{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:39Z","timestamp":1750220559309,"version":"3.41.0"},"reference-count":38,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CCF-1934846","CCF-1637536","CCF-1908849"],"award-info":[{"award-number":["CCF-1934846","CCF-1637536","CCF-1908849"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Meas. Anal. Comput. Syst."],"published-print":{"date-parts":[[2021,6]]},"abstract":"<jats:p>Accurate prediction of network paths between arbitrary hosts on the Internet is of vital importance for network operators, cloud providers, and academic researchers. We present PredictRoute, a system that predicts network paths between hosts on the Internet using historical knowledge of the data and control plane. In addition to feeding on freely available traceroutes and BGP routing tables, PredictRoute optimally explores network paths towards chosen BGP prefixes. PredictRoute's strategy for exploring network paths discovers 4X more autonomous system (AS) hops than other well-known strategies used in practice today. Using a corpus of traceroutes, PredictRoute trains probabilistic models of routing towards prefixes on the Internet to predict network paths and their likelihood. PredictRoute's AS-path predictions differ from the measured path by at most 1 hop, 75% of the time. We expose PredictRoute's path prediction capability via a REST API to facilitate its inclusion in other applications and studies. We additionally demonstrate the utility of PredictRoute in improving real-world applications for circumventing Internet censorship and preserving anonymity online.<\/jats:p>","DOI":"10.1145\/3460090","type":"journal-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T14:44:15Z","timestamp":1622817855000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["PredictRoute: A Network Path Prediction Toolkit"],"prefix":"10.1145","volume":"5","author":[{"given":"Rachee","family":"Singh","sequence":"first","affiliation":[{"name":"University of Massachusetts, Amherst, Amherst, MA, USA"}]},{"given":"David","family":"Tench","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, Amherst, MA, USA"}]},{"given":"Phillipa","family":"Gill","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, Amherst, MA, USA"}]},{"given":"Andrew","family":"McGregor","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"CAIDA's Prefix to ASN dataset. https:\/\/www.caida.org\/data\/routing\/routeviews-prefix2as.xml.  CAIDA's Prefix to ASN dataset. https:\/\/www.caida.org\/data\/routing\/routeviews-prefix2as.xml."},{"key":"e_1_2_2_2_1","unstructured":"Peeringdb. https:\/\/www.peeringdb.com\/.  Peeringdb. https:\/\/www.peeringdb.com\/."},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637234"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815712"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2015.2254"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0044"},{"key":"e_1_2_2_7_1","unstructured":"CAIDA Ark. http:\/\/www.caida.org\/projects\/ark\/.  CAIDA Ark. http:\/\/www.caida.org\/projects\/ark\/."},{"key":"e_1_2_2_8_1","unstructured":"CAIDA AS Relationship dataset. http:\/\/data.caida.org\/datasets\/as-relationships\/.  CAIDA AS Relationship dataset. http:\/\/data.caida.org\/datasets\/as-relationships\/."},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658964"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815719"},{"key":"e_1_2_2_11_1","volume-title":"Naval Research Lab Washington DC","author":"Dingledine R.","year":"2004","unstructured":"R. Dingledine , N. Mathewson , and P. Syverson . Tor: The second-generation onion router. Technical report , Naval Research Lab Washington DC , 2004 . R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/285055.285059"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398804"},{"key":"e_1_2_2_14_1","volume-title":"7th $$USENIX$$ Workshop on Free and Open Communications on the Internet (FOCI 17)","author":"Frolov S.","year":"2017","unstructured":"S. Frolov , F. Douglas , W. Scott , A. McDonald , B. VanderSloot , R. Hynes , A. Kruger , M. Kallitsis , D. G. Robinson , S. Schultze , An isp-scale deployment of tapdance . In 7th $$USENIX$$ Workshop on Free and Open Communications on the Internet (FOCI 17) , 2017 . S. Frolov, F. Douglas, W. Scott, A. McDonald, B. VanderSloot, R. Hynes, A. Kruger, M. Kallitsis, D. G. Robinson, S. Schultze, et al. An isp-scale deployment of tapdance. In 7th $$USENIX$$ Workshop on Free and Open Communications on the Internet (FOCI 17), 2017."