{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:23:45Z","timestamp":1774455825478,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"German Federal Ministry of Education and Research","award":["16KIS1370"],"award-info":[{"award-number":["16KIS1370"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561440","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"395-409","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Rusty clusters?"],"prefix":"10.1145","author":[{"given":"Johannes","family":"Zirngibl","sequence":"first","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Lion","family":"Steger","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Patrick","family":"Sattler","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Germany"}]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Alexa. 2022. Top 1M sites. https:\/\/www.alexa.com\/topsites  Alexa. 2022. Top 1M sites. https:\/\/www.alexa.com\/topsites"},{"key":"e_1_3_2_2_2_1","volume-title":"Proc. IEEE Int. Conference on Computer Communications (INFOCOM).","author":"Almeida Rafael","year":"2020","unstructured":"Rafael Almeida , \u00edtalo Cunha , Renata Teixeira , Darryl Veitch , and Christophe Diot . 2020 . Classification of Load Balancing in the Internet . In Proc. IEEE Int. Conference on Computer Communications (INFOCOM). Rafael Almeida, \u00edtalo Cunha, Renata Teixeira, Darryl Veitch, and Christophe Diot. 2020. Classification of Load Balancing in the Internet. In Proc. IEEE Int. Conference on Computer Communications (INFOCOM)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664285"},{"key":"e_1_3_2_2_4_1","volume-title":"4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14)","author":"Anonymous","year":"2014","unstructured":"Anonymous . 2014 . Towards a Comprehensive Picture of the Great Firewall's DNS Censorship . In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14) . USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/foci14\/workshop-program\/presentation\/anonymous Anonymous. 2014. Towards a Comprehensive Picture of the Great Firewall's DNS Censorship. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14). USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/foci14\/workshop-program\/presentation\/anonymous"},{"key":"e_1_3_2_2_5_1","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Anonymous","year":"2020","unstructured":"Anonymous , Arian Akhavan Niaki , Nguyen Phong Hoang , Phillipa Gill , and Amir Houmansadr . 2020 . Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior . In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20) . USENIX Association. https:\/\/www.usenix.org\/conference\/foci20\/presentation\/anonymous Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, and Amir Houmansadr. 2020. Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20). USENIX Association. https:\/\/www.usenix.org\/conference\/foci20\/presentation\/anonymous"},{"key":"e_1_3_2_2_6_1","unstructured":"APNIC. 2022. IPv6 Capable Rate by country (%). Retrieved 2022-05-07 from https:\/\/stats.labs.apnic.net\/ipv6  APNIC. 2022. IPv6 Capable Rate by country (%). Retrieved 2022-05-07 from https:\/\/stats.labs.apnic.net\/ipv6"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking52078.2021.9472785"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Michael Backes Thorsten Holz Christian Rossow Teemu Rytilahti Milivoj Simeonovski and Ben Stock. 2016. On the Feasibility of TTL-Based Filtering for DRDoS Mitigation. In Research in Attacks Intrusions and Defenses.  Michael Backes Thorsten Holz Christian Rossow Teemu Rytilahti Milivoj Simeonovski and Ben Stock. 2016. On the Feasibility of TTL-Based Filtering for DRDoS Mitigation. In Research in Attacks Intrusions and Defenses.","DOI":"10.1007\/978-3-319-45719-2_14"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987479"},{"key":"e_1_3_2_2_10_1","volume-title":"Rohrer","author":"Beverly Robert","year":"2013","unstructured":"Robert Beverly , William Brinkmeyer , Matthew Luckie , and Justin P . Rohrer . 