{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T17:15:04Z","timestamp":1776791704912,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Norwegian Research Council","award":["288744"],"award-info":[{"award-number":["288744"]}]},{"name":"EPSRC","award":["EP\/V026763\/1"],"award-info":[{"award-number":["EP\/V026763\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624799","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"16-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Replication: 20 Years of Inferring Interdomain Routing Policies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8422-4332","authenticated-orcid":false,"given":"Savvas","family":"Kastanakis","sequence":"first","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5277-6498","authenticated-orcid":false,"given":"Vasileios","family":"Giotsas","sequence":"additional","affiliation":[{"name":"Cloudflare, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2263-6934","authenticated-orcid":false,"given":"Ioana","family":"Livadariu","sequence":"additional","affiliation":[{"name":"Simula Metropolitan, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1688-1167","authenticated-orcid":false,"given":"Neeraj","family":"Suri","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2023. PeeringDB. https:\/\/www.peeringdb.com. (2023)."},{"key":"e_1_3_2_2_2_1","unstructured":"2023. Public Route Server. https:\/\/www.routeservers.org\/. (2023)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342393"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117549"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815712"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644934"},{"key":"e_1_3_2_2_8_1","volume-title":"Roberto di Lallo, Marc Bruyere, Steve Uhlig, and Ignacio Castro.","author":"B\u00f6ttger Timm","year":"2018","unstructured":"Timm B\u00f6ttger, Gianni Antichi, Eder Le\u00e3o Fernandes, Roberto di Lallo, Marc Bruyere, Steve Uhlig, and Ignacio Castro. 2018. The Elusive Internet Flattening: 10 Years of IXP Growth. CoRR (2018)."},{"key":"e_1_3_2_2_9_1","volume-title":"https:\/\/publicdata.caida.org\/datasets\/as -relationships\/. (2023). [Online","author":"Relationships Dataset CAIDA.","year":"2023","unstructured":"CAIDA. 2023. AS-Relationships Dataset. https:\/\/publicdata.caida.org\/datasets\/as -relationships\/. (2023). [Online; accessed 11-May-2023]."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658964"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143362"},{"key":"e_1_3_2_2_12_1","volume-title":"BGP best path selection algorithm. https:\/\/www.cisco.com\/c\/en\/us\/ support\/docs\/ip\/border-gateway-protocol-bgp\/13753-25.html. (2023). [Online","year":"2023","unstructured":"Cisco. 2023. BGP best path selection algorithm. https:\/\/www.cisco.com\/c\/en\/us\/ support\/docs\/ip\/border-gateway-protocol-bgp\/13753-25.html. (2023). [Online; accessed 11-May-2023]."},{"key":"e_1_3_2_2_13_1","volume-title":"Antonio Pescap\u00e8, Vasileios Giotsas, Harsha V Madhyastha, and Ethan Katz-Bassett.","author":"Cunha \u00cdtalo","year":"2016","unstructured":"\u00cdtalo Cunha, Pietro Marchetta, Matt Calder, Yi-Ching Chiu, Bruno VA Machado, Antonio Pescap\u00e8, Vasileios Giotsas, Harsha V Madhyastha, and Ethan Katz-Bassett. 2016. Sibyl: a practical Internet route oracle. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). 325--344."},{"key":"e_1_3_2_2_14_1","volume-title":"Towards practical privacy-preserving protocols. it-Information Technology 64, 1--2","author":"Demmler Daniel","year":"2022","unstructured":"Daniel Demmler. 2022. Towards practical privacy-preserving protocols. it-Information Technology 64, 1--2 (2022), 49--53."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452543"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921196"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355743"},{"key":"e_1_3_2_2_18_1","volume-title":"IRR Hygiene in the RPKI Era. In International Conference on Passive and Active Network Measurement. Springer, 321--337","author":"Du Ben","year":"2022","unstructured":"Ben Du, Gautam Akiwate, Thomas Krenc, Cecilia Testart, Alexander Marder, Bradley Huffaker, Alex C Snoeren, and Kimberly C Claffy. 2022. IRR Hygiene in the RPKI Era. In International Conference on Passive and Active Network Measurement. Springer, 321--337."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3405656.3418711"},{"key":"e_1_3_2_2_20_1","volume-title":"On inferring autonomous system relationships in the Internet","author":"Gao Lixin","year":"2001","unstructured":"Lixin Gao. 2001. On inferring autonomous system relationships in the Internet. IEEE\/ACM Transactions on networking 9, 6 (2001), 733--745."},{"key":"e_1_3_2_2_21_1","volume-title":"Stable Internet routing without global coordination","author":"Gao Lixin","year":"2001","unstructured":"Lixin Gao and Jennifer Rexford. 2001. Stable Internet routing without global coordination. IEEE\/ACM Transactions on networking 9, 6 (2001), 681--692."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472928"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_1"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096155"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567561.2567566"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663743"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3025945"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363987"},{"key":"e_1_3_2_2_29_1","first-page":"1","article-title":"Interconnection, peering, and settlements. In proc","volume":"9","author":"Huston Geoff","year":"1999","unstructured":"Geoff Huston. 1999. Interconnection, peering, and settlements. In proc. INET, Vol. 9. 1.","journal-title":"INET"},{"key":"e_1_3_2_2_30_1","unstructured":"Geoff Huston. 2023. IPv4 Address Report. https:\/\/www.potaroo.net\/tools\/ipv4\/. (2023)."