{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:49:25Z","timestamp":1759092565493,"version":"3.41.0"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T00:00:00Z","timestamp":1590105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2020,5,22]]},"abstract":"<jats:p>On 9-11 December 2019, CAIDA hosted the 10th interdisciplinary Workshop on Internet Economics (WIE) at UC San Diego's Supercomputer Center. This workshop series provides a forum for researchers, Internet facilities and service providers, technologists, economists, theorists, policymakers, and other stakeholders to exchange views on current and emerging economic and policy debates. This year's meeting had a narrower focus than in years past, motivated by a new NSF-funded project being launched at CAIDA: KISMET (Knowledge of Internet Structure: Measurement, Epistemology, and Technology). The objective of the KISMET project is to improve the security and resilience of key Internet systems by collecting and curating infrastructure data in a form that facilitates query, integration and analysis. This project is a part of NSF's new Convergence Accelerator program, which seeks to support fundamental scientific exploration by creating partnerships across public and private sectors to solve problems of national importance.<\/jats:p>","DOI":"10.1145\/3402413.3402421","type":"journal-article","created":{"date-parts":[[2020,5,25]],"date-time":"2020-05-25T22:41:33Z","timestamp":1590446493000},"page":"53-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Workshop on Internet Economics (WIE 2019) report"],"prefix":"10.1145","volume":"50","author":[{"given":"kc","family":"claffy","sequence":"first","affiliation":[{"name":"UCSD\/CAIDA"}]},{"given":"David","family":"Clark","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2020,5,23]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"11","author":"Transparency Review Accountability","year":"2019","unstructured":"Accountability and Transparency Review Team 3. Third Accountability and Transparency Review Team (ATRT3) Draft Report , 11 2019 . https:\/\/www.icann.org\/en\/system\/files\/files\/draft-report-atrt3-16dec19-en.pdf. Accountability and Transparency Review Team 3. Third Accountability and Transparency Review Team (ATRT3) Draft Report, 11 2019. https:\/\/www.icann.org\/en\/system\/files\/files\/draft-report-atrt3-16dec19-en.pdf.","journal-title":"Draft Report"},{"key":"e_1_2_1_2_1","volume-title":"Nov.","author":"Azimov A.","year":"2019","unstructured":"A. Azimov , E. Uskov , R. Bush , K. Patel , J. Snijders , and R. Housley . A Profile for Autonomous System Provider Authorization , Nov. 2019 . A. Azimov, E. Uskov, R. Bush, K. Patel, J. Snijders, and R. Housley. A Profile for Autonomous System Provider Authorization, Nov. 2019."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3704"},{"key":"e_1_2_1_4_1","volume-title":"Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services. Technical report","author":"Bates S.","year":"2018","unstructured":"S. Bates , J. Bowers , S. Greenstein , J. Weinstock , and J. Zittrain . Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services. Technical report , Harvard University , 2018 . https:\/\/dash.harvard.edu\/bitstream\/handle\/1\/35979525\/DNS_NBER_Working_Paper.pdf. S. Bates, J. Bowers, S. Greenstein, J. Weinstock, and J. Zittrain. Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services. Technical report, Harvard University, 2018. https:\/\/dash.harvard.edu\/bitstream\/handle\/1\/35979525\/DNS_NBER_Working_Paper.pdf."},{"key":"e_1_2_1_5_1","volume-title":"Mar.","author":"Cute Brian","year":"2019","unstructured":"Brian Cute . Evolving the effectiveness of our multistakeholdermodel , Mar. 2019 . Brian Cute. Evolving the effectiveness of our multistakeholdermodel, Mar. 2019."