2013 . IPv6 Alias Resolution via Induced Fragmentation. In Proc. Passive and Active Measurement (PAM) . Robert Beverly, William Brinkmeyer, Matthew Luckie, and Justin P. Rohrer. 2013. IPv6 Alias Resolution via Induced Fragmentation. In Proc. Passive and Active Measurement (PAM)."},{"key":"e_1_3_2_2_11_1","unstructured":"CAIDA. 2022. Ark IPv6 Topology Dataset. Retrieved 2022-05-11 from https:\/\/catalog.caida.org\/details\/dataset\/ipv6_allpref_topology  CAIDA. 2022. Ark IPv6 Topology Dataset. Retrieved 2022-05-11 from https:\/\/catalog.caida.org\/details\/dataset\/ipv6_allpref_topology"},{"key":"e_1_3_2_2_12_1","unstructured":"Cisco. 2022. Umbrella Top 1M List. https:\/\/umbrella.cisco.com\/blog\/cisco-umbrella-1-million  Cisco. 2022. Umbrella Top 1M List. https:\/\/umbrella.cisco.com\/blog\/cisco-umbrella-1-million"},{"key":"e_1_3_2_2_13_1","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Cui Tianyu","unstructured":"Tianyu Cui , Gaopeng Gou , and Gang Xiong . 2020. 6GCVAE: Gated Convolutional Variational Autoencoder for IPv6 Target Generation . In Advances in Knowledge Discovery and Data Mining . Springer International Publishing . Tianyu Cui, Gaopeng Gou, and Gang Xiong. 2020. 6GCVAE: Gated Convolutional Variational Autoencoder for IPv6 Target Generation. In Advances in Knowledge Discovery and Data Mining. Springer International Publishing."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488912"},{"key":"e_1_3_2_2_15_1","unstructured":"Tianyu Cui Gang Xiong Gaopeng Gou Junzheng Shi and Wei Xia. 2021. 6VecLM: Language Modeling in Vector Space for IPv6 Target Generation. In Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track.  Tianyu Cui Gang Xiong Gaopeng Gou Junzheng Shi and Wei Xia. 2021. 6VecLM: Language Modeling in Vector Space for IPv6 Target Generation. In Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423649"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"David Dittrich Erin Kenneally etal 2012. The Menlo Report: Ethical principles guiding information and communication technology research. US Department of Homeland Security (2012).  David Dittrich Erin Kenneally et al. 2012. The Menlo Report: Ethical principles guiding information and communication technology research. US Department of Homeland Security (2012).","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994636"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54328-4_3"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987445"},{"key":"e_1_3_2_2_21_1","unstructured":"Oliver Gasser. 2022. ZMapv6: Internet Scanner with IPv6 capabilities. https:\/\/github.com\/tumi8\/zmap  Oliver Gasser. 2022. ZMapv6: Internet Scanner with IPv6 capabilities. https:\/\/github.com\/tumi8\/zmap"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_2_23_1","volume-title":"Proc. 8th Int. Workshop on Traffic Monitoring and Analysis. Louvain-la-Neuve, Belgium.","author":"Gasser Oliver","year":"2016","unstructured":"Oliver Gasser , Quirin Scheitle , Sebastian Gebhard , and Georg Carle . 2016 . Scanning the IPv6 Internet: Towards a Comprehensive Hitlist . In Proc. 8th Int. Workshop on Traffic Monitoring and Analysis. Louvain-la-Neuve, Belgium. Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle. 2016. Scanning the IPv6 Internet: Towards a Comprehensive Hitlist. In Proc. 8th Int. Workshop on Traffic Monitoring and Analysis. Louvain-la-Neuve, Belgium."},{"key":"e_1_3_2_2_24_1","volume-title":"Statistics: IPv6 Adoption. Retrieved 2022-05-07 from https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html","year":"2022","unstructured":"Google. 2022 . Statistics: IPv6 Adoption. Retrieved 2022-05-07 from https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html Google. 