. ftp.arin.net\/pub\/stats\/arin."},{"key":"e_1_2_1_4_1","unstructured":"[n.d.]. Border Gateway Protocol (BGP) VPNs. https:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/bordergateway- protocol-bgp-vpns\/index.html.  [n.d.]. Border Gateway Protocol (BGP) VPNs. https:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/bordergateway- protocol-bgp-vpns\/index.html."},{"key":"e_1_2_1_5_1","unstructured":"[n.d.]. The CAIDA UCSD AS to Organization Mapping Dataset. http:\/\/www.caida.org\/data\/as_organizations.xml.  [n.d.]. The CAIDA UCSD AS to Organization Mapping Dataset. http:\/\/www.caida.org\/data\/as_organizations.xml."},{"key":"e_1_2_1_6_1","unstructured":"[n.d.]. Internet Exchange Report. https:\/\/bgp.he.net\/report\/exchanges.  [n.d.]. Internet Exchange Report. https:\/\/bgp.he.net\/report\/exchanges."},{"key":"e_1_2_1_7_1","unstructured":"[n.d.]. LACNIC Extended Allocation and Assignment Reports. ftp.lacnic.net\/pub\/stats\/lacnic.  [n.d.]. LACNIC Extended Allocation and Assignment Reports. ftp.lacnic.net\/pub\/stats\/lacnic."},{"key":"e_1_2_1_8_1","unstructured":"[n.d.]. PCH: Packet Clearing House. https:\/\/www.pch.net\/resources\/Routing_Data\/.  [n.d.]. PCH: Packet Clearing House. https:\/\/www.pch.net\/resources\/Routing_Data\/."},{"key":"e_1_2_1_9_1","unstructured":"[n.d.]. PeeringDB. https:\/\/peeringdb.com\/.  [n.d.]. PeeringDB. https:\/\/peeringdb.com\/."},{"key":"e_1_2_1_10_1","unstructured":"[n.d.]. RIPE Extended Allocation and Assignment Reports. ftp:\/\/ftp.ripe.net\/pub\/stats\/ripencc.  [n.d.]. RIPE Extended Allocation and Assignment Reports. ftp:\/\/ftp.ripe.net\/pub\/stats\/ripencc."},{"key":"e_1_2_1_11_1","unstructured":"[n.d.]. Routing Information Service (RIS). https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-informationservice- ris.  [n.d.]. Routing Information Service (RIS). https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-informationservice- ris."},{"key":"e_1_2_1_12_1","unstructured":"[n.d.]. University of Oregon Route Views Project. http:\/\/www.routeviews.org\/routeviews\/.  [n.d.]. University of Oregon Route Views Project. http:\/\/www.routeviews.org\/routeviews\/."},{"key":"e_1_2_1_13_1","unstructured":"2018. Understanding Traceroute Behavior in L3VPN Setup on Junos OS. https:\/\/kb.juniper.net\/InfoCenter\/index? page=content&id=KB33434&cat=MX_SERIES&actp=LIST&showDraft=false.  2018. Understanding Traceroute Behavior in L3VPN Setup on Junos OS. https:\/\/kb.juniper.net\/InfoCenter\/index? page=content&id=KB33434&cat=MX_SERIES&actp=LIST&showDraft=false."},{"key":"e_1_2_1_14_1","unstructured":"2019. Types of VPNs. https:\/\/www.juniper.net\/documentation\/en_US\/junos\/topics\/topic-map\/l3-vpns-overview.html.  2019. Types of VPNs. https:\/\/www.juniper.net\/documentation\/en_US\/junos\/topics\/topic-map\/l3-vpns-overview.html."},{"key":"e_1_2_1_15_1","unstructured":"2019. Understanding Carrier-of-Carriers VPNs. https:\/\/www.juniper.net\/documentation\/en_US\/junos\/topics\/concept\/ vpn-carrier-of-carriers-vpns.html.  2019. Understanding Carrier-of-Carriers VPNs. https:\/\/www.juniper.net\/documentation\/en_US\/junos\/topics\/concept\/ vpn-carrier-of-carriers-vpns.html."},{"key":"e_1_2_1_16_1","unstructured":"2020. The CAIDA UCSD IXPs Dataset. https:\/\/www.caida.org\/data\/ixps.  2020. The CAIDA UCSD IXPs Dataset. https:\/\/www.caida.org\/data\/ixps."},{"key":"e_1_2_1_17_1","unstructured":"2020. Macroscopic Internet Topology Data Kit (ITDK). http:\/\/www.caida.org\/data\/internet-topology-data-kit\/.  2020. Macroscopic Internet Topology Data Kit (ITDK). http:\/\/www.caida.org\/data\/internet-topology-data-kit\/."