},{"key":"e_1_2_1_6_1","unstructured":"Center for Applied Internet Data Analysis. CAIDA Internet Data. http:\/\/www.caida.org\/data\/.  Center for Applied Internet Data Analysis. CAIDA Internet Data. http:\/\/www.caida.org\/data\/."},{"key":"e_1_2_1_7_1","unstructured":"Center for Applied Internet Data Analysis (CAIDA). Prefix to AS mappings. http:\/\/www.caida.org\/data\/routing\/routeviews-prefix2as.xml.  Center for Applied Internet Data Analysis (CAIDA). Prefix to AS mappings. http:\/\/www.caida.org\/data\/routing\/routeviews-prefix2as.xml."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355596"},{"key":"e_1_2_1_9_1","volume-title":"http:\/\/bgpmon.net\/","author":"BGPMON.","year":"2018","unstructured":"Cisco. BGPMON. http:\/\/bgpmon.net\/ , 2018 . Cisco. BGPMON. http:\/\/bgpmon.net\/, 2018."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3443341"},{"key":"e_1_2_1_11_1","volume-title":"Final Report","author":"Trust Consumer","year":"2019","unstructured":"Competition, Consumer Trust , and Consumer Choice Review Team . Final Report , 2019 . https:\/\/www.icann.org\/en\/system\/files\/files\/cct-rt-final-08sep18-en.pdf. Competition, Consumer Trust, and Consumer Choice Review Team. Final Report, 2019. https:\/\/www.icann.org\/en\/system\/files\/files\/cct-rt-final-08sep18-en.pdf."},{"key":"e_1_2_1_12_1","unstructured":"Dave Piscitello and Dr. Colin Strutt. Criminal Abuse of Domain Names Bulk Registration and Contact Information Access. http:\/\/www.interisle.net\/sub\/CriminalDomainAbuse.pdf.  Dave Piscitello and Dr. Colin Strutt. Criminal Abuse of Domain Names Bulk Registration and Contact Information Access. http:\/\/www.interisle.net\/sub\/CriminalDomainAbuse.pdf."},{"key":"e_1_2_1_13_1","volume-title":"May","author":"Ferguson P.","year":"2000","unstructured":"P. Ferguson and D. Senie . Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing , May 2000 . IETF BCP 38. P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, May 2000. IETF BCP38."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131380"},{"key":"e_1_2_1_15_1","author":"Gill P.","year":"2011","unstructured":"P. Gill , M. Schapira , and S. Goldberg . Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security. SIGCOMM Comput. Commun. Rev. , Aug. 2011 . P. Gill, M. Schapira, and S. Goldberg. Let the Market Drive Deployment: A Strategy for Transitioning to BGP Security. SIGCOMM Comput. Commun. Rev., Aug. 2011.","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"e_1_2_1_16_1","volume-title":"Internet Measurement Conference (IMC)","author":"Halvorson T.","year":"2015","unstructured":"T. Halvorson , M. F. Der , I. Foster , S. Savage , L. K. Saul , and G. M. Voelker . From.academy to.zone: An Analysis of the New TLD Land Rush . In Internet Measurement Conference (IMC) , 2015 . T. Halvorson, M. F. Der, I. Foster, S. Savage, L. K. Saul, and G. M. Voelker. From.academy to.zone: An Analysis of the New TLD Land Rush. In Internet Measurement Conference (IMC), 2015."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567995"},{"key":"e_1_2_1_18_1","unstructured":"B. Huffaker K. Keys M. Fomenkov and K. Claffy. AS-to-Organization Dataset. http:\/\/www.caida.org\/research\/topology\/as2org.  B. Huffaker K. Keys M. Fomenkov and K. Claffy. AS-to-Organization Dataset. http:\/\/www.caida.org\/research\/topology\/as2org."},{"key":"e_1_2_1_19_1","unstructured":"Ian Foster. dns.coffee. https:\/\/dns.coffee\/.  Ian Foster. dns.coffee. https:\/\/dns.coffee\/."},{"key":"e_1_2_1_20_1","volume-title":"Expedited Policy Development Process on the Temporary Specification for gTLD Registration Data","author":"ICANN.","year":"2018","unstructured":"ICANN. Expedited Policy Development Process on the Temporary Specification for gTLD Registration Data , 2018 . ICANN. Expedited Policy Development Process on the Temporary Specification for gTLD Registration Data, 2018."