{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:57:52Z","timestamp":1760576272405,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","funder":[{"name":"Natural Science Foundation of China","award":["62072269"],"award-info":[{"award-number":["62072269"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,28]]},"DOI":"10.1145\/3730567.3732924","type":"proceedings-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:39:24Z","timestamp":1760549964000},"page":"204-212","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["InternetSim: A Fast and Memory-Efficient Internet-Scale Inter-Domain Routing Simulator"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4084-1351","authenticated-orcid":false,"given":"Jiahong","family":"Lai","sequence":"first","affiliation":[{"name":"INSC, BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7825-4137","authenticated-orcid":false,"given":"Jessie Hui","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5850-7132","authenticated-orcid":false,"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"INSC, BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7342-693X","authenticated-orcid":false,"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China and Zhongguancun Laboratory, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the ACM SIGCOMM 2024 Conference. 794-812","author":"Alfroy Thomas","year":"2024","unstructured":"Thomas Alfroy, Thomas Holterbach, Thomas Krenc, KC Claffy, and Cristel Pelsser. 2024. The Next Generation of BGP Data Collection Platforms. In Proceedings of the ACM SIGCOMM 2024 Conference. 794-812."},{"key":"e_1_3_2_1_2_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Apostolaki Maria","year":"2019","unstructured":"Maria Apostolaki, Gian Marti, Jan M\u00fcller, and Laurent Vanbever. 2019. SABRE: Protecting bitcoin against routing attacks. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_3_1","volume-title":"2017 IEEE symposium on security and privacy (SP). IEEE, 375-392","author":"Apostolaki Maria","year":"2017","unstructured":"Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking bitcoin: Routing attacks on cryptocurrencies. In 2017 IEEE symposium on security and privacy (SP). IEEE, 375-392."},{"key":"e_1_3_2_1_4_1","volume-title":"PyCON Python Conference","author":"Beazley David","year":"2010","unstructured":"David Beazley. 2010. Understanding the python gil. In PyCON Python Conference. Atlanta, Georgia. 1-62."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MCSE.2010.118","article-title":"Cython: The best of both worlds","volume":"13","author":"Behnel Stefan","year":"2010","unstructured":"Stefan Behnel, Robert Bradshaw, Craig Citro, Lisandro Dalcin, Dag Sverre Seljebotn, and Kurt Smith. 2010. Cython: The best of both worlds. Computing in Science & Engineering, Vol. 13, 2 (2010), 31-39.","journal-title":"Computing in Science & Engineering"},{"key":"e_1_3_2_1_6_1","first-page":"2601","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Birge-Lee Henry","year":"2022","unstructured":"Henry Birge-Lee, Joel Wanner, Grace H Cimaszewski, Jonghoon Kwon, Liang Wang, Fran\u00e7ois Wirz, Prateek Mittal, Adrian Perrig, and Yixin Sun. 2022. Creating a secure underlay for the internet. In 31st USENIX Security Symposium (USENIX Security 22). 2601-2618."},{"key":"e_1_3_2_1_7_1","volume-title":"MongoDB: the definitive guide: powerful and scalable data storage","author":"Bradshaw Shannon","unstructured":"Shannon Bradshaw, Eoin Brazil, and Kristina Chodorow. 2019. MongoDB: the definitive guide: powerful and scalable data storage. O'Reilly Media."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/asrank.caida.org\/ Accessed","author":"CAIDA.","year":"2024","unstructured":"CAIDA. 2024. AS RANK. https:\/\/asrank.caida.org\/ Accessed: 2024."},{"key":"e_1_3_2_1_9_1","volume-title":"The CAIDA AS Relationships Dataset","author":"CAIDA.","year":"2024","unstructured":"CAIDA. 2024. The CAIDA AS Relationships Dataset, 2024. https:\/\/www.caida.org\/catalog\/datasets\/as-relationships\/"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2016 ACM SIGCOMM Conference. 