},{"key":"e_1_2_1_18_1","volume-title":"Error and Attack Tolerance of Complex Networks. Nature 406 (June","author":"Albert R\u00e9ka","year":"2000","unstructured":"R\u00e9ka Albert , Hawoong Jeong , and Albert-L\u00e1szl\u00f3 Barab\u00e1si . 2000. Error and Attack Tolerance of Complex Networks. Nature 406 (June 2000 ). R\u00e9ka Albert, Hawoong Jeong, and Albert-L\u00e1szl\u00f3 Barab\u00e1si. 2000. Error and Attack Tolerance of Complex Networks. Nature 406 (June 2000)."},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Lisa D Amini Anees Shaikh and Henning G Schulzrinne. 2002. Issues with Inferring Internet Topological Attributes. In Internet Performance and Control of Network Systems III.  Lisa D Amini Anees Shaikh and Henning G Schulzrinne. 2002. Issues with Inferring Internet Topological Attributes. In Internet Performance and Control of Network Systems III.","DOI":"10.1117\/12.473379"},{"key":"e_1_2_1_20_1","volume-title":"Avoiding Traceroute Anomalies with Paris Traceroute. In IMC 2006 -- 6th ACM Internet Measurement Conference.","author":"Augustin Brice","year":"2006","unstructured":"Brice Augustin , Xavier Cuvellier , Benjamin Orgogozo , Fabien Viger , Timur Friedman , Matthieu Latapy , Cl\u00e9mence Magnien , and Renata Teixeira . 2006 . Avoiding Traceroute Anomalies with Paris Traceroute. In IMC 2006 -- 6th ACM Internet Measurement Conference. Brice Augustin, Xavier Cuvellier, Benjamin Orgogozo, Fabien Viger, Timur Friedman, Matthieu Latapy, Cl\u00e9mence Magnien, and Renata Teixeira. 2006. Avoiding Traceroute Anomalies with Paris Traceroute. In IMC 2006 -- 6th ACM Internet Measurement Conference."},{"volume-title":"IMC.","author":"Augustin Brice","key":"e_1_2_1_21_1","unstructured":"Brice Augustin , Timur Friedman , and Renata Teixeira . 2007. Measuring load-balanced paths in the Internet . In IMC. San Diego, CA, USA , 149--160. Brice Augustin, Timur Friedman, and Renata Teixeira. 2007. Measuring load-balanced paths in the Internet. In IMC. San Diego, CA, USA, 149--160."},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"F. Baker and P. Savola. 2004. Ingress Filtering for Multihomed Networks. RFC 3704.  F. Baker and P. Savola. 2004. Ingress Filtering for Multihomed Networks. RFC 3704.","DOI":"10.17487\/rfc3704"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452560"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Amogh Dhamdhere David D. Clark Alexander Gamero-Garrido Matthew Luckie Ricky K. P. Mok Gautam Akiwate Kabir Gogia Vaibhav Bajpai Alex C. Snoeren and Kc Claffy. 2018. Inferring Persistent Interdomain Congestion. In SIGCOMM.  Amogh Dhamdhere David D. Clark Alexander Gamero-Garrido Matthew Luckie Ricky K. P. Mok Gautam Akiwate Kabir Gogia Vaibhav Bajpai Alex C. Snoeren and Kc Claffy. 2018. Inferring Persistent Interdomain Congestion. In SIGCOMM.","DOI":"10.1145\/3230543.3230549"},{"key":"e_1_2_1_26_1","volume-title":"Revealing MPLS Tunnels Obscured from Traceroute. ACM SIGCOMM Computer Communication Review","author":"Donnet Benoit","year":"2012","unstructured":"Benoit Donnet , Matthew Luckie , Pascal M\u00e9rindol , and Jean-Jacques Pansiot . 2012. Revealing MPLS Tunnels Obscured from Traceroute. ACM SIGCOMM Computer Communication Review ( 2012 ). Benoit Donnet, Matthew Luckie, Pascal M\u00e9rindol, and Jean-Jacques Pansiot. 2012. Revealing MPLS Tunnels Obscured from Traceroute. ACM SIGCOMM Computer Communication Review (2012)."},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"P. Ferguson and D. Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827.  P. Ferguson and D. Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC 2827.","DOI":"10.17487\/rfc2827"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Brian J Goodchild Yi-Ching Chiu Rob Hansen Haonan Lu Matt Calder Matthew Luckie Wyatt Lloyd David Choffnes and Ethan Katz-Bassett. 