{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:31:53Z","timestamp":1773117113809,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1764055, CNS-1903612, CNS-1705024, CNS-190151"],"award-info":[{"award-number":["CNS-1764055, CNS-1903612, CNS-1705024, CNS-190151"]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR00112020014"],"award-info":[{"award-number":["HR00112020014"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["830927"],"award-info":[{"award-number":["830927"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["FA8750-19-2-0004"],"award-info":[{"award-number":["FA8750-19-2-0004"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.001.031"],"award-info":[{"award-number":["628.001.031"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423646","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"456-463","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["MAnycast2"],"prefix":"10.1145","author":[{"given":"Raffaele","family":"Sommese","sequence":"first","affiliation":[{"name":"University of Twente"}]},{"given":"Leandro","family":"Bertholdo","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Gautam","family":"Akiwate","sequence":"additional","affiliation":[{"name":"UC San Diego"}]},{"given":"Mattijs","family":"Jonker","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Roland","family":"van Rijswijk-Deij","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Alberto","family":"Dainotti","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego"}]},{"given":"KC","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego"}]},{"given":"Anna","family":"Sperotto","sequence":"additional","affiliation":[{"name":"University of Twente"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"AWS IP address ranges. (Apr","year":"2020","unstructured":"Amazon. 2020. AWS IP address ranges. (Apr 2020). https:\/\/docs.aws.amazon.com\/general\/latest\/gr\/aws-ip-ranges.html"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365865"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5001"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080127"},{"key":"e_1_3_2_2_5_1","volume-title":"Tangled: A Cooperative Anycast Testbed.","author":"Bertholdo L.","year":"2020","unstructured":"L. Bertholdo, J. M. Ceron, W. B. de Vries, R. de O. Schmitt, L. Zambenedetti Granville, R. van Rijswijk-Deij, and A. Pras. 2020. Tangled: A Cooperative Anycast Testbed. (2020). arXiv:cs.NI\/2008.12881"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371927.3371930"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836101"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218670"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211855"},{"key":"e_1_3_2_2_10_1","volume-title":"Cogent Looking Glass. (2020). https:\/\/www.cogentco.com\/lookingglass.php [Online","year":"2020","unstructured":"Cogent. 2020. Cogent Looking Glass. (2020). https:\/\/www.cogentco.com\/lookingglass.php [Online; accessed 01-June-2020]."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110449"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the 2017 Internet Measurement Conference (IMC '17)","author":"de Vries W. B.","unstructured":"W. B. de Vries, R. de O. Schmidt, W. Hardaker, J. Heidemann, P-T de Boer, and A. Pras. 2017. Broad and Load-Aware Anycast Mapping with Verfploeter. In Proceedings of the 2017 Internet Measurement Conference (IMC '17). Association for Computing Machinery, New York, NY, USA, 477--488. https:\/\/doi. org\/10.1145\/3131365.3131371"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879195"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the 3rd Conference on Networked Systems Design & Implementation -","volume":"3","author":"Freedman M. J.","unstructured":"M. J. Freedman, K. Lakshminarayanan, and D. Mazi\u00e8res. 2006. OASIS: Anycast for Any Service. In Proceedings of the 3rd Conference on Networked Systems Design & Implementation - Volume 3 (NSDI'06). USENIX Association, USA, 10."},{"key":"e_1_3_2_2_15_1","volume-title":"Good for mitigating DDoS. (Apr","author":"Gilmore P","year":"2013","unstructured":"P Gilmore. 2013. Serving at the Edge: Good for Performance, Good for mitigating DDoS. (Apr 2013). https:\/\/blogs.akamai.com\/2013\/04\/serving-at-the-edge-good-for-performance-good-for-mitigating-ddos-part-ii.html"},{"key":"e_1_3_2_2_16_1","volume-title":"Distance Metrics in the Internet. In IEEE International Telecommunications Symposium (ITS). IEEE, Brazil, 200--202","author":"Huffaker B.","unstructured":"B. Huffaker, M. Fomenkov, D. Plummer, D. Moore, and K. Claffy. 2002. Distance Metrics in the Internet. In IEEE International Telecommunications Symposium (ITS). IEEE, Brazil, 200--202."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4786"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","unstructured":"D.Johnson and S. Deering. 1999. Reserved IPv6 Subnet Anycast Addresses. RFC 2526. (March 1999). https:\/\/doi.org\/10.17487\/RFC2526","DOI":"10.17487\/RFC2526"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230547"},{"key":"e_1_3_2_2_20_1","volume-title":"The BGP Visibility Scanner. In 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).115--120","author":"Lutu A.","unstructured":"A. Lutu, M. Bagnulo, and O. Maennel. 2013. The BGP Visibility Scanner. In 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).115--120."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","unstructured":"D. R. McPherson R. Donnelly and F. Scalzo. 2011. Unique Origin Autonomous System Numbers (ASNs) per Node for Globally Anycasted Services. RFC 6382. (Oct. 2011). https:\/\/doi.org\/10.17487\/RFC6382","DOI":"10.17487\/RFC6382"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355573"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","unstructured":"C. Partridge T. Mendez and W. Milliken. 1993. Host anycasting service. RFC 1546. (Nov. 1993). https:\/\/doi.org\/10.17487\/RFC1546","DOI":"10.17487\/RFC1546"},{"key":"e_1_3_2_2_24_1","unstructured":"RIPE. 2020. RIPE Atlas - The Credit System. (2020). https:\/\/atlas.ripe.net\/docs\/credits\/"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365414"},{"key":"e_1_3_2_2_26_1","volume-title":"AWS Global Accelerator for Availability and Performance. (Nov","author":"Shaun R.","year":"2018","unstructured":"R. Shaun. 2018. AWS Global Accelerator for Availability and Performance. (Nov 2018). https:\/\/aws.amazon.com\/it\/blogs\/aws\/new-aws-global-accelerator-for-availability-and-performance\/"},{"key":"e_1_3_2_2_27_1","volume-title":"https:\/\/ant.isi.edu\/datasets\/ip%5Fhitlists\/ [Online","author":"Datasets SI.","year":"2020","unstructured":"USC\/ISI. 2020. USC\/ISI ANT Datasets. (2020). https:\/\/ant.isi.edu\/datasets\/ip%5Fhitlists\/ [Online; accessed 05-May-2020]."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2017.8002905"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","unstructured":"S. Woolf and D. Conrad. 2007. Requirements for a Mechanism Identifying a Name Server Instance. RFC 4892. (June 2007). https:\/\/doi.org\/10.17487\/RFC4892","DOI":"10.17487\/RFC4892"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","unstructured":"F. Xun J. Heidemann and R. Govindan. 2013. Evaluating anycast in the domain name system. 2013 Proceedings IEEE INFOCOM (2013) 1681--1689. https:\/\/doi.org\/10.1109\/INFCOM.2013.6566965","DOI":"10.1109\/INFCOM.2013.6566965"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098854"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423646","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3419394.3423646","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423646","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:35:34Z","timestamp":1765841734000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423646"}},"subtitle":["Using Anycast to Measure Anycast"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":31,"alternative-id":["10.1145\/3419394.3423646","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423646","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}