342-355","author":"Cohen Avichai","year":"2016","unstructured":"Avichai Cohen, Yossi Gilad, Amir Herzberg, and Michael Schapira. 2016. Jumpstarting BGP security with path-end validation. In Proceedings of the 2016 ACM SIGCOMM Conference. 342-355."},{"key":"e_1_3_2_1_11_1","unstructured":"Cython. 2024. Cython GitHub repository. https:\/\/github.com\/cython\/cython"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1016\/j.comnet.2005.09.033","article-title":"Efficient large-scale BGP simulations","volume":"50","author":"Dimitropoulos Xenofontas A","year":"2006","unstructured":"Xenofontas A Dimitropoulos and George F Riley. 2006. Efficient large-scale BGP simulations. Computer Networks, Vol. 50, 12 (2006), 2013-2027.","journal-title":"Computer Networks"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 16th Cyber Security Experimentation and Test Workshop. 41-56","author":"Furuness Justin","year":"2023","unstructured":"Justin Furuness, Cameron Morris, Reynaldo Morillo, Amir Herzberg, and Bing Wang. 2023. Bgpy: The bgp python security simulator. In Proceedings of the 16th Cyber Security Experimentation and Test Workshop. 41-56."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/2096149.2096155","article-title":"Modeling on quicksand: Dealing with the scarcity of ground truth in interdomain routing data","volume":"42","author":"Gill Phillipa","year":"2012","unstructured":"Phillipa Gill, Michael Schapira, and Sharon Goldberg. 2012. Modeling on quicksand: Dealing with the scarcity of ground truth in interdomain routing data. ACM SIGCOMM Computer Communication Review, Vol. 42, 1 (2012), 40-46.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_15_1","first-page":"53","volume-title":"Proceedings Ninth International Conference on Network Protocols. ICNP","author":"Griffin Timothy G","year":"2001","unstructured":"Timothy G Griffin and Brian J Premore. 2001. An experimental analysis of BGP convergence time. In Proceedings Ninth International Conference on Network Protocols. ICNP 2001. IEEE, 53-61."},{"key":"e_1_3_2_1_16_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Hlavacek Tomas","year":"2020","unstructured":"Tomas Hlavacek, Italo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, and Haya Shulman. 2020. DISCO: Sidestepping RPKI's deployment barriers. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 18th ACM conference on Computer and communications security. 187-200","author":"Houmansadr Amir","year":"2011","unstructured":"Amir Houmansadr, Giang TK Nguyen, Matthew Caesar, and Nikita Borisov. 2011. Cirripede: Circumvention infrastructure using router redirection with plausible deniability. In Proceedings of the 18th ACM conference on Computer and communications security. 187-200."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Amir Houmansadr Edmund L Wong and Vitaly Shmatikov. 2014. No Direction Home: The True Cost of Routing Around Decoys.. In NDSS. Citeseer.","DOI":"10.14722\/ndss.2014.23292"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2006 IEEE International Conference on Network Protocols. IEEE, 290-299","author":"Karlin Josh","year":"2006","unstructured":"Josh Karlin, Stephanie Forrest, and Jennifer Rexford. 2006. Pretty good BGP: Improving BGP by cautiously adopting routes. In Proceedings of the 2006 IEEE International Conference on Network Protocols. IEEE, 290-299."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","first-page":"2908","DOI":"10.1016\/j.comnet.2008.06.012","article-title":"Autonomous security for autonomous systems","volume":"52","author":"Karlin Josh","year":"2008","unstructured":"Josh Karlin, Stephanie Forrest, and Jennifer Rexford. 2008. Autonomous security for autonomous systems. Computer Networks, Vol. 52, 15 (2008), 2908-2923.","journal-title":"Computer Networks"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","first-page":"107377","DOI":"10.1016\/j.comnet.2020.107377","article-title":"ProbInfer: Probability-based AS path inference from multigraph perspective","volume":"180","author":"Li Xionglve","year":"2020","unstructured":"Xionglve Li, Zhiping Cai, Bingnan Hou, Ning Liu, Fang Liu, and Jieren Cheng. 