{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:47:24Z","timestamp":1770223644775,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423618","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"428-442","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Towards A User-Level Understanding of IPv6 Behavior"],"prefix":"10.1145","author":[{"given":"Frank","family":"Li","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology \/ Facebook"}]},{"given":"David","family":"Freeman","sequence":"additional","affiliation":[{"name":"Facebook"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"ACM Internet Measurement Conference (IMC).","author":"Beverly Robert","unstructured":"Robert Beverly, Ramakrishnan Durairajan, David Plonka, and Justin P. Rohrer. 2018. In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_2_2_1","volume-title":"Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In ACM Conference on Computer and Communications Security (CCS).","author":"Cao Qiang","year":"2014","unstructured":"Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Brian Carpenter and Sheng Jiang. 2014. RFC 7136: Significance of IPv6 Interface Identifiers. IETF Request for Comments.","DOI":"10.17487\/rfc7136"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Brian Carpenter and Keith Moore. 2001. RFC 3056: Connection of IPv6 Domains via IPv4 Clouds. IETF Request for Comments.","DOI":"10.17487\/rfc3056"},{"key":"e_1_3_2_2_5_1","unstructured":"Catalin Cimpanu. 2019. Belarus becomes first country to make IPv6 mandatory for ISPs. https:\/\/www.zdnet.com\/article\/belarus-becomes-first-country-to-make-ipv6-mandatory-for-isps\/"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12334-4_15"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504732"},{"key":"e_1_3_2_2_8_1","volume-title":"Hinden","author":"Deering Stephen E.","year":"1998","unstructured":"Stephen E. Deering and Robert M. Hinden. 1998. RFC 2460: Internet Protocol, Version 6 (IPv6) Specification. IETF Request for Comments."},{"key":"e_1_3_2_2_9_1","volume-title":"Routing and Performance. In ACM Internet Measurement Conference (IMC).","author":"Dhamdhere Amogh","year":"2012","unstructured":"Amogh Dhamdhere, Matthew Luckie, Bradley Huffaker, KC Claffy, Ahmed Elmokashfi, and Emile Aben. 2012. Measuring the Deployment of IPv6: Topology, Routing and Performance. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_2_10_1","unstructured":"Facebook. 2020. Community Standards. https:\/\/www.facebook.com\/communitystandards\/"},{"key":"e_1_3_2_2_11_1","unstructured":"Facebook. 2020. Data Policy. https:\/\/www.facebook.com\/about\/privacy\/"},{"key":"e_1_3_2_2_12_1","unstructured":"Facebook. 2020. Facebook Q2 2020 Earnings. https:\/\/investor.fb.com\/investor-events\/event-details\/2020\/Facebook-Q2-2020-Earnings-\/default.aspx"},{"key":"e_1_3_2_2_13_1","unstructured":"Facebook. 2020. IPv6. https:\/\/www.facebook.com\/ipv6\/"},{"key":"e_1_3_2_2_14_1","unstructured":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. 1978. The Belmont report: Ethical principles and guidelines for the protection of human subjects of research. https:\/\/www.hhs.gov\/ohrp\/regulations-and-policy\/belmont-report\/"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987445"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278553"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Fernando Gont and Tim Chown. 2016. RFC 7707: Network Reconnaissance in IPv6 Networks. IETF Request for Comments.","DOI":"10.17487\/RFC7707"},{"key":"e_1_3_2_2_19_1","unstructured":"Google. 2020. IPv6. https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html"},{"key":"e_1_3_2_2_20_1","unstructured":"Lili Hervieu. 2019. MAC Address Randomization: How User Privacy Impacts Wi-Fi And Internet Service Providers. https:\/\/www.cablelabs.com\/macaddress-randomization-how-user-privacy-impacts-wi-fi-and-internetservice-providers"},{"key":"e_1_3_2_2_21_1","volume-title":"Deering","author":"Hinden Robert M.","year":"2006","unstructured":"Robert M. Hinden and Stephen E. Deering. 2006. RFC 4291: IP Version 6 Addressing Architecture. IETF Request for Comments."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Christian Huitema. 2006. RFC 4380: Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs). IETF Request for Comments.","DOI":"10.17487\/rfc4380"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00975-4_2"},{"key":"e_1_3_2_2_24_1","volume-title":"USENIX Security Symposium.","author":"Li Vector Guo","year":"2019","unstructured":"Vector Guo Li, Matthew Dunn, Paul Pearce, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. 2019. Reading the Tea leaves: A Comparative Analysis of Threat Intelligence. In USENIX Security Symposium."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_3"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Tomek Mrugalski Marcin Siodelski Bernie Volz Andrew Yourtchenko Michael C. Richardson Sheng Jiang Ted Lemon and Timothy Winters. 2018. RFC 8415: Dynamic Host Configuration Protocol for IPv6 (DHCPv6). IETF Request for Comments.","DOI":"10.17487\/RFC8415"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131405"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Thomas Narten Richard Draves and Suresh Krishnan. 2007. RFC 4941: Privacy Extensions for Stateless Address Autoconfiguration in IPv6. IETF Request for Comments.","DOI":"10.17487\/rfc4941"},{"key":"e_1_3_2_2_29_1","volume-title":"Reasons Dynamic Addresses Change. In ACM Internet Measurement Conference (IMC).","author":"Padmanabhan Ramakrishna","year":"2016","unstructured":"Ramakrishna Padmanabhan, Amogh Dhamdhere, Emile Aben, KC Claffy, and Neil Spring. 2016. Reasons Dynamic Addresses Change. In ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815678"},{"key":"e_1_3_2_2_31_1","volume-title":"On Networklevel Clusters for Spam Detection. In Network and Distributed System Security Symposium (NDSS).","author":"Qian Zhiyun","year":"2010","unstructured":"Zhiyun Qian, Z. Morley Mao, Yinglian Xie, and Fang Yu. 2010. On Networklevel Clusters for Spam Detection. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_32_1","volume-title":"Amplification Hell: Revisiting Network Protocols for DDoS Abus. In Network and Distributed System Security Symposium (NDSS).","author":"Rossow Christian","year":"2014","unstructured":"Christian Rossow. 2014. Amplification Hell: Revisiting Network Protocols for DDoS Abus. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_33_1","unstructured":"Spamcop. 2020. https:\/\/www.spamcop.net\/"},{"key":"e_1_3_2_2_34_1","unstructured":"Spamhaus. 2020. https:\/\/www.spamhaus.org\/"},{"key":"e_1_3_2_2_35_1","volume-title":"The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID).","author":"Thomas Kurt","year":"2016","unstructured":"Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, and Michael Bailey. 2016. The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID)."},{"key":"e_1_3_2_2_36_1","volume-title":"Exploiting Network Structure for Proactive Spam Mitigation. In USENIX Security Symposium.","author":"Venkataraman Shobha","year":"2007","unstructured":"Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, and Dawn Song. 2007. Exploiting Network Structure for Proactive Spam Mitigation. In USENIX Security Symposium."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282415"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363198"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398787"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423618","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:36:19Z","timestamp":1765841779000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423618"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":39,"alternative-id":["10.1145\/3419394.3423618","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423618","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}