{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:35:51Z","timestamp":1776681351809,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,27]]},"DOI":"10.1145\/3419394.3423664","type":"proceedings-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:30:22Z","timestamp":1603398622000},"page":"634-647","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Analyzing Third Party Service Dependencies in Modern Web Services"],"prefix":"10.1145","author":[{"given":"Aqsa","family":"Kashaf","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Yuvraj","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310165.3310175"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068870"},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the Internet Measurement Conference","author":"Allman Mark","year":"2018","unstructured":"Mark Allman. 2018. Comments on DNS robustness. In Proceedings of the Internet Measurement Conference 2018.84--90."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Samantha Bates John Bowers Shane Greenstein Jordi Weinstock Yunhan Xu and Jonathan Zittrain. 2018. Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services. Technical Report. National Bureau of Economic Research.","DOI":"10.3386\/w24317"},{"key":"e_1_3_2_2_5_1","unstructured":"Kris Beevers. 2016. A Note From NS1's CEO: How We Responded To Last Week's Major Multi-Faceted DDoS Attacks. https:\/\/ns1.com\/blog\/how-we-responded-to-last-weeks-major-multi-faceted-ddos-attacks."},{"key":"e_1_3_2_2_6_1","volume-title":"The Problem with OCSP Stapling and Must Staple and why Certificate Revocation is still broken","author":"Bock Hanno","year":"2017","unstructured":"Hanno Bock. 2017. The Problem with OCSP Stapling and Must Staple and why Certificate Revocation is still broken, 2017. URL https:\/\/blog.hboeck. de\/archives\/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken. html (2017)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068846"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504754"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978301"},{"key":"e_1_3_2_2_10_1","volume-title":"Accessed","year":"2020","unstructured":"CDNFinder. 2020. Webapp and cli-tool to detect CDN usage of websites. https:\/\/github.com\/turbobytes\/cdnfinder. Accessed: May 23, 2020."},{"key":"e_1_3_2_2_11_1","volume-title":"Accessed","author":"Chickowski Ericka","year":"2020","unstructured":"Ericka Chickowski. April 7, 2020. Cyberattacks Against Pandemic-Stressed Healthcare Organizations. https:\/\/securityboulevard.com\/2020\/04\/7-cyberattacks-against-pandemic-stressed-healthcare-orgs\/. Accessed: April 23, 2020."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682190"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987454"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278543"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134637"},{"key":"e_1_3_2_2_16_1","unstructured":"Digicert. 2020. DigiCert Completes Acquisition of Symantec's Website Security and Related PKI Solutions. https:\/\/www.digicert.com\/news\/digicert-completes-acquisition-of-symantec-ssl\/."},{"key":"e_1_3_2_2_17_1","unstructured":"Dyn Secondary DNS. May 23 2020. Dyn Secondary DNS Information. https:\/\/help.dyn.com\/standard-dns\/dyn-secondary-dns-information\/."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_2_19_1","volume-title":"Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13).605--620.","author":"Durumeric Zakir","unstructured":"Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast Internet-wide scanning and its security applications. In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13).605--620."},{"key":"e_1_3_2_2_20_1","volume-title":"Accessed","author":"October","year":"2016","unstructured":"Fastly. October 21, 2016. Fastly outage. https:\/\/www.fastly.com\/security-advisories\/widespread-dyn-dns-outage-affecting-fastly-customers. Accessed: May 23, 2020."},{"key":"e_1_3_2_2_21_1","volume-title":"Accessed","author":"GlobalSign","year":"2016","unstructured":"GlobalSign October 13, 2016. Globalsign certificate revocation issue. https:\/\/www.globalsign.com\/en\/status. Accessed: May 23, 2020."},{"key":"e_1_3_2_2_22_1","unstructured":"Ariya Hidayat et al. 2013. PhantomJS. Computer software. PhantomJS. Vers 1 7 (2013)."},{"key":"e_1_3_2_2_23_1","unstructured":"Simon Hildrew and Jenny Sivapalan. 