2022. Statistics: IPv6 Adoption. Retrieved 2022-05-07 from https:\/\/www.google.com\/intl\/en\/ipv6\/statistics.html"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488794"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4380"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9000"},{"key":"e_1_3_2_2_28_1","volume-title":"Proc. USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/izhikevich","author":"Izhikevich Liz","year":"2021","unstructured":"Liz Izhikevich , Renata Teixeira , and Zakir Durumeric . 2021 . LZR: Identifying Unexpected Internet Services . In Proc. USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/izhikevich Liz Izhikevich, Renata Teixeira, and Zakir Durumeric. 2021. LZR: Identifying Unexpected Internet Services. In Proc. USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/izhikevich"},{"key":"e_1_3_2_2_29_1","volume-title":"6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space. Computer Networks","author":"Liu Zhizhu","year":"2019","unstructured":"Zhizhu Liu , Yinqiao Xiong , Xin Liu , Wei Xie , and Peidong Zhu . 2019. 6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space. Computer Networks ( 2019 ). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128618312003 Zhizhu Liu, Yinqiao Xiong, Xin Liu, Wei Xie, and Peidong Zhu. 2019. 6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space. Computer Networks (2019). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128618312003"},{"key":"e_1_3_2_2_30_1","volume-title":"Proc. ACM Int. Measurement Conference (IMC)","author":"Luckie Matthew","unstructured":"Matthew Luckie , Robert Beverly , William Brinkmeyer , and kc claffy. 2013. Speed-trap: Internet-Scale IPv6 Alias Resolution . In Proc. ACM Int. Measurement Conference (IMC) ( Barcelona, Spain). Matthew Luckie, Robert Beverly, William Brinkmeyer, and kc claffy. 2013. Speed-trap: Internet-Scale IPv6 Alias Resolution. In Proc. ACM Int. Measurement Conference (IMC) (Barcelona, Spain)."},{"key":"e_1_3_2_2_31_1","unstructured":"Majestic. 2022. The Majestic Million. https:\/\/majestic.com\/reports\/majestic-million\/  Majestic. 2022. The Majestic Million. https:\/\/majestic.com\/reports\/majestic-million\/"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44081-7_15"},{"key":"e_1_3_2_2_33_1","unstructured":"Maxmind. 2022. GeoLite2 Free Geolocation Data. https:\/\/dev.maxmind.com\/geoip\/geolite2-free-geolocation-data?lang=en  Maxmind. 2022. GeoLite2 Free Geolocation Data. https:\/\/dev.maxmind.com\/geoip\/geolite2-free-geolocation-data?lang=en"},{"key":"e_1_3_2_2_34_1","volume-title":"IP Spoofing Detection Using Modified Hop Count. In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.","author":"Mukaddam Ayman","year":"2014","unstructured":"Ayman Mukaddam , Imad Elhajj , Ayman Kayssi , and Ali Chehab . 2014 . IP Spoofing Detection Using Modified Hop Count. In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications. Ayman Mukaddam, Imad Elhajj, Ayman Kayssi, and Ali Chehab. 2014. IP Spoofing Detection Using Modified Hop Count. In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131405"},{"key":"e_1_3_2_2_36_1","unstructured":"RIPE NCC. 2022. Routing Information Service (RIS). Retrieved 2022-08-29 from https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-information-service-ris  RIPE NCC. 2022. Routing Information Service (RIS). Retrieved 2022-08-29 from https:\/\/www.ripe.net\/analyse\/internet-measurements\/routing-information-service-ris"},{"key":"e_1_3_2_2_37_1","unstructured":"RIPE NCC. 2022. Total IPv6 Allocations and Assignments. Retrieved 2022-05-07 from https:\/\/www.ripe.net\/analyse\/statistics\/total-ipv6-allocations_and_assignments  RIPE NCC. 2022. Total IPv6 Allocations and Assignments. Retrieved 2022-05-07 from https:\/\/www.ripe.net\/analyse\/statistics\/total-ipv6-allocations_and_assignments"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98785-5_28"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_11"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"key":"e_1_3_2_2_41_1","volume-title":"Benoit Donnet, and Bamba Gueye.","author":"Poese Ingmar","year":"2011","unstructured":"Ingmar Poese , Steve Uhlig , Mohamed Ali Kaafar , Benoit Donnet, and Bamba Gueye. 