},{"key":"e_1_2_2_15_1","volume-title":"Stable Internet routing without global coordination","author":"Gao L.","year":"2001","unstructured":"L. Gao and J. Rexford . Stable Internet routing without global coordination . 2001 . L. Gao and J. Rexford. Stable Internet routing without global coordination. 2001."},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791949.1791951"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018439"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096155"},{"key":"e_1_2_2_19_1","volume-title":"ACM Computer Communications Review (CCR).","author":"Gill P.","year":"2014","unstructured":"P. Gill , M. Schapira , and S. Goldberg . A survey of interdomain routing policies . In ACM Computer Communications Review (CCR). , Jan 2014 . P. Gill, M. Schapira, and S. Goldberg. A survey of interdomain routing policies. In ACM Computer Communications Review (CCR)., Jan 2014."},{"key":"e_1_2_2_20_1","volume-title":"ACM IMC","author":"Giotsas V.","year":"2014","unstructured":"V. Giotsas , M. Luckie , B. Huffaker, and kc claffy. Inferring complex AS relationships . In ACM IMC , 2014 . V. Giotsas, M. Luckie, B. Huffaker, and kc claffy. Inferring complex AS relationships. In ACM IMC, 2014."},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815710"},{"key":"e_1_2_2_22_1","volume-title":"Autonomous security for autonomous systems. Computer Networks, oct","author":"Karlin J.","year":"2008","unstructured":"J. Karlin , S. Forrest , and J. Rexford . Autonomous security for autonomous systems. Computer Networks, oct 2008 . J. Karlin, S. Forrest, and J. Rexford. Autonomous security for autonomous systems. Computer Networks, oct 2008."},{"key":"e_1_2_2_23_1","volume-title":"USENIX Symposium on Networked Systems Design & Implementation (NSDI)","author":"Katz-Bassett E.","year":"2010","unstructured":"E. Katz-Bassett , H. Madhyastha , V. Adhikari , C. Scott , J. Sherry , P. van Wesep , A. Krishnamurthy , and T. Anderson . Reverse traceroute . In USENIX Symposium on Networked Systems Design & Implementation (NSDI) , 2010 . E. Katz-Bassett, H. Madhyastha, V. Adhikari, C. Scott, J. Sherry, P. van Wesep, A. Krishnamurthy, and T. Anderson. Reverse traceroute. In USENIX Symposium on Networked Systems Design & Implementation (NSDI), 2010."},{"key":"e_1_2_2_24_1","volume-title":"USENIX NSDI","author":"Katz-Bassett E.","year":"2016","unstructured":"E. Katz-Bassett , P. Marchetta , M. Calder , Y.-C. Chiu , I. Cunha , H. Madhyastha , and V. Giotsas . Sibyl: A practical internet route oracle . In USENIX NSDI , 2016 . E. Katz-Bassett, P. Marchetta, M. Calder, Y.-C. Chiu, I. Cunha, H. Madhyastha, and V. Giotsas. Sibyl: A practical internet route oracle. In USENIX NSDI, 2016."},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.06.004"},{"key":"e_1_2_2_26_1","volume-title":"Proc. of Operatings System Design and Implementation","author":"Madhyastha H. V.","year":"2006","unstructured":"H. V. Madhyastha , T. Isdal , M. Piatek , C. Dixon , T. Anderson , A. Krishnamurthy , and A. Venkataramani . iPlane: An Information Plane for Distributed Services . In Proc. of Operatings System Design and Implementation , 2006 . H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An Information Plane for Distributed Services. In Proc. of Operatings System Design and Implementation, 2006."},{"key":"e_1_2_2_27_1","first-page":"137","volume-title":"NSDI","volume":"9","author":"Madhyastha H. V.","year":"2009","unstructured":"H. V. Madhyastha , E. Katz-Bassett , T. E. Anderson , A. Krishnamurthy , and A. Venkataramani . iplane nano: Path prediction for peer-to-peer applications . In NSDI , volume 9 , pages 137 -- 152 , 2009 . H. V. Madhyastha, E. Katz-Bassett, T. E. Anderson, A. Krishnamurthy, and A. Venkataramani. iplane nano: Path prediction for peer-to-peer applications. In NSDI, volume 9, pages 137--152, 2009."