},{"key":"e_1_2_1_21_1","volume-title":"Oct","author":"ICANN Security and Stability Advisory Committee","year":"2012","unstructured":"ICANN Security and Stability Advisory Committee . SSAC Advisory on Impacts of Content Blocking via the Domain Name System , Oct 2012 . https:\/\/www.icann.org\/en\/system\/files\/files\/sac-056-en.pdf. ICANN Security and Stability Advisory Committee. SSAC Advisory on Impacts of Content Blocking via the Domain Name System, Oct 2012. https:\/\/www.icann.org\/en\/system\/files\/files\/sac-056-en.pdf."},{"key":"e_1_2_1_22_1","first-page":"3","author":"ICANN Technical Study Group","year":"2019","unstructured":"ICANN Technical Study Group , led by Ram Mohan (Afilias). TSG001: Draft Technical Model for Access to Non-Public Registration Data , 3 2019 . https:\/\/www.icann.org\/en\/system\/files\/files\/draft-technical-model-access-non-public-registration-data-06mar19-en.pdf. ICANN Technical Study Group, led by Ram Mohan (Afilias). TSG001: Draft Technical Model for Access to Non-Public Registration Data, 3 2019. https:\/\/www.icann.org\/en\/system\/files\/files\/draft-technical-model-access-non-public-registration-data-06mar19-en.pdf.","journal-title":"Non-Public Registration Data"},{"key":"e_1_2_1_23_1","volume-title":"8th USENIX Workshop on Offensive Technologies (WOOT 14)","author":"K\u00fchrer M.","year":"2014","unstructured":"M. K\u00fchrer , T. Hupperich , C. Rossow , and T. Holz . Hell of a handshake: Abusing TCP for reflective amplification ddos attacks . In 8th USENIX Workshop on Offensive Technologies (WOOT 14) , San Diego, CA , 2014 . USENIX Association. M. K\u00fchrer, T. Hupperich, C. Rossow, and T. Holz. Hell of a handshake: Abusing TCP for reflective amplification ddos attacks. In 8th USENIX Workshop on Offensive Technologies (WOOT 14), San Diego, CA, 2014. USENIX Association."},{"key":"e_1_2_1_24_1","volume-title":"USENIX Security","author":"Li V. G.","year":"2019","unstructured":"V. G. Li , M. Dunn , P. Pearce , D. McCoy , G. M. Voelker , and S. Savage . Reading the tea leaves: A comparative analysis of threat intelligence . In USENIX Security , 2019 . V. G. Li, M. Dunn, P. Pearce, D. McCoy, G. M. Voelker, and S. Savage. Reading the tea leaves: A comparative analysis of threat intelligence. In USENIX Security, 2019."},{"key":"e_1_2_1_25_1","volume-title":"ACM Computer and Communications Security (CCS)","author":"Luckie M.","year":"2019","unstructured":"M. Luckie , R. Beverly , R. Koga , K. Keys , J. Kroll , and k. claffy. Network Hygiene , Incentives, and Regulation : Deployment of Source Address Validation in the Internet . In ACM Computer and Communications Security (CCS) , Nov 2019 . M. Luckie, R. Beverly, R. Koga, K. Keys, J. Kroll, and k. claffy. Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet. In ACM Computer and Communications Security (CCS), Nov 2019."},{"key":"e_1_2_1_26_1","volume-title":"Validation. In ACM SIGCOMM Internet Measurement Conference (IMC)","author":"Luckie M.","year":"2013","unstructured":"M. Luckie , B. Huffaker , A. Dhamdhere , V. Giotsas , and k. claffy. AS Relationships , Customer Cones , and Validation. In ACM SIGCOMM Internet Measurement Conference (IMC) , Oct 2013 . M. Luckie, B. Huffaker, A. Dhamdhere, V. Giotsas, and k. claffy. AS Relationships, Customer Cones, and Validation. In ACM SIGCOMM Internet Measurement Conference (IMC), Oct 2013."},{"key":"e_1_2_1_27_1","volume-title":"Apr.","author":"Lyngaas S.","year":"2019","unstructured":"S. Lyngaas . Someone is spoofing big bank IP addresses -- possibly to embarrass security vendors. Cyberscoop.com , Apr. 2019 . S. Lyngaas. Someone is spoofing big bank IP addresses -- possibly to embarrass security vendors. Cyberscoop.com, Apr. 2019."