},{"key":"e_1_3_2_2_31_1","first-page":"581","article-title":"Stable and Practical AS Relationship Inference with ProbLink","volume":"19","author":"Jin Yuchen","year":"2019","unstructured":"Yuchen Jin, Colin Scott, Amogh Dhamdhere, Vasileios Giotsas, Arvind Krishna-murthy, and Scott Shenker. 2019. Stable and Practical AS Relationship Inference with ProbLink.. In NSDI, Vol. 19. 581--598.","journal-title":"NSDI"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423627"},{"key":"e_1_3_2_2_33_1","volume-title":"BGP best path selection algorithm. https:\/\/www.juniper.net\/docu mentation\/us\/en\/software\/junos\/vpn-l2\/bgp\/topics\/concept\/routing-protocols -address-representation.html. (2023). [Online","year":"2023","unstructured":"Juniper. 2023. BGP best path selection algorithm. https:\/\/www.juniper.net\/docu mentation\/us\/en\/software\/junos\/vpn-l2\/bgp\/topics\/concept\/routing-protocols -address-representation.html. (2023). [Online; accessed 11-May-2023]."},{"key":"e_1_3_2_2_34_1","volume-title":"Online GitHub Repository. https:\/\/github.com\/kastanakis\/replicating-selective-a nnouncements-inference. (2023). [Online","author":"Kastanakis Savvas","year":"2023","unstructured":"Savvas Kastanakis, Vasileios Giotsas, Ioana Livadariu, and Neeraj Suri. 2023. Online GitHub Repository. https:\/\/github.com\/kastanakis\/replicating-selective-a nnouncements-inference. (2023). [Online; accessed 24-September-2023]."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3563025"},{"key":"e_1_3_2_2_36_1","first-page":"2466","article-title":"Network-aware recommendations in the wild: Methodology, realistic evaluations, experiments","volume":"21","author":"Kastanakis Savvas","year":"2020","unstructured":"Savvas Kastanakis, Pavlos Sermpezis, Vasileios Kotronis, Daniel Menasch\u00e9, and Thrasyvoulos Spyropoulos. 2020. Network-aware recommendations in the wild: Methodology, realistic evaluations, experiments. IEEE Transactions on Mobile Computing 21, 7 (2020), 2466--2479.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504758"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875951.2875955"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890960"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851194"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848203"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504735"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281419"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_17"},{"key":"e_1_3_2_2_45_1","unstructured":"Alexandros Milolidakis. 2022. Understanding the Capabilities of Route Collectors to Observe Stealthy Hijacks: Does adding more monitors or reporting more paths help? Ph.D. Dissertation. KTH Royal Institute of Technology."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3261128"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159937"},{"key":"e_1_3_2_2_48_1","volume-title":"Routing Information Service (RIS). https:\/\/www.ripe.net\/. (2023). [Online","author":"RIPE NCC.","year":"2023","unstructured":"RIPE NCC. 2023. Routing Information Service (RIS). https:\/\/www.ripe.net\/. (2023). [Online; accessed 12-May-2023]."},{"key":"e_1_3_2_2_49_1","volume-title":"https:\/\/www.radb.net\/","author":"Network Merit","year":"2021","unstructured":"Merit Network. 2021. Merit RADb. (2021). https:\/\/www.radb.net\/."},{"key":"e_1_3_2_2_50_1","unstructured":"University of Oregon. 2023. Route Views Project. http:\/\/www.routeviews.org\/. (2023). [Online; accessed 12-May-2023]."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2020798"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384529.1375482"},{"key":"e_1_3_2_2_53_1","volume-title":"Proceedings of the 22nd ACM Internet Measurement Conference. 730--737","author":"Oliver Leo","unstructured":"Leo Oliver, Gautam Akiwate, Matthew Luckie, Ben Du, and kc claffy. 2022. Stop, DROP, and ROA: Effectiveness of Defenses through the lens of DROP. In Proceedings of the 22nd ACM Internet Measurement Conference. 730--737."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987482"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541716"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452558"},{"key":"e_1_3_2_2_57_1","volume-title":"Public Route Servers. https:\/\/www.routeservers.org\/. (2023). [Online","year":"2023","unstructured":"routeservers.org. 2023. Public Route Servers. https:\/\/www.routeservers.org\/. (2023). [Online; accessed 11-May-2023]."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098853"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341617.3326145"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2869798"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108292"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096546"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460090"},{"key":"e_1_3_2_2_64_1","unstructured":"The Internet Society. 2019. Consolidation in the Internet Economy. https: \/\/www.internetsociety.org\/wp-content\/uploads\/2022\/12\/2019-Internet-Society-Global-Internet-Report-Consolidation-in-the-Internet-Economy.pdf. (2019)."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.054"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2719648"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948208"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230576"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98785-5_10"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098854"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162984"}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","location":"Montreal QC Canada","acronym":"IMC '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624799","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:18:36Z","timestamp":1755868716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624799"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":71,"alternative-id":["10.1145\/3618257.3624799","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624799","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}