2020. ProbInfer: Probability-based AS path inference from multigraph perspective. Computer Networks, Vol. 180 (2020), 107377.","journal-title":"Computer Networks"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 2024 ACM on Internet Measurement Conference. 314-327","author":"Liu Yunhao","year":"2024","unstructured":"Yunhao Liu, Tiaohao Wu, Jessie Hui Wang, Jilong Wang, and Shuying Zhuang. 2024. Collecting Self-reported Semantics of BGP Communities and Investigating Their Consistency with Real-world Usage. In Proceedings of the 2024 ACM on Internet Measurement Conference. 314-327."},{"key":"e_1_3_2_1_23_1","first-page":"137","volume-title":"NSDI","volume":"9","author":"Madhyastha Harsha V","year":"2009","unstructured":"Harsha V Madhyastha, Ethan Katz-Bassett, Thomas E Anderson, Arvind Krishnamurthy, and Arun Venkataramani. 2009. iPlane Nano: Path Prediction for Peer-to-Peer Applications.. In NSDI, Vol. 9. 137-152."},{"key":"e_1_3_2_1_24_1","unstructured":"Merit Network Inc. 2024. The Internet Routing Registry - RADb. https:\/\/www.radb.net\/"},{"key":"e_1_3_2_1_25_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Morillo Reynaldo","year":"2021","unstructured":"Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, and Bing Wang. 2021. ROV: Improved Deployable Defense against BGP Hijacking.. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1151659.1159937","article-title":"Building an AS-topology model that captures route diversity","volume":"36","author":"M\u00fchlbauer Wolfgang","year":"2006","unstructured":"Wolfgang M\u00fchlbauer, Anja Feldmann, Olaf Maennel, Matthew Roughan, and Steve Uhlig. 2006. Building an AS-topology model that captures route diversity. ACM SIGCOMM Computer Communication Review, Vol. 36, 4 (2006), 195-206.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1727-1738","author":"Nasr Milad","year":"2016","unstructured":"Milad Nasr and Amir Houmansadr. 2016. Game of decoys: Optimal decoy routing through game theory. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1727-1738."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2037-2052","author":"Nasr Milad","year":"2017","unstructured":"Milad Nasr, Hadi Zolfaghari, and Amir Houmansadr. 2017. The waterfall of liberty: Decoy routing circumvention that resists routing attacks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2037-2052."},{"key":"e_1_3_2_1_29_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Nithyanand Rishab","year":"2016","unstructured":"Rishab Nithyanand, Oleksii Starov, Adva Zair, Phillipa Gill, and Michael Schapira. 2016. Measuring and mitigating AS-level adversaries against Tor. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_30_1","unstructured":"Gregory Popovitch. 2024. The Parallel Hashmap C library. https:\/\/github.com\/greg7mdp\/parallel-hashmap"},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Cam04-4: As path inference by exploiting known as paths. In IEEE Globecom 2006","author":"Qiu Jian","year":"2006","unstructured":"Jian Qiu and Lixin Gao. 2006. Cam04-4: As path inference by exploiting known as paths. In IEEE Globecom 2006. IEEE, 1-5.","journal-title":"IEEE"},{"key":"e_1_3_2_1_32_1","volume-title":"Modeling the routing of an autonomous system with C-BGP","author":"Quoitin Bruno","year":"2005","unstructured":"Bruno Quoitin and Steve Uhlig. 2005. Modeling the routing of an autonomous system with C-BGP. IEEE network, Vol. 19, 6 (2005), 12-19."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 2012 ACM conference on Computer and communications security. 85-96","author":"Schuchard Max","year":"2012","unstructured":"Max Schuchard, John Geddes, Christopher Thompson, and Nicholas Hopper. 2012. Routing around decoys. In Proceedings of the 2012 ACM conference on Computer and communications security. 85-96."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3460090","article-title":"PredictRoute: A network path prediction toolkit","volume":"5","author":"Singh Rachee","year":"2021","unstructured":"Rachee Singh, David Tench, Phillipa Gill, and Andrew McGregor. 