2016. Multiple DNS: synchronising Dyn to AWS Route 53. https:\/\/www.theguardian.com\/info\/developer-blog\/2016\/dec\/23\/multiple-dns-synchronising-dyn-to-aws-route-53."},{"key":"e_1_3_2_2_24_1","volume-title":"Accessed","author":"Hilton Scott","year":"2016","unstructured":"Scott Hilton. Oct 26, 2016. Dyn analysis summary of friday october 21 attack. http:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/. Accessed: May 23, 2020."},{"key":"e_1_3_2_2_25_1","unstructured":"Rand Hindi. February 28 2017. Thanks for breaking our connected homes Amazon. https:\/\/medium.com\/snips-ai\/thanks-for-breaking-our-connected-homes-amazon-c820a8849021."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3402413.3402417"},{"key":"e_1_3_2_2_27_1","volume-title":"An Investigation of Cyber Autonomy on Government Websites. In The World Wide Web Conference.2814--2821","author":"Hsiao Hsu-Chun","year":"2019","unstructured":"Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Yu-Ming Ku, Chun-Ming Chang, Hung-Fang Chen, Yu-Jen Chen, Chun-Wen Wang, and Wei Jeng. 2019. An Investigation of Cyber Autonomy on Government Websites. In The World Wide Web Conference.2814--2821."},{"key":"e_1_3_2_2_28_1","unstructured":"IETF. Mar 4 2018. Consolidation. https:\/\/www.ietf.org\/blog\/consolidation\/."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313521"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987487"},{"key":"e_1_3_2_2_31_1","unstructured":"Peter Koch. 1999. Recommendations for DNS SOA Values. (1999)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526782"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505224"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052686"},{"key":"e_1_3_2_2_36_1","volume-title":"Tadayoshi Kohno, and Franziska Roesner.","author":"Lerner Adam","year":"2016","unstructured":"Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. 2016. Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016. In 25th {USENIX} Security Symposium ({USENIX} Security 16)."},{"key":"e_1_3_2_2_37_1","first-page":"143","article-title":"WebProphet: Automating Performance Prediction for Web Services","volume":"10","author":"Li Zhichun","year":"2010","unstructured":"Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert G Greenberg, and Yi-Min Wang. 2010. WebProphet: Automating Performance Prediction for Web Services.. In NSDI, Vol. 10.143--158.","journal-title":"NSDI"},{"key":"e_1_3_2_2_38_1","unstructured":"Public Suffix List. [n.d.]. Mozilla Public Suffix List."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815685"},{"key":"e_1_3_2_2_40_1","unstructured":"Shelby Livingston. October 21 2016. Athenahealth Allscripts websites down amid nationwide hack. https:\/\/www.modernhealthcare.com\/article\/20161021\/NEWS\/161029973\/athenahealth-allscripts-websites-down-amid-nationwide-hack."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355580"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313664"},{"key":"e_1_3_2_2_43_1","volume-title":"Dangers and Prevalence of Unprotected Web Fonts. In 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 1--5.","author":"Mueller Tobias","year":"2019","unstructured":"Tobias Mueller, Daniel Klotzsche, Dominik Herrmann, and Hannes Federrath. 2019. Dangers and Prevalence of Unprotected Web Fonts. In 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 1--5."},{"key":"e_1_3_2_2_44_1","unstructured":"Multi-CDN. 2020. Multi-CDN Strategies. https:\/\/ns1.com\/multi-cdn."},{"key":"e_1_3_2_2_45_1","volume-title":"NSDMiner: Automated discovery of network service dependencies","author":"Natarajan Arun","unstructured":"Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, and Steve E Hutchinson. 2012. NSDMiner: Automated discovery of network service dependencies. IEEE."},{"key":"e_1_3_2_2_46_1","volume-title":"Accessed","year":"2020","unstructured":"Newsweek. 2020. Top Hospitals in the U.S. https:\/\/www.newsweek.com\/best-hospitals-2020\/united-states. Accessed: May 23, 2020."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382274"},{"key":"e_1_3_2_2_48_1","volume-title":"Security Implications of Using Third-Party Resources in the World Wide Web. In 2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE). IEEE, 1--6.","author":"Podins Karlis","year":"2018","unstructured":"Karlis Podins and Arturs Lavrenovs. 