2017. The Record Route Option is an Option!. In IMC.  Brian J Goodchild Yi-Ching Chiu Rob Hansen Haonan Lu Matt Calder Matthew Luckie Wyatt Lloyd David Choffnes and Ethan Katz-Bassett. 2017. The Record Route Option is an Option!. In IMC.","DOI":"10.1145\/3131365.3131392"},{"key":"e_1_2_1_29_1","volume-title":"Heuristics for Internet Map Discovery. In INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. Proc. ACM Meas. Anal. Comput. Syst.","volume":"4","author":"Govindan Ramesh","year":"2000","unstructured":"Ramesh Govindan and Hongsuda Tangmunarunkit . 2000 . Heuristics for Internet Map Discovery. In INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. Proc. ACM Meas. Anal. Comput. Syst. , Vol. 4 , No. 2, Article 40. Publication date : June 2020. vrfinder: Finding Outbound Addresses in Traceroute 40:23 Ramesh Govindan and Hongsuda Tangmunarunkit. 2000. Heuristics for Internet Map Discovery. In INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. Proc. ACM Meas. Anal. Comput. Syst., Vol. 4, No. 2, Article 40. Publication date: June 2020. vrfinder: Finding Outbound Addresses in Traceroute 40:23"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254770"},{"key":"e_1_2_1_31_1","volume-title":"Deering","author":"Hinden Robert M.","year":"2006","unstructured":"Robert M. Hinden and Stephen E . Deering . 2006 . RFC 4291: IP Version 6 Addressing Architecture. Technical Report. IETF. Robert M. Hinden and Stephen E. Deering. 2006. RFC 4291: IP Version 6 Addressing Architecture. Technical Report. IETF."},{"key":"e_1_2_1_32_1","volume-title":"Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers. In International Conference on Passive and Active Network Measurement. Springer, 101--110","author":"Huffaker Bradley","year":"2010","unstructured":"Bradley Huffaker , Amogh Dhamdhere , Marina Fomenkov , 2010 . Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers. In International Conference on Passive and Active Network Measurement. Springer, 101--110 . Bradley Huffaker, Amogh Dhamdhere, Marina Fomenkov, et al. 2010. Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers. In International Conference on Passive and Active Network Measurement. Springer, 101--110."},{"key":"e_1_2_1_33_1","volume-title":"claffy","author":"Hyun Y.","year":"2003","unstructured":"Y. Hyun , A. Broido , and k. claffy . 2003 . On Third-party Addresses in Traceroute Paths. In PAM. Y. Hyun, A. Broido, and k. claffy. 2003. On Third-party Addresses in Traceroute Paths. In PAM."},{"volume-title":"The Crossfire Attack. In 2013 IEEE Symposium on Security and Privacy.","author":"Kang M. S.","key":"e_1_2_1_34_1","unstructured":"M. S. Kang , S. B. Lee , and V. D. Gligor . 2013 . The Crossfire Attack. In 2013 IEEE Symposium on Security and Privacy. M. S. Kang, S. B. Lee, and V. D. Gligor. 2013. The Crossfire Attack. In 2013 IEEE Symposium on Security and Privacy."},{"key":"e_1_2_1_35_1","first-page":"219","article-title":"Reverse Traceroute","volume":"10","author":"Katz-Bassett Ethan","year":"2010","unstructured":"Ethan Katz-Bassett , Harsha V Madhyastha , Vijay Kumar Adhikari , Colin Scott , Justine Sherry , Peter Van Wesep , Thomas E Anderson , and Arvind Krishnamurthy . 2010 . Reverse Traceroute . In NSDI , Vol. 10. 219 -- 234 . Ethan Katz-Bassett, Harsha V Madhyastha, Vijay Kumar Adhikari, Colin Scott, Justine Sherry, Peter Van Wesep, Thomas E Anderson, and Arvind Krishnamurthy. 2010. Reverse Traceroute. In NSDI, Vol. 10. 219--234.","journal-title":"NSDI"},{"key":"e_1_2_1_36_1","unstructured":"Ken Keys. [n.d.]. iffinder. https:\/\/www.caida.org\/tools\/measurement\/iffinder\/.  Ken Keys. [n.d.]. iffinder. https:\/\/www.caida.org\/tools\/measurement\/iffinder\/."