{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:31:48Z","timestamp":1773117108718,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2120400"],"award-info":[{"award-number":["2120400"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["679158"],"award-info":[{"award-number":["679158"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624831","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"328-343","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["How to Operate a Meta-Telescope in your Spare Time"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8666-9539","authenticated-orcid":false,"given":"Daniel","family":"Wagner","sequence":"first","affiliation":[{"name":"DE-CIX \/ Max Planck Institute for Informatics, Frankfurt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2355-3807","authenticated-orcid":false,"given":"Sahil Ashish","family":"Ranadive","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7990-7802","authenticated-orcid":false,"given":"Harm","family":"Griffioen","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8086-499X","authenticated-orcid":false,"given":"Michalis","family":"Kallitsis","sequence":"additional","affiliation":[{"name":"Merit Network, Inc., Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6444-5656","authenticated-orcid":false,"given":"Alberto","family":"Dainotti","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4127-3617","authenticated-orcid":false,"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5530-6993","authenticated-orcid":false,"given":"Anja","family":"Feldmann","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2023. Routeviews Project - University of Oregon. http:\/\/www.routeviews.org\/.(2023)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342393"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Aniket Anand Michalis Kallitsis Jackson Sippe and Alberto Dainotti. 2023. Aggressive Internet-Wide Scanners: Network Impact and Longitudinal Characterization. In ACM CoNEXT.","DOI":"10.1145\/3624354.3630583"},{"key":"e_1_3_2_2_4_1","volume-title":"Understanding the Mirai Botnet. In USENIX Security Symposium.","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In USENIX Security Symposium."},{"key":"e_1_3_2_2_5_1","unstructured":"Michael Bailey Evan Cooke Farnam Jahanian Jose Nazario and David Watson. 2005. The Internet Motion Sensor - A Distributed Blackhole Monitoring System. In NDSS."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413247.2413285"},{"key":"e_1_3_2_2_7_1","volume-title":"Alex C. Snoeren, and Michalis Kallitsis.","year":"2015","unstructured":"Karyn. Benson, Alberto. Dainotti, kc. Claffy, Alex C. Snoeren, and Michalis Kallitsis. 2015. Leveraging Internet Background Radiation for Opportunistic Network Analysis. In ACM IMC."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276799.3276801"},{"key":"e_1_3_2_2_9_1","unstructured":"CAIDA. 2023. Routeviews Prefix to AS mappings Dataset for IPv4 and IPv6. https:\/\/www.caida.org\/catalog\/datasets\/routeviews-prefix2as\/. (2023)."},{"key":"e_1_3_2_2_10_1","volume-title":"The CAIDA UCSD AS to Organization Mapping Dataset","author":"CAIDA.","year":"2023","unstructured":"CAIDA. 2023. The CAIDA UCSD AS to Organization Mapping Dataset, 2023-04-11. https:\/\/www.caida.org\/data\/as_organizations\/. (2023)."},{"key":"e_1_3_2_2_11_1","unstructured":"CAIDA. 2023. The UCSD Network Telescope. https:\/\/www.caida.org\/projects\/network_telescope\/. (2023)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675013"},{"key":"e_1_3_2_2_13_1","article-title":"There is More to IXPs than Meets the Eye","volume":"45","author":"Chatzis Nikolaos","year":"2013","unstructured":"Nikolaos Chatzis, Georgios Smaragdakis, Anja Feldmann, and Walter Willinger. 2013. There is More to IXPs than Meets the Eye. ACM SIGCOMM Computer Communication Review 45, 5 (2013).","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_2_14_1","unstructured":"Benoit Claise Brian. Trammell and Paul Aitken. 2013. RFC 7011: Specification of the IPFIX Protocol for the Exchange of Flow Information. (2013)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029627"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Michelle Cotton Leo Vegoda Ronald P. Bonica and Brian Haberman. 2013. Special-Purpose IP Address Registries. IETF RFC 6890. (2013).","DOI":"10.17487\/rfc6890"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Jakub Czyz Kyle Lady Sam G. Miller Michael Bailey Michael Kallitsis and Manish Karir. 2013. Understanding IPv6 Internet Background Radiation. In ACM IMC.","DOI":"10.1145\/2504730.2504732"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096154"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602221"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2559218"},{"key":"e_1_3_2_2_21_1","volume-title":"Ferdinando Papale, and Antonio Pescap\u00e8.","author":"Dainotti Alberto","year":"2012","unstructured":"Alberto Dainotti, Alistair King, kc Claffy, Ferdinando Papale, and Antonio Pescap\u00e8. 2012. Analysis of a \"\/0\" stealth scan from a botnet. In ACM IMC."},{"key":"e_1_3_2_2_22_1","volume-title":"Marco Chiesa, Michele Russo, and Antonio Pescape.","author":"Dainotti Alberto","year":"2011","unstructured":"Alberto Dainotti, Claudio Squarcella, Emilie Aben, kc Claffy, Marco Chiesa, Michele Russo, and Antonio Pescape. 2011. Analysis of Country-wide Internet Outages Caused by Censorship. In ACM IMC."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Zakir Durumeric David Adrian Ariana Mirian Michael Bailey and J. Alex Halderman. 2015. A Search Engine Backed by Internet-Wide Scanning.","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_2_24_1","volume-title":"An Internet-Wide View of Internet-Wide Scanning. In USENIX Security Symposium.","author":"Durumeric Zakir","unstructured":"Zakir Durumeric, Michael Bailey, and Alex J. Halderman. 