2018. Security Implications of Using Third-Party Resources in the World Wide Web. In 2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE). IEEE, 1--6."},{"key":"e_1_3_2_2_49_1","unstructured":"Alexa Traffic Rank. 2020. List of most popular web sites."},{"key":"e_1_3_2_2_50_1","volume-title":"Accessed","author":"Reading Dark","year":"2019","unstructured":"Dark Reading. October 24, 2019. Eight-Hour DDoS Attack Struck AWS Customers. https:\/\/www.darkreading.com\/cloud\/eight-hour-ddos-attack-struck-aws-customers\/d\/d-id\/1336165. Accessed: May 20, 2020."},{"key":"e_1_3_2_2_51_1","volume-title":"Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12).155--168.","author":"Roesner Franziska","unstructured":"Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and defending against third-party tracking on the web. In Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12).155--168."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514163"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"e_1_3_2_2_54_1","unstructured":"Catherine Shu. February 24 2020. Petnet's smart pet feeder system is back after a week-long outage. https:\/\/techcrunch.com\/2020\/02\/24\/petnets-smart-pet-feeder-system-is-back-after-a-week-long-outage-but-customers-are-still-waiting-for-answers\/."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052587"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278548"},{"key":"e_1_3_2_2_57_1","unstructured":"Internet Society. February 26 2019. Consolidation in the Internet Economy. https:\/\/www.internetsociety.org\/news\/press-releases\/2019\/internet-society-launches-research-project-to-understand-the-effects-of-consolidation-in-the-internet-economy\/."},{"key":"e_1_3_2_2_58_1","unstructured":"Akamai Multi-CDN Support. 2020. Akamai - We offer support for multiple CDNs. https:\/\/learn.akamai.com\/en-us\/webhelp\/media-acceleration\/media-acceleration-sdk-integration-guide-for-javascript\/GUID-E246743C-703D-4885-B934-171788539187.html."},{"key":"e_1_3_2_2_59_1","unstructured":"Fastly Multi-CDN Support. 2020. Fastly Launches Cloud Optimizer to Boost Observability and Control in Multi-Cloud and Multi-CDN Infrastructures. https:\/\/www.fastly.com\/press\/press-releases\/fastly-launches-cloud-optimizer-boost-observability-and-control-multi-cloud-and-multi-cdn-infrastructures."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502824"},{"key":"e_1_3_2_2_61_1","unstructured":"Kevin C. Tofel. February 26 2020. It's time for smart home devices to have local failover options during cloud outages. https:\/\/staceyoniot.com\/smart-home-devices-cloud-outage-vs-local\/."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380203"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987462"},{"key":"e_1_3_2_2_64_1","volume-title":"Presented as part of the 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13).473--485.","author":"Wang Xiao Sophia","unstructured":"Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, and David Wetherall. 2013. Demystifying page load performance with WProf. In Presented as part of the 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13).473--485."},{"key":"e_1_3_2_2_65_1","unstructured":"webXray. June 29 2018. webXray Domain Owner List. https:\/\/github.com\/timlib\/webXray_Domain_Owner_List."},{"key":"e_1_3_2_2_66_1","volume-title":"Openssl: The open source toolkit for ssl\/tls.","author":"Young Eric A","year":"2011","unstructured":"Eric A Young, Tim J Hudson, and R Engelschall. 2011. Openssl: The open source toolkit for ssl\/tls."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30505-9_2"}],"event":{"name":"IMC '20: ACM Internet Measurement Conference","location":"Virtual Event USA","acronym":"IMC '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419394.3423664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T23:38:06Z","timestamp":1765841886000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419394.3423664"}},"subtitle":["Have We Learned from the Mirai-Dyn Incident?"],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":67,"alternative-id":["10.1145\/3419394.3423664","10.1145\/3419394"],"URL":"https:\/\/doi.org\/10.1145\/3419394.3423664","relation":{},"subject":[],"published":{"date-parts":[[2020,10,27]]},"assertion":[{"value":"2020-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}