{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:03:40Z","timestamp":1775815420667,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["679158"],"award-info":[{"award-number":["679158"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624813","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"89-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Illuminating Router Vendor Diversity Within Providers and Along Network Paths"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5924-6471","authenticated-orcid":false,"given":"Taha","family":"Albakour","sequence":"first","affiliation":[{"name":"TU Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3425-9331","authenticated-orcid":false,"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5005-7350","authenticated-orcid":false,"given":"Robert","family":"Beverly","sequence":"additional","affiliation":[{"name":"Center for Measurement and Analysis of Network Data, Monterey, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4127-3617","authenticated-orcid":false,"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Bernhard Ager Nikolaos Chatzis Anja Feldmann Nadi Sarrar Steve Uhlig and Walter Willinger. 2012. Anatomy of a Large European IXP. In ACM SIGCOMM.","DOI":"10.1145\/2342356.2342393"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Taha Albakour Oliver Gasser Robert Beverly and Georgios Smaragdakis. 2021. Third Time's Not a Charm: Exploiting SNMPv3 for Router Fingerprinting. In ACM IMC.","DOI":"10.1145\/3487552.3487848"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Taha Albakour Oliver Gasser Robert Beverly and Georgios Smaragdakis. 2023. Illuminating Router Vendor Diversity Within Providers and Along Network Paths (artifacts). https:\/\/routerfingerprinting.github.io\/.","DOI":"10.1145\/3618257.3624813"},{"key":"e_1_3_2_1_4_1","volume-title":"Understanding the Mirai Botnet. In USENIX Security Symposium.","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matthew Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security Symposium."},{"key":"e_1_3_2_1_5_1","unstructured":"Ofir Arkin and Fyodor Yarochkin. 2002. Xprobe v2.0: A \"Fuzzy\" Approach to Remote Active Operating System Fingerprinting. http:\/\/www.ouah.org\/Xprobe2. pdf. (2002)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Fred Baker. 1995. Requirements for IP Version 4 Routers. RFC 1812 (Proposed Standard). https:\/\/doi.org\/10.17487\/RFC1812 Updated by RFCs 2644 6633.","DOI":"10.17487\/RFC1812"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637243"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Robert Beverly. 2004. A Robust Classifier for Passive TCP\/IP Fingerprinting. In PAM.","DOI":"10.1007\/978-3-540-24668-8_16"},{"key":"e_1_3_2_1_9_1","unstructured":"bgp.tools. 2023. Anycast Prefixes list as bgp.tools sees it. https:\/\/github.com\/bgptools\/anycast-prefixes."},{"key":"e_1_3_2_1_10_1","unstructured":"Wesley G. Bofman and Fernando Maniego. 2019-06. FINGERPRINTING IPV4 AND IPV6 ROUTERS USING ICMP. https:\/\/hdl.handle.net\/10945\/63434"},{"key":"e_1_3_2_1_11_1","unstructured":"CAIDA. 2021. Macroscopic Internet Topology Data Kit (ITDK). https:\/\/www.caida.org\/catalog\/datasets\/internet-topology-data-kit\/."},{"key":"e_1_3_2_1_12_1","unstructured":"CAIDA. 2022. AS Relationships. https:\/\/publicdata.caida.org\/datasets\/as-relationships\/serial-1\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Hyunseok Chang Ramesh Govindan Sugih Jamin Scott J. Shenker and Walter Willinger. 2002. Towards capturing representative AS-level Internet topologies. In ACM SIGMETRICS.","DOI":"10.1145\/511365.511380"},{"key":"e_1_3_2_1_14_1","volume-title":"Jim Kurose, and Don Towsley.","author":"Chen Weifeng","year":"2005","unstructured":"Weifeng Chen, Yong Huang, Bruno F. Ribeiro, Kyoungwon Suh, Honggang Zhang, Edmundo de Souza e Silva, Jim Kurose, and Don Towsley. 2005. Exploiting the IPID Field to Infer Network Path and End-System Characteristics. In PAM."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Jakub Czyz Matthew Luckie Mark Allman and Michael Bailey. 