{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T17:15:31Z","timestamp":1776791731551,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423627","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"266-280","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["TopoScope"],"prefix":"10.1145","author":[{"given":"Zitong","family":"Jin","sequence":"first","affiliation":[{"name":"DCST, Tsinghua University"}]},{"given":"Xingang","family":"Shi","sequence":"additional","affiliation":[{"name":"INSC&amp;BNRist, Tsinghua University"}]},{"given":"Yan","family":"Yang","sequence":"additional","affiliation":[{"name":"DCST, Tsinghua University"}]},{"given":"Xia","family":"Yin","sequence":"additional","affiliation":[{"name":"DCST, Tsinghua University"}]},{"given":"Zhiliang","family":"Wang","sequence":"additional","affiliation":[{"name":"INSC&amp;BNRist, Tsinghua University"}]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[{"name":"DCST&amp;INSC, Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-7b98e3ed-001"},{"key":"e_1_3_2_2_2_1","volume-title":"SABRE: Protecting bitcoin against routing attacks. In NDSS.","author":"Apostolaki Maria","year":"2019","unstructured":"Maria Apostolaki, Gian Marti, Jan M\u00fcller, and Laurent Vanbever. 2019. SABRE: Protecting bitcoin against routing attacks. In NDSS."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_3_2_2_4_1","unstructured":"Steven Michael Bellovin and Emden R Gansner. 2003. Using link cuts to attack Internet routing. (2003)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363197"},{"key":"e_1_3_2_2_6_1","unstructured":"CAIDA. [n. d.]. Inferred AS to organization mapping dataset. ([n. d.]). http:\/\/www.caida.org\/data\/as-organizations\/."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.03.001"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425389"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934883"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230549"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208668"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0501426102"},{"key":"e_1_3_2_2_15_1","unstructured":"Peyman Faratin David D Clark Steven Bauer and William Lehr. 2007. Complexity of Internet interconnections: Technology incentives and implications for policy. (2007)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365420"},{"key":"e_1_3_2_2_17_1","volume-title":"Bayesian network classifiers. Machine learning 29, 2-3","author":"Friedman Nir","year":"1997","unstructured":"Nir Friedman, Dan Geiger, and Moises Goldszmidt. 1997. Bayesian network classifiers. Machine learning 29, 2-3 (1997), 131--163."},{"key":"e_1_3_2_2_18_1","volume-title":"On inferring autonomous system relationships in the Internet","author":"Gao Lixin","year":"2001","unstructured":"Lixin Gao. 2001. On inferring autonomous system relationships in the Internet. IEEE\/ACM Transactions on networking 9, 6 (2001), 733--745."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974523"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018439"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663743"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_9"},{"key":"e_1_3_2_2_23_1","unstructured":"Vasileios Giotsas and Shi Zhou. 2011. Inferring AS relationships from BGP attributes. Technical Report."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6562878"},{"key":"e_1_3_2_2_25_1","volume-title":"ACM SIGCOMM Conference 40","author":"Goldberg Sharon","year":"2010","unstructured":"Sharon Goldberg, Michael Schapira, Peter Hummon, and Jennifer Rexford. 2010. Howsecure are secure interdomain routing protocols. ACM SIGCOMM Conference 40, 4 (2010), 87--98."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.09.002"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20798-3_5"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13119-013-0024-4"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2323128"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.926512"},{"key":"e_1_3_2_2_31_1","unstructured":"Isolario. [n. d.]. Isolario. ([n. d.]). https:\/\/www.isolario.it\/."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Elisa Jasinska Nick Hilliard Robert Raszuk and Niels Bakker. 2015. Internet exchange bgp route server. Technical Report. Internet-Draft draft-ietf-idr-ix-bgp-route-server-09 IETF Secretariat.","DOI":"10.17487\/RFC7947"},{"key":"e_1_3_2_2_33_1","volume-title":"Stable and Practical AS Relationship Inference with ProbLink. In NSDI '19","author":"Jin Yuchen","year":"2019","unstructured":"Yuchen Jin, Colin Scott, Amogh Dhamdhere, Vasileios Giotsas, Arvind Krishnamurthy, and Scott Shenker. 2019. Stable and Practical AS Relationship Inference with ProbLink. In NSDI '19.581--598."},{"key":"e_1_3_2_2_34_1","volume-title":"Gligor","author":"Kang Min Suk","year":"2014","unstructured":"Min Suk Kang and Virgil D. Gligor. 2014. Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. In CCS '14.321--333."},{"key":"e_1_3_2_2_35_1","volume-title":"The Crossfire Attack. In 2013 IEEE Symposium on Security and Privacy.127--141","author":"Kang M. S.","unstructured":"M. S. Kang, S. B. Lee, and V. D. Gligor. 2013. The Crossfire Attack. In 2013 IEEE Symposium on Security and Privacy.127--141."