},{"key":"e_1_2_2_28_1","volume-title":"Holding all the ases: Identifying and circumventing the pitfalls of as-aware tor client design. CoRR, abs\/1605.03596","author":"Nithyanand R.","year":"2016","unstructured":"R. Nithyanand , R. Singh , S. Cho , and P. Gill . Holding all the ases: Identifying and circumventing the pitfalls of as-aware tor client design. CoRR, abs\/1605.03596 , 2016 . R. Nithyanand, R. Singh, S. Cho, and P. Gill. Holding all the ases: Identifying and circumventing the pitfalls of as-aware tor client design. CoRR, abs\/1605.03596, 2016."},{"key":"e_1_2_2_29_1","unstructured":"Raspberry Pi. https:\/\/www.raspberrypi.org\/.  Raspberry Pi. https:\/\/www.raspberrypi.org\/."},{"key":"e_1_2_2_30_1","unstructured":"RIPE Atlas. https:\/\/atlas.ripe.net\/.  RIPE Atlas. https:\/\/atlas.ripe.net\/."},{"key":"e_1_2_2_31_1","unstructured":"Rule Based Learning Ensembles. https:\/\/statweb.stanford.edu\/ jhf\/R_RuleFit.html.  Rule Based Learning Ensembles. https:\/\/statweb.stanford.edu\/ jhf\/R_RuleFit.html."},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2959053"},{"key":"e_1_2_2_33_1","volume-title":"NDSS","author":"Starov O.","year":"2016","unstructured":"O. Starov , R. Nithyanand , A. Zair , P. Gill , and M. Schapira . Measuring and mitigating as-level adversaries against tor . In NDSS , 2016 . O. Starov, R. Nithyanand, A. Zair, P. Gill, and M. Schapira. Measuring and mitigating as-level adversaries against tor. In NDSS, 2016."},{"key":"e_1_2_2_34_1","first-page":"271","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Sun Y.","year":"2015","unstructured":"Y. Sun , A. Edmundson , L. Vanbever , O. Li , J. Rexford , M. Chiang , and P. Mittal . Raptor: Routing attacks on privacy in tor . In 24th USENIX Security Symposium (USENIX Security 15) , pages 271 -- 286 , Washington, D.C. , Aug. 2015 . USENIX Association. Y. Sun, A. Edmundson, L. Vanbever, O. Li, J. Rexford, M. Chiang, and P. Mittal. Raptor: Routing attacks on privacy in tor. In 24th USENIX Security Symposium (USENIX Security 15), pages 271--286, Washington, D.C., Aug. 2015. USENIX Association."},{"key":"e_1_2_2_35_1","volume-title":"Border gateway protocol modeling and simulation. master's thesis","author":"Wojciechowski M.","year":"2008","unstructured":"M. Wojciechowski . Border gateway protocol modeling and simulation. master's thesis . 2008 . M. Wojciechowski. Border gateway protocol modeling and simulation. master's thesis. 2008."},{"key":"e_1_2_2_36_1","first-page":"30","volume-title":"Proceedings of the 20th USENIX Conference on Security, SEC'11","author":"Wustrow E.","year":"2011","unstructured":"E. Wustrow , S. Wolchok , I. Goldberg , and J. A. Halderman . Telex: Anticensorship in the network infrastructure . In Proceedings of the 20th USENIX Conference on Security, SEC'11 , pages 30 -- 30 , Berkeley, CA, USA , 2011 . USENIX Association. E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 30--30, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"e_1_2_2_37_1","first-page":"30","volume-title":"Proceedings of the 20th USENIX Conference on Security, SEC'11","author":"Wustrow E.","year":"2011","unstructured":"E. Wustrow , S. Wolchok , I. Goldberg , and J. A. Halderman . Telex: Anticensorship in the network infrastructure . In Proceedings of the 20th USENIX Conference on Security, SEC'11 , pages 30 -- 30 , Berkeley, CA, USA , 2011 . USENIX Association. E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 30--30, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.17.11.712"}],"container-title":["Proceedings of the ACM on Measurement and Analysis of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460090","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460090","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:28Z","timestamp":1750195708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10.1145\/3460090"],"URL":"https:\/\/doi.org\/10.1145\/3460090","relation":{},"ISSN":["2476-1249"],"issn-type":[{"type":"electronic","value":"2476-1249"}],"subject":[],"published":{"date-parts":[[2021,6]]},"assertion":[{"value":"2021-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}