2016. Don't Forget to Lock the Back Door!A Characterization of IPv6 Network Security Policy. In Network and Distributed Systems Security (NDSS).","DOI":"10.14722\/ndss.2016.23047"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"David Dittrich Erin Kenneally et al. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security (2012).","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_1_17_1","volume":"201","author":"Durumeric Zakir","unstructured":"Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, and J. Alex Halderman. 2015. A Search Engine Backed by Internet-Wide Scanning. In ACM CCS.","journal-title":"J. Alex Halderman."},{"key":"e_1_3_2_1_18_1","volume":"201","author":"Durumeric Zakir","unstructured":"Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast Internet-Wide Scanning and its Security Applications. In USENIX Security Symposium.","journal-title":"J. Alex Halderman."},{"key":"e_1_3_2_1_19_1","unstructured":"J. C. Gallagher. 2022. U.S. Restrictions on Huawei Technologies: National Security Foreign Policy and Economic Interests. https:\/\/crsreports.congress.gov\/product\/ pdf\/R\/R47012."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Vasileios Giotsas Matthew Luckie Bradley Huffaker and kc claffy. 2014. Inferring Complex AS Relationships. In ACM IMC.","DOI":"10.1145\/2663716.2663743"},{"key":"e_1_3_2_1_21_1","volume-title":"A novel methodology to address the Internet AS-level data incom-pleteness","author":"Gregori Enrico","year":"2014","unstructured":"Enrico Gregori, Alessandro Improta, Luciano Lenzini, Lorenzo Rossi, and Luca Sani. 2014. A novel methodology to address the Internet AS-level data incom-pleteness. IEEE\/ACM Transactions on Networking 23, 4 (2014)."},{"key":"e_1_3_2_1_22_1","unstructured":"Jessica Lyons Hardcastle. 2022. Patch these Juniper Networks bugs CISA says. https:\/\/www.theregister.com\/2022\/07\/15\/cisa_critical_juniper_bugs\/"},{"key":"e_1_3_2_1_23_1","volume":"201","author":"Heninger Nadia","unstructured":"Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2012. Mining your Ps and Qs: Detection of widespreadweak keys in network devices. In USENIX Security Symposium.","journal-title":"J. Alex Halderman."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Jordan Holland Paul Schmitt Nick Feamster and Prateek Mittal. 2021. New Directions in Automated Traffic Analysis. In ACM CCS.","DOI":"10.1145\/3460120.3484758"},{"key":"e_1_3_2_1_25_1","unstructured":"Jordan Holland Ross Teixeira Paul Schmitt Kevin Borgolte Jennifer Rexford Nick Feamster and Jonathan Mayer. 2020. Classifying Network Vendors at Internet Scale. arXiv https:\/\/arxiv.org\/abs\/2006.13086."},{"key":"e_1_3_2_1_26_1","volume-title":"LZR: Identifying Unexpected Internet Services. In USENIX Security Symposium.","author":"Izhikevich Liz","year":"2021","unstructured":"Liz Izhikevich, Renata Teixeira, and Zakir Durumeric. 2021. LZR: Identifying Unexpected Internet Services. In USENIX Security Symposium."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Liz Izhikevich Renata Teixeira and Zakir Durumeric. 2022. Predicting IPv4 Services Across All Ports. In ACM SIGCOMM.","DOI":"10.1145\/3544216.3544249"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560609"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2198887"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Derek Leonard and Dmitri Loguinov. 2010. Demystifying Service Discovery: Implementing an Internet-wide Scanner. In ACM IMC.","DOI":"10.1145\/1879141.1879156"},{"key":"e_1_3_2_1_31_1","volume-title":"Speed-trap: Internet-Scale IPv6 Alias Resolution. In ACM IMC.","author":"Luckie Matthew","year":"2013","unstructured":"Matthew Luckie, Robert Beverly, William Brinkmeyer, and kc claffy. 2013. Speed-trap: Internet-Scale IPv6 Alias Resolution. In ACM IMC."},{"key":"e_1_3_2_1_32_1","volume-title":"West","author":"McCann Stephen","year":"2006","unstructured":"Stephen McCann and Mark A. West. 2006. TCP\/IP Field Behavior. IETF RFC 4413."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4476069"},{"key":"e_1_3_2_1_34_1","unstructured":"Nmap. 2021. Nmap: the Network Mapper - Free Security Scanner. https:\/\/nmap.org\/."},{"key":"e_1_3_2_1_35_1","volume-title":"The (in) completeness of the observed Internet AS-level structure","author":"Oliveira Ricardo","year":"2009","unstructured":"Ricardo Oliveira, Dan Pei, Walter Willinger, Beichuan Zhang, and Lixia Zhang. 