},{"key":"e_1_2_1_28_1","volume-title":"Version 1.0, 9","author":"Messaging","year":"2019","unstructured":"Messaging , Malware and Mobile Anti-Abuse Working Group. AAWG Tutorial on Third Party Recursive Resolvers and Encrypting DNS Stub Resolver-to-Recursive Resolver Traffic , Version 1.0, 9 2019 . Messaging, Malware and Mobile Anti-Abuse Working Group. AAWG Tutorial on Third Party Recursive Resolvers and Encrypting DNS Stub Resolver-to-Recursive Resolver Traffic, Version 1.0, 9 2019."},{"key":"e_1_2_1_29_1","volume-title":"Convergence Accelerator Program","author":"National Science Foundataion.","year":"2019","unstructured":"National Science Foundataion. Convergence Accelerator Program , 2019 . https:\/\/www.nsf.gov\/od\/oia\/convergence-accelerator\/index.jsp. National Science Foundataion. Convergence Accelerator Program, 2019. https:\/\/www.nsf.gov\/od\/oia\/convergence-accelerator\/index.jsp."},{"key":"e_1_2_1_30_1","volume-title":"Information Technology Research and Development Program. Open Knowledge Network: Summary of the Big Data IWG Workshop","author":"Networking","year":"2017","unstructured":"Networking and Information Technology Research and Development Program. Open Knowledge Network: Summary of the Big Data IWG Workshop , 2017 . https:\/\/www.nitrd.gov\/nitrdgroups\/index.php?title=Open_Knowledge_Network. Networking and Information Technology Research and Development Program. Open Knowledge Network: Summary of the Big Data IWG Workshop, 2017. https:\/\/www.nitrd.gov\/nitrdgroups\/index.php?title=Open_Knowledge_Network."},{"key":"e_1_2_1_31_1","unstructured":"nist.gov. Nist rpki monitor. https:\/\/rpki-monitor.antd.nist.gov\/.  nist.gov. Nist rpki monitor. https:\/\/rpki-monitor.antd.nist.gov\/."},{"key":"e_1_2_1_32_1","volume-title":"ACM Queue","author":"Vixie Paul","year":"2014","unstructured":"Paul Vixie . Rate-limiting State : The edge of the Internet is an unruly place . ACM Queue , 12, February 2014 . Paul Vixie. Rate-limiting State: The edge of the Internet is an unruly place. ACM Queue, 12, February 2014."},{"key":"e_1_2_1_33_1","unstructured":"Security and Stability Review Team. Draft recommendations. https:\/\/66.schedule.icann.org\/meetings\/1116775.  Security and Stability Review Team. Draft recommendations. https:\/\/66.schedule.icann.org\/meetings\/1116775."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7908"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355581"},{"key":"e_1_2_1_36_1","volume-title":"Jan.","author":"Dept U.S.","year":"2019","unstructured":"U.S. Dept . of Homeland Security. Emergency Directive 19-01: Mitigate DNS Infrastructure Tampering , Jan. 2019 . U.S. Dept. of Homeland Security. Emergency Directive 19-01: Mitigate DNS Infrastructure Tampering, Jan. 2019."},{"issue":"7","key":"e_1_2_1_37_1","volume":"34","author":"van Rijswijk-Deij R.","year":"2016","unstructured":"R. van Rijswijk-Deij , M. Jonker , A. Sperotto , and A. Pras . A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE Journal on Selected Areas in Communications , 34 ( 7 ), 2016 . R. van Rijswijk-Deij, M. Jonker, A. Sperotto, and A. Pras. A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE Journal on Selected Areas in Communications, 34(7), 2016.","journal-title":"IEEE Journal on Selected Areas in Communications"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3402413.3402421","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3402413.3402421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:34Z","timestamp":1750200094000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3402413.3402421"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,22]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,5,22]]}},"alternative-id":["10.1145\/3402413.3402421"],"URL":"https:\/\/doi.org\/10.1145\/3402413.3402421","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2020,5,22]]},"assertion":[{"value":"2020-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}