{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:32:11Z","timestamp":1773117131143,"version":"3.50.1"},"reference-count":71,"publisher":"Association for Computing Machinery (ACM)","issue":"CoNEXT2","license":[{"start":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T00:00:00Z","timestamp":1718236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"German Federal Ministry of Education and Research","award":["16KIS1370"],"award-info":[{"award-number":["16KIS1370"]}]},{"name":"CNRS"},{"name":"Max-Planck-Gesellschaft"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Netw."],"published-print":{"date-parts":[[2024,6,13]]},"abstract":"<jats:p>Today's Internet is dominated by a small number of companies which are responsible for a large fraction of Internet traffic. These so called \"hypergiants\" make use of off-nets to deploy parts of their infrastructure in ISP networks. Off-nets ensure that clients from these ISPs get lower latencies and the ISP needs to send less traffic to its upstream providers. They have been relatively well studied in the IPv4 Internet, although their footprint in IPv6 remains unclear.<\/jats:p>\n          <jats:p>In this paper, we take a first look at the IPv6 hypergiant infrastructure. We perform a first-of-its-kind study of IPv6 off-nets for 14 hypergiants and compare their deployment to IPv4. We find IPv6 off-nets in 2k ASes, compared to the more than 6k off-net ASes for IPv4. Moreover, the majority of IPv6 off-nets deployments are seen in ASes which already deploy IPv4 off-nets. Interestingly, we also see some hypergiants such as Disney and Hulu not making use of any IPv6 off-nets at all. We also uncover the phenomenon of cross-hypergiant deployments, where one hypergiant deploys its infrastructure in another hypergiant's network. Finally, we use latency measurements to compare IPv6 vs. IPv4 latency to off-net prefixes within off-net ASes and find similar results for both protocol versions. We make all our code and data available to encourage replicability.<\/jats:p>","DOI":"10.1145\/3656300","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T09:54:11Z","timestamp":1718272451000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A First Look At IPv6 Hypergiant Infrastructure"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8123-4496","authenticated-orcid":false,"given":"Fahad","family":"Hilal","sequence":"first","affiliation":[{"name":"Max Planck Institute for Informatics, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9375-3113","authenticated-orcid":false,"given":"Patrick","family":"Sattler","sequence":"additional","affiliation":[{"name":"Technical University of Munich (TUM), Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6168-7887","authenticated-orcid":false,"given":"Kevin","family":"Vermeulen","sequence":"additional","affiliation":[{"name":"LAAS-CNRS, Universit\u00e9 de Toulouse, CNRS, Toulouse, France, Toulouse, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3425-9331","authenticated-orcid":false,"given":"Oliver","family":"Gasser","sequence":"additional","affiliation":[{"name":"IPinfo &amp; Max Planck Institute for Informatics, Seattle, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n. d.]. Oregon Route Views. http:\/\/routeviews.org\/."},{"key":"e_1_2_1_2_1","unstructured":"2024. Introduction to GGC. https:\/\/support.google.com\/interconnect\/answer\/9058809."},{"key":"e_1_2_1_3_1","unstructured":"2024. RPKI validator. https:\/\/rpki-validator.ripe.net."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195531"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_19"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355586"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624840"},{"key":"e_1_2_1_8_1","unstructured":"APNIC. 2023. IPv6 BGP table. https:\/\/bgp.potaroo.net\/v6\/as2.0\/index.html"},{"key":"e_1_2_1_9_1","volume-title":"3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13)","author":"Aryan Simurgh","year":"2013","unstructured":"Simurgh Aryan, Homa Aryan, and J Alex Halderman. 2013. Internet censorship in Iran: A first look. In 3rd USENIX Workshop on Free and Open Communications on the Internet (FOCI 13)."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3155055.3155057"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145323"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2895165"},{"key":"e_1_2_1_13_1","unstructured":"bgp.tools. 2023. bgp.tools. https:\/\/bgp.tools\/"},{"key":"e_1_2_1_14_1","unstructured":"Blechschmidt S. 2024. MassDNS. https:\/\/github.com\/blechschmidt\/massdns"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504754"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504754"},{"key":"e_1_2_1_17_1","unstructured":"Chrome User Experience Report contributors. 2023. Chrome User Experience Report. https:\/\/developer.chrome.com\/ docs\/crux\/"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Carlo Contavalli Wilmer van der Gaast David C Lawrence and Warren \"Ace\" Kumari. 2016. Client Subnet in DNS Queries. RFC 7871. https:\/\/doi.org\/10.17487\/RFC7871","DOI":"10.17487\/RFC7871"},{"key":"e_1_2_1_19_1","volume-title":"Disney Stock","author":"Daily Investor's Business","unstructured":"Investor's Business Daily. 2023. Disney Stock, Akamai Stock: Streaming Video Key For Both. https:\/\/www.investors. com\/news\/technology\/disney-stock-akamai-stock-video-streaming\/"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155367"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800132"},{"key":"e_1_2_1_22_1","volume-title":"ACM Conference on Computer and Communications Security (CCS).","author":"Durumeric Z.","unstructured":"Z. Durumeric, D. Adrian, A. Mirian, M.Bailey, and J. A. Halderman. 2015. A Search Engine Backed by Internet-Wide Scanning. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_2_1_23_1","volume-title":"ZMap: Fast Internet-wide Scanning and Its Security Applications. In 22nd USENIX Security Symposium (USENIX Security 13)","author":"Durumeric Zakir","year":"2013","unstructured":"Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast Internet-wide Scanning and Its Security Applications. In 22nd USENIX Security Symposium (USENIX Security 13). 605--620."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994636"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Hernan Galperin. 