2014. An Internet-Wide View of Internet-Wide Scanning. In USENIX Security Symposium."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Paul Ferguson and Daniel Senie. 2000. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. IETF RFC 2827. (2000).","DOI":"10.17487\/rfc2827"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Oliver Gasser Quirin Scheitle Pawel Foremski Qasim Lone Maciej Korczynski Stephen D. Strowes Luuk Hendriks and Georg Carle. 2018. Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. In ACM IMC.","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_2_27_1","volume-title":"USENIX Security Symposium.","author":"Hiesgen Raphael","year":"2022","unstructured":"Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C Schmidt, and Matthias W\u00e4hlisch. 2022. Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. In USENIX Security Symposium."},{"key":"e_1_3_2_2_28_1","volume-title":"Paul.","author":"Karn Brian","year":"2019","unstructured":"Kantor, Brian and Karn, Phil and Claffy, kc. and Gilmore, John and Magnuski, Hank and Garbee, Bdale and Hansen, Skip and Horne, Bill and Ricketts, John and Traschewski, Jann and Vixie, Paul. 2019. AMPRNet. https:\/\/web.archive.org\/web\/20190719144558\/https:\/\/www.ampr.org\/amprnet\/. (2019)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131367"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Matthew Luckie Robert Beverly Ryan Koga Ken Keys Joshua A. Kroll and k claffy. 2019. Network Hygiene Incentives and Regulation: Deployment of Source Address Validation in the Internet.","DOI":"10.1145\/3319535.3354232"},{"key":"e_1_3_2_2_31_1","volume-title":"Amogh Dhamdhere, and Vasileios Giotsas.","author":"Luckie Matthew","year":"2013","unstructured":"Matthew Luckie, Bradley Huffaker, kc Claffy, Amogh Dhamdhere, and Vasileios Giotsas. 2013. AS Relationships, Customer Cones, and Validation. In ACM IMC."},{"key":"e_1_3_2_2_32_1","unstructured":"Maxmind GeoLite2. 2023. GeoIP2 and GeoLite City and Country Databases. https:\/\/www.maxmind.com. (2023)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Measurement Lab. (2023-04-24-2023-04-30). The M-Lab NDT Data Set. https:\/\/measurementlab.net\/tests\/ndt. ((2023-04-24-2023-04-30)).","DOI":"10.47440\/JAFE.2023.4405"},{"key":"e_1_3_2_2_34_1","volume-title":"ORION: Observatory for Cyber-Risk Insights and Outages of Networks. https:\/\/www.merit.edu\/initiatives\/orion-network-telescope\/.(2023).","author":"Network Merit","year":"2023","unstructured":"Merit Network, Inc. 2023. ORION: Observatory for Cyber-Risk Insights and Outages of Networks. https:\/\/www.merit.edu\/initiatives\/orion-network-telescope\/.(2023)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"e_1_3_2_2_36_1","first-page":"46","article-title":"The Spread of the Witty Worm","volume":"2","author":"Moore David","year":"2005","unstructured":"David Moore and Colleen Shannon. 2005. The Spread of the Witty Worm. IEEE Security and Privacy 2, 4 (2005), 46--50.","journal-title":"IEEE Security and Privacy"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA400003"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"George Nomikos Vasileios Kotronis Pavlos Sermpezis Petros Gigis Lefteris Manassakis Christoph Dietzel Stavros Konstantaras Xenofontas Dimitropoulos and Vasileios Giotsas. 2018. O Peer Where Art Thou? Uncovering Remote Peering Interconnections at IXPs. In ACM IMC.","DOI":"10.1145\/3278532.3278556"},{"key":"e_1_3_2_2_40_1","volume-title":"Know Your Enemy: Honeynets. (Nov","author":"Project Honeynet","year":"2002","unstructured":"Honeynet Project. 2002. Know Your Enemy: Honeynets. (Nov 2002). http:\/\/projects.honeynet.org\/papers\/honeynet\/."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486017"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17172-2_11"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766330.2766335"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355595"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Philipp Richter and Arthur Berger. 2019. Scanning the Scanners: Sensing the Internet from a Massively Sistributed Network Telescope. In ACM IMC.","DOI":"10.1145\/3355369.3355595"},{"key":"e_1_3_2_2_46_1","volume-title":"The Top Speed of Flash Worms. In ACM Workshop on Rapid Malcode (WORM).","author":"Staniford Stuart","year":"2004","unstructured":"Stuart Staniford, David Moore, Vern Paxson, and Nicholas Weaver. 2004. The Top Speed of Flash Worms. In ACM Workshop on Rapid Malcode (WORM)."},{"key":"e_1_3_2_2_47_1","unstructured":"USC\/LANDER project. 2023. Internet Addresses IPv4 Response History Dataset. https:\/\/ant.isi.edu\/datasets\/index.html. (2023)."},{"key":"e_1_3_2_2_48_1","volume-title":"Recent Advances in Intrusion Detection","author":"Yegneswaran Vinod","unstructured":"Vinod Yegneswaran, Paul Barford, and Dave Plonka. 2004. On the Design and Use of Internet Sinks for Network Abuse Monitoring. In Recent Advances in Intrusion Detection, Erland Jonsson, Alfonso Valdes, and Magnus Almgren (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 146--165."}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","location":"Montreal QC Canada","acronym":"IMC '23","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624831","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624831","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:18:41Z","timestamp":1755868721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624831"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":48,"alternative-id":["10.1145\/3618257.3624831","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624831","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}