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070573"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504735"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486010"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633027"},{"key":"e_1_3_2_2_40_1","unstructured":"IXP Service Matrix. [n. d.]. IXP. ([n. d.]). https:\/\/www.euro-ix.net\/en\/tools\/ixp-service-matrix\/."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.543975"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Rishab Nithyanand Oleksii Starov Adva Zair Phillipa Gill and Michael Schapira. 2016. Measuring and mitigating AS-level adversaries against Tor. In NDSS.","DOI":"10.14722\/ndss.2016.23322"},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings of the Internet Measurement Conference","author":"Nomikos George","year":"2018","unstructured":"George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas Dimitropoulos, and Vasileios Giotsas. 2018. O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs. In Proceedings of the Internet Measurement Conference 2018.265--278."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020798"},{"key":"e_1_3_2_2_45_1","unstructured":"PeeringDB. [n. d.]. PeeringDB. ([n. d.]). https:\/\/www.peeringdb.com\/."},{"key":"e_1_3_2_2_46_1","volume-title":"Ensemble machine learning","author":"Polikar Robi","unstructured":"Robi Polikar. 2012. Ensemble learning. In Ensemble machine learning. Springer, 1--34."},{"key":"e_1_3_2_2_47_1","unstructured":"RIS. [n. d.]. RIPE(RIS). ([n. d.]). https:\/\/www.ripe.net\/ris\/."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866411"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398779"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00032"},{"key":"e_1_3_2_2_51_1","volume-title":"Methods for Detection and Mitigation of BGP Route Leaks. draft-ietf-idr-route-leak-detection-mitigation-06","author":"Sriram Kotikalapudi","year":"2017","unstructured":"Kotikalapudi Sriram, Doug Montgomery, Brian Dickson, Keyur Patel, and Andrei Robachevsky. 2017. Methods for Detection and Mitigation of BGP Route Leaks. draft-ietf-idr-route-leak-detection-mitigation-06 (2017)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.34"},{"key":"e_1_3_2_2_54_1","volume-title":"On the Feasibility of Rerouting-based DDoS Defenses. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1169--1184","author":"Tran Muoi","year":"2019","unstructured":"Muoi Tran, Min Suk Kang, Hsu-Chun Hsiao, Wei-Hsuan Chiang, Shu-Po Tung, and Yu-Su Wang. 2019. On the Feasibility of Rerouting-based DDoS Defenses. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1169--1184."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6889-7"},{"key":"e_1_3_2_2_56_1","volume-title":"How robust is the Internet? Nature 406, 6794","author":"Yuhai Tu.","year":"2000","unstructured":"Yuhai Tu. 2000. How robust is the Internet? Nature 406, 6794 (2000), 353--354."},{"key":"e_1_3_2_2_57_1","volume-title":"A machine learning approach to edge type inference in Internet AS graphs. In 2016 IEEE INFOCOM WKSHPS","author":"Varghese Jinu Susan","unstructured":"Jinu Susan Varghese and Lu Ruan. 2016. A machine learning approach to edge type inference in Internet AS graphs. In 2016 IEEE INFOCOM WKSHPS. IEEE, 71--76."},{"key":"e_1_3_2_2_58_1","unstructured":"Route Views. [n. d.]. University of Oregon Route Views Project. ([n. d.]). http:\/\/www.routeviews.org\/routeviews\/."},{"key":"e_1_3_2_2_59_1","first-page":"577","article-title":"Constrained k-means clustering with background knowledge","volume":"1","author":"Wagstaff Kiri","year":"2001","unstructured":"Kiri Wagstaff, Claire Cardie, Seth Rogers, Stefan Schr\u00f6dl, et al. 2001. Constrained k-means clustering with background knowledge. In Icml, Vol. 1.577--584.","journal-title":"Icml"},{"key":"e_1_3_2_2_60_1","volume-title":"Internet topology research redux. ACM SIGCOMM eBook: Recent Advances in Networking","author":"Willinger Walter","year":"2013","unstructured":"Walter Willinger and Matthew Roughan. 2013. Internet topology research redux. ACM SIGCOMM eBook: Recent Advances in Networking (2013)."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"crossref","DOI":"10.1109\/GLOCOM.2004.1378209","volume-title":"IEEE Global Telecommunications Conference, 2004. GLOBECOM'04.","volume":"3","author":"Xia Jianhong","year":"2004","unstructured":"Jianhong Xia and Lixin Gao. 2004. On the evaluation of AS relationship inferences [Internet reachability\/traffic flow applications]. In IEEE Global Telecommunications Conference, 2004. GLOBECOM'04., Vol. 3. IEEE, 1373--1377."},{"key":"e_1_3_2_2_62_1","volume-title":"The Power of Prefix Hijackings in the Internet Hierarchy. In 2016 IEEE Trustcom","author":"Yang Yan","unstructured":"Yan Yang, Xingang Shi, Xia Yin, and Zhiliang Wang. 2016. The Power of Prefix Hijackings in the Internet Hierarchy. In 2016 IEEE Trustcom. IEEE, 228--235."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.06.017"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052812.1052825"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:37:45Z","timestamp":1765841865000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423627"}},"subtitle":["Recover AS Relationships From Fragmentary Observations"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":64,"alternative-id":["10.1145\/3419394.3423627","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423627","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}