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2198887"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_17"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098858"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_5"},{"key":"e_1_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Matthew Luckie Amogh Dhamdhere Bradley Huffaker David Clark and kc claffy. 2016. bdrmap: Inference of Borders Between IP Networks. In IMC.  Matthew Luckie Amogh Dhamdhere Bradley Huffaker David Clark and kc claffy. 2016. bdrmap: Inference of Borders Between IP Networks. In IMC.","DOI":"10.1145\/2987443.2987467"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355589"},{"volume-title":"Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC).","author":"Luckie Matthew","key":"e_1_2_1_44_1","unstructured":"Matthew Luckie , Bradley Huffaker , Amogh Dhamdhere , Vasileios Giotsas , and kc claffy. 2013. AS Relationships, Customer Cones, and Validation . In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC). Matthew Luckie, Bradley Huffaker, Amogh Dhamdhere, Vasileios Giotsas, and kc claffy. 2013. AS Relationships, Customer Cones, and Validation. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC)."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36516-4_3"},{"key":"e_1_2_1_47_1","unstructured":"Alexander Marder. 2020. bdrmapIT GitHub Code Respository. https:\/\/github.com\/alexmarder\/bdrmapit.  Alexander Marder. 2020. bdrmapIT GitHub Code Respository. https:\/\/github.com\/alexmarder\/bdrmapit."},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Alexander Marder. 2020. vrfinder GitHub Code Respository. https:\/\/github.com\/alexmarder\/vrfinder.  Alexander Marder. 2020. vrfinder GitHub Code Respository. https:\/\/github.com\/alexmarder\/vrfinder.","DOI":"10.1145\/3393691.3394227"},{"key":"e_1_2_1_49_1","volume-title":"kc claffy, and Jonathan M. Smith","author":"Marder Alexander","year":"2018","unstructured":"Alexander Marder , Matthew Luckie , Amogh Dhamdhere , Bradley Huffaker , kc claffy, and Jonathan M. Smith . 2018 . Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet Scale. In IMC. Alexander Marder, Matthew Luckie, Amogh Dhamdhere, Bradley Huffaker, kc claffy, and Jonathan M. Smith. 2018. Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet Scale. In IMC."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987468"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2011.5985865"},{"key":"e_1_2_1_52_1","unstructured":"Nagendra Kumar Nainar. 2018. MPLS VPN Traceroute. https:\/\/community.cisco.com\/t5\/routing\/mpls-vpn-traceroute\/ m-p\/3768060.  Nagendra Kumar Nainar. 2018. MPLS VPN Traceroute. https:\/\/community.cisco.com\/t5\/routing\/mpls-vpn-traceroute\/ m-p\/3768060."},{"key":"e_1_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Jean-Jacques Pansiot Pascal M\u00e9rindol Benoit Donnet and Olivier Bonaventure. 2010. Extracting Intra-Domain Topology from mrinfo Probing. In PAM. 81--90.  Jean-Jacques Pansiot Pascal M\u00e9rindol Benoit Donnet and Olivier Bonaventure. 2010. Extracting Intra-Domain Topology from mrinfo Probing. In PAM. 81--90.","DOI":"10.1007\/978-3-642-12334-4_9"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/263105.263155"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15986-3_4"},{"key":"e_1_2_1_59_1","volume-title":"Technical Report. IETF. Proc. ACM Meas. Anal. Comput. Syst.","volume":"4","author":"Savola Pekka","year":"2003","unstructured":"Pekka Savola . 2003 . RFC 3627: Use of \/127 Prefix Length Between Routers Considered Harmful . Technical Report. IETF. Proc. ACM Meas. Anal. Comput. Syst. , Vol. 4 , No. 2, Article 40. Publication date: June 2020. 40:24 Marder, et al. Pekka Savola. 2003. RFC 3627: Use of \/127 Prefix Length Between Routers Considered Harmful. Technical Report. IETF. Proc. ACM Meas. Anal. Comput. Syst., Vol. 4, No. 2, Article 40. Publication date: June 2020. 