2009. The (in) completeness of the observed Internet AS-level structure. IEEE\/ACM Transactions on Networking 18, 1 (2009)."},{"key":"e_1_3_2_1_36_1","volume-title":"Ethical Considerations in Network Measurement Papers. Commun. ACM","author":"Partridge Craig","year":"2016","unstructured":"Craig Partridge and Mark Allman. 2016. Ethical Considerations in Network Measurement Papers. Commun. ACM (2016)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Jon Postel. 1981. Internet Control Message Protocol. RFC 792 (Internet Standard). https:\/\/doi.org\/10.17487\/RFC0792 Updated by RFCs 950 4884 6633 6918.","DOI":"10.17487\/RFC0792"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Jon Postel. 1981. Transmission Control Protocol https:\/\/tools.ietf.org\/html\/rfc793 Library Catalog: tools.ietf.org.","DOI":"10.17487\/rfc0793"},{"key":"e_1_3_2_1_39_1","unstructured":"Stefano Previdi Clarence Filsfils Bruno Decraene Stephane Litkowski Martin Horneffer and Rob Shakir. 2016. Source Packet Routing in Networking (SPRING) Problem Statement and Requirements. IETF RFC 7855."},{"key":"e_1_3_2_1_40_1","volume-title":"Subhabrata Sen, Oliver Spatscheck, and Walter Willinger.","author":"Qian Feng","year":"2009","unstructured":"Feng Qian, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck, and Walter Willinger. 2009. TCP Revisited: A Fresh Look at TCP in the Wild. In ACM IMC."},{"key":"e_1_3_2_1_41_1","unstructured":"Global OID reference database. 2023. Reference record for OID 1.3.6.1.2.1.1. https:\/\/oidref.com\/1.3.6.1.2.1.1."},{"key":"e_1_3_2_1_42_1","unstructured":"Reuters. 2021. White House vows to protect U.S. telecoms network from Huawei security threat. https:\/\/www.reuters.com\/article\/us-usa-huawei-security-idUSKBN29W2HV."},{"key":"e_1_3_2_1_43_1","unstructured":"RIPE NCC. 2021. RIPE Atlas. https:\/\/atlas.ripe.net\/."},{"key":"e_1_3_2_1_44_1","volume-title":"Rye and Robert Beverly","author":"Erik","year":"2019","unstructured":"Erik C. Rye and Robert Beverly. 2019. Sundials in the Shade: An Internet-wide Perspective on ICMP Timestamps. In PAM."},{"key":"e_1_3_2_1_45_1","unstructured":"Omar Santos. 2023. Threat Actors Exploiting SNMP Vulnerabilities in Cisco Routers. https:\/\/blogs.cisco.com\/security\/threat-actors-exploiting-snmp-vulnerabilities-in-cisco-routers"},{"key":"e_1_3_2_1_46_1","volume-title":"Hershel: Single-Packet OS Fingerprinting. In ACM SIGMETRICS.","author":"Shamsi Zain","year":"2014","unstructured":"Zain Shamsi, Ankur Nandwani, Derek Leonard, and Dmitri Loguinov. 2014. Hershel: Single-Packet OS Fingerprinting. In ACM SIGMETRICS."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Neil Spring Ratul Mahajan and David Wetherall. 2002. Measuring ISP topologies with Rocketfuel. In ACM SIGCOMM.","DOI":"10.1145\/633038.633039"},{"key":"e_1_3_2_1_48_1","unstructured":"The MITRE Corporation CVE. 2022. CVE.org Search Results for routers. https: \/\/cve.mitre.org\/cgi-bin\/cvekey.cgi?keyword=router."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504761"},{"key":"e_1_3_2_1_50_1","volume-title":"Snacktime: A Perl Solution for Remote OS Fingerprinting. https:\/\/www.packetfu.com\/wp\/snacktime. html.","author":"Veysset Franck","year":"2003","unstructured":"Franck Veysset, Olivier Courtay, and Olivier Heen. 2003. Snacktime: A Perl Solution for Remote OS Fingerprinting. https:\/\/www.packetfu.com\/wp\/snacktime. html."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Florian Wohlfart Nikolaos Chatzis Caglar Dabanoglu Georg Carle and Walter Willinger. 2018. Leveraging interconnections for performance: the serving infrastructure of a large CDN. In ACM SIGCOMM.","DOI":"10.1145\/3230543.3230576"}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","location":"Montreal QC Canada","acronym":"IMC '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:17:19Z","timestamp":1755868639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":51,"alternative-id":["10.1145\/3618257.3624813","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624813","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}