2013. Connectivity in Latin America and the Caribbean: The role of internet exchange points. (2013).","DOI":"10.2139\/ssrn.2341758"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_2_1_27_1","volume-title":"Traffic Monitoring and Analysis Workshop","author":"Gasser Oliver","year":"2016","unstructured":"Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle. 2016. Scanning the IPv6 Internet: Towards a Comprehensive Hitlist. In Traffic Monitoring and Analysis Workshop 2016."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131380"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472928"},{"key":"e_1_2_1_30_1","unstructured":"Google. 2024. Requirements for deploying embedded appliances. https:\/\/support.google.com\/interconnect\/answer\/ 9058809."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_26"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847969"},{"key":"e_1_2_1_33_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Hoang Nguyen Phong","year":"2021","unstructured":"Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, and Michalis Polychronakis. 2021. How Great is the Great Firewall? Measuring China's {DNS} Censorship. In 30th USENIX Security Symposium (USENIX Security 21). 3381--3398."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579334"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561434"},{"key":"e_1_2_1_36_1","volume-title":"The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Available at SSRN 2445102","author":"Kenneally Erin","year":"2012","unstructured":"Erin Kenneally and David Dittrich. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Available at SSRN 2445102 (2012)."},{"key":"e_1_2_1_37_1","unstructured":"APNIC Labs. 2023. APNIC Labs AS Popularity Statistics. https:\/\/stats.labs.apnic.net\/aspop\/"},{"key":"e_1_2_1_38_1","unstructured":"APNIC Labs. 2023. APNIC Labs IPv6 Popularity Statistics. https:\/\/stats.labs.apnic.net\/v6pop\/"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504735"},{"key":"e_1_2_1_40_1","unstructured":"MaxMind. 2023. MaxMind GeoIP Database Documentation. https:\/\/dev.maxmind.com\/geoip\/docs\/databases\/city-andcountry"},{"key":"e_1_2_1_41_1","unstructured":"Netflix. 2024. CAIDA AS2Org dataset. https:\/\/openconnect.zendesk.com\/hc\/en-us\/articles\/360034538352-Requirements-for-deploying-embedded-appliances."},{"key":"e_1_2_1_42_1","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)","author":"Niaki Arian Akhavan","year":"2020","unstructured":"Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr, et al. 2020. Triplet Censors: Demystifying Great {Firewall's} {DNS} Censorship Behavior. In 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20)."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079322"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"key":"e_1_2_1_45_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Pearce Paul","year":"2017","unstructured":"Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, NickWeaver, and Vern Paxson. 2017. Global measurement of {DNS} manipulation. In 26th USENIX Security Symposium (USENIX Security 17). 307--323."},{"key":"e_1_2_1_46_1","unstructured":"PeeringDB. 2023. PeeringDB. https:\/\/www.peeringdb.com\/"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971162.1971171"},{"key":"e_1_2_1_48_1","unstructured":"Rapid7. 2023. Open Data. https:\/\/opendata.rapid7.com\/"},{"key":"e_1_2_1_49_1","unstructured":"RIPE NCC. 2023. RIPE Atlas Built-in Measurements Documentation. https:\/\/atlas.ripe.net\/docs\/built-in-measurements\/"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604829"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561431"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561426"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3629146"},{"key":"e_1_2_1_54_1","volume-title":"HLOC: Hints-based Geolocation Leveraging Multiple Measurement Frameworks. In Network Traffic Measurement and Analysis Conference","author":"Scheitle Quirin","year":"2017","unstructured":"Quirin Scheitle, Oliver Gasser, Patrick Sattler, and Georg Carle. 2017. HLOC: Hints-based Geolocation Leveraging Multiple Measurement Frameworks. In Network Traffic Measurement and Analysis Conference 2017."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098853"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405881"},{"key":"e_1_2_1_57_1","unstructured":"Internet Society. 2023. Four of theWorld's Top 10 Populous Countries Driving IPv6 Adoption. https:\/\/pulse.internetsociety. org\/blog\/four-of-the-worlds-top-10-populous-countries-driving-ipv6-adoption"},{"key":"e_1_2_1_58_1","unstructured":"Steve Song. 2023. Cloud CDN Cache. https:\/\/github.com\/stevesong\/cloud_cdn_cache."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA58422.2023.10199073"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504767"},{"key":"e_1_2_1_61_1","unstructured":"The ZMap Project. 2023. ZGrab 2.0. https:\/\/github.com\/zmap\/zgrab2"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2016.7490628"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0073"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628213"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2323299"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJNVO.2019.103435"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098854"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561421"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487826"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561440"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487853"}],"container-title":["Proceedings of the ACM on Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656300","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T20:13:19Z","timestamp":1755979999000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,13]]},"references-count":71,"journal-issue":{"issue":"CoNEXT2","published-print":{"date-parts":[[2024,6,13]]}},"alternative-id":["10.1145\/3656300"],"URL":"https:\/\/doi.org\/10.1145\/3656300","relation":{},"ISSN":["2834-5509"],"issn-type":[{"value":"2834-5509","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,13]]},"assertion":[{"value":"2024-06-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}