2011 . IP Geolocation Databases: Unreliable? ACM SIGCOMM Computer Communication Review ( 2011). Ingmar Poese, Steve Uhlig, Mohamed Ali Kaafar, Benoit Donnet, and Bamba Gueye. 2011. IP Geolocation Databases: Unreliable? ACM SIGCOMM Computer Communication Review (2011)."},{"key":"e_1_3_2_2_42_1","volume-title":"Thomas C. Schmidt, and Matthias W\u00e4hlisch.","author":"Rodday Nils","year":"2021","unstructured":"Nils Rodday , Lukas Kaltenbach , Italo Cunha , Randy Bush , Ethan Katz-Bassett , Gabi Dreo Rodosek , Thomas C. Schmidt, and Matthias W\u00e4hlisch. 2021 . On the Deployment of Default Routes in Inter-Domain Routing (TAURIN '21). Nils Rodday, Lukas Kaltenbach, Italo Cunha, Randy Bush, Ethan Katz-Bassett, Gabi Dreo Rodosek, Thomas C. Schmidt, and Matthias W\u00e4hlisch. 2021. On the Deployment of Default Routes in Inter-Domain Routing (TAURIN'21)."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487829"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2017.8002901"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2017.8002903"},{"key":"e_1_3_2_2_46_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Song Guanglei","year":"2022","unstructured":"Guanglei Song , Jiahai Yang , Lin He , Zhiliang Wang , Guo Li , Chenxin Duan , Yaozhong Liu , and Zhongxiang Sun . 2022 . AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System . In 2022 USENIX Annual Technical Conference (USENIX ATC 22) . Carlsbad, CA. https:\/\/www.usenix.org\/conference\/atc22\/presentation\/song Guanglei Song, Jiahai Yang, Lin He, Zhiliang Wang, Guo Li, Chenxin Duan, Yaozhong Liu, and Zhongxiang Sun. 2022. AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). Carlsbad, CA. https:\/\/www.usenix.org\/conference\/atc22\/presentation\/song"},{"key":"e_1_3_2_2_47_1","volume-title":"DET: Enabling Efficient Probing of IPv6 Active Addresses","author":"Song Guanglei","year":"2022","unstructured":"Guanglei Song , Jiahai Yang , Zhiliang Wang , Lin He , Jinlei Lin , Long Pan , Chenxin Duan , and Xiaowen Quan . 2022 . DET: Enabling Efficient Probing of IPv6 Active Addresses . IEEE\/ACM Transactions on Networking ( 2022). Guanglei Song, Jiahai Yang, Zhiliang Wang, Lin He, Jinlei Lin, Long Pan, Chenxin Duan, and Xiaowen Quan. 2022. DET: Enabling Efficient Probing of IPv6 Active Addresses. IEEE\/ACM Transactions on Networking (2022)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44081-7_14"},{"key":"e_1_3_2_2_49_1","volume-title":"6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning. Computer Networks","author":"Yang Tao","year":"2022","unstructured":"Tao Yang , Bingnan Hou , Zhiping Cai , Kui Wu , Tongqing Zhou , and Chengyu Wang . 2022. 6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning. Computer Networks ( 2022 ). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128621005430 Tao Yang, Bingnan Hou, Zhiping Cai, Kui Wu, Tongqing Zhou, and Chengyu Wang. 2022. 6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning. Computer Networks (2022). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128621005430"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98785-5_11"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487826"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.14459\/2022mp1686542"}],"event":{"name":"IMC '22: ACM Internet Measurement Conference","location":"Nice France","acronym":"IMC '22","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561440","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:16Z","timestamp":1750182556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561440"}},"subtitle":["dusting an IPv6 research foundation"],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":52,"alternative-id":["10.1145\/3517745.3561440","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561440","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}