40:24 Marder, et al."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879163"},{"key":"e_1_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Rob Sherwood Adam Bender and Neil Spring. 2008. DisCarte: A Disjunctive Internet Cartographer. In SIGCOMM. 303--314.  Rob Sherwood Adam Bender and Neil Spring. 2008. DisCarte: A Disjunctive Internet Cartographer. In SIGCOMM. 303--314.","DOI":"10.1145\/1402946.1402993"},{"key":"e_1_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Neil Spring Ratul Mahajan and David Wetherall. 2002. Measuring ISP topologies with Rocketfuel. In SIGCOMM. 133--145.  Neil Spring Ratul Mahajan and David Wetherall. 2002. Measuring ISP topologies with Rocketfuel. In SIGCOMM. 133--145.","DOI":"10.1145\/964725.633039"},{"key":"e_1_2_1_64_1","volume-title":"A Practical Guide to (Correctly) Troubleshooting with Traceroute. NANOG","author":"Steenbergen Richard A","year":"2009","unstructured":"Richard A Steenbergen . 2009. A Practical Guide to (Correctly) Troubleshooting with Traceroute. NANOG ( 2009 ). Richard A Steenbergen. 2009. A Practical Guide to (Correctly) Troubleshooting with Traceroute. NANOG (2009)."},{"key":"e_1_2_1_65_1","volume-title":"The Coremelt Attack. In European Symposium on Research in Computer Security.","author":"Studer Ahren","year":"2009","unstructured":"Ahren Studer and Adrian Perrig . 2009 . The Coremelt Attack. In European Symposium on Research in Computer Security. Ahren Studer and Adrian Perrig. 2009. The Coremelt Attack. In European Symposium on Research in Computer Security."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131378"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.07.004"},{"volume-title":"IMC.","author":"Yeganeh Bahador","key":"e_1_2_1_68_1","unstructured":"Bahador Yeganeh , Ramakrishnan Durairajan , Reza Rejaie , and Walter Willinger . 2019. How Cloud Traffic Goes Hiding: A Study of Amazon's Peering Fabric . In IMC. Amsterdam, NL , 202--216. Bahador Yeganeh, Ramakrishnan Durairajan, Reza Rejaie, and Walter Willinger. 2019. How Cloud Traffic Goes Hiding: A Study of Amazon's Peering Fabric. In IMC. Amsterdam, NL, 202--216."},{"key":"e_1_2_1_69_1","volume-title":"Quantifying the Pitfalls of Traceroute in AS Connectivity Inference. In International Conference on Passive and Active Network Measurement.","author":"Zhang Yu","year":"2010","unstructured":"Yu Zhang , Ricardo Oliveira , Hongli Zhang , and Lixia Zhang . 2010 . Quantifying the Pitfalls of Traceroute in AS Connectivity Inference. In International Conference on Passive and Active Network Measurement. Yu Zhang, Ricardo Oliveira, Hongli Zhang, and Lixia Zhang. 2010. Quantifying the Pitfalls of Traceroute in AS Connectivity Inference. In International Conference on Passive and Active Network Measurement."}],"container-title":["Proceedings of the ACM on Measurement and Analysis of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3392158","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3392158","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3392158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:49Z","timestamp":1750199929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3392158"}},"subtitle":["Finding Outbound Addresses in Traceroute"],"short-title":[],"issued":{"date-parts":[[2020,6,9]]},"references-count":63,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6,9]]}},"alternative-id":["10.1145\/3392158"],"URL":"https:\/\/doi.org\/10.1145\/3392158","relation":{},"ISSN":["2476-1249"],"issn-type":[{"type":"electronic","value":"2476-1249"}],"subject":[],"published":{"date-parts":[[2020,6,9]]},"assertion":[{"value":"2020-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}