2021. PredictRoute: A network path prediction toolkit. Proceedings of the ACM on Measurement and Analysis of Computing Systems, Vol. 5, 2 (2021), 1-24.","journal-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems"},{"key":"e_1_3_2_1_35_1","volume-title":"2018 IEEE Symposium on Security and Privacy (SP). IEEE, 599-617","author":"Smith Jared M","year":"2018","unstructured":"Jared M Smith and Max Schuchard. 2018. Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 599-617."},{"key":"e_1_3_2_1_36_1","volume-title":"2015 IFIP Networking Conference (IFIP Networking). IEEE, 1-9.","author":"Tao Narisu","year":"2015","unstructured":"Narisu Tao, Xu Chen, and Xiaoming Fu. 2015. AS path inference: From complex network perspective. In 2015 IFIP Networking Conference (IFIP Networking). IEEE, 1-9."},{"key":"e_1_3_2_1_37_1","volume-title":"2020 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 894-909","author":"Tran Muoi","year":"2020","unstructured":"Muoi Tran, Inho Choi, Gi Jun Moon, Anh V Vu, and Min Suk Kang. 2020. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 894-909."},{"key":"e_1_3_2_1_38_1","first-page":"1253","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Tran Muoi","year":"2021","unstructured":"Muoi Tran, Akshaye Shenoi, and Min Suk Kang. 2021. On the peering against attacks in bitcoin. In 30th USENIX Security Symposium (USENIX Security 21). 1253-1270."},{"key":"e_1_3_2_1_39_1","volume-title":"19th IEEE International Parallel and Distributed Processing Symposium. IEEE, 8-pp.","author":"Tyan Hung-Ying","year":"2005","unstructured":"Hung-Ying Tyan, Ahmed Sobeih, and Jennifer C Hou. 2005. Towards composable and extensible network simulation. In 19th IEEE International Parallel and Distributed Processing Symposium. IEEE, 8-pp."},{"key":"e_1_3_2_1_40_1","volume-title":"2008 11th IEEE International Conference on Communication Technology. IEEE, 546-549","author":"Wenhua Wang","year":"2008","unstructured":"Wang Wenhua, Shen Qingguo, and Zhong Qin. 2008. On the relationship between BGP convergence delay and network topology. In 2008 11th IEEE International Conference on Communication Technology. IEEE, 546-549."},{"key":"e_1_3_2_1_41_1","volume-title":"2009 XXII International Symposium on Information, Communication and Automation Technologies. IEEE, 1-7.","author":"Wenhua Wang","year":"2009","unstructured":"Wang Wenhua, Shen Qinguo, Song Yu, and Han Chunyong. 2009. New mrai setup mechanism for enhancing bgp route convergence. In 2009 XXII International Symposium on Information, Communication and Automation Technologies. IEEE, 1-7."},{"key":"e_1_3_2_1_42_1","volume-title":"International Conference on Passive and Active Network Measurement. Springer, 216-244","author":"Wu Tianhao","year":"2022","unstructured":"Tianhao Wu, Jessie Hui Wang, Jilong Wang, and Shuying Zhuang. 2022. Routeinfer: Inferring interdomain paths by capturing ISP routing behavior diversity and generality. In International Conference on Passive and Active Network Measurement. Springer, 216-244."},{"key":"e_1_3_2_1_43_1","volume-title":"Workshop on Quality of Service Routing. Springer, 257-267","author":"Yannuzzi Marcelo","year":"2004","unstructured":"Marcelo Yannuzzi, Alexandre Fonte, Xavier Masip-Bruin, Edmundo Monteiro, Sergi S\u00e0nchez-L\u00f3pez, Marilia Curado, and Jordi Domingo-Pascual. 2004. A proposal for inter-domain QoS Routing based on distributed overlay entities and QBGP. In Workshop on Quality of Service Routing. Springer, 257-267."},{"key":"e_1_3_2_1_44_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Yossi Gilad","year":"2017","unstructured":"Gilad Yossi, Cohen Avichai, Herzberg Amir, Schapira Michael, and Schulmann Haya. 2017. Are we there yet? On RPKI's deployment and security. In Network and Distributed System Security Symposium (NDSS)."}],"event":{"name":"IMC '25:ACM Internet Measurement Conference","location":"Madison WI USA","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX"]},"container-title":["Proceedings of the 2025 ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3730567.3732924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:40:45Z","timestamp":1760550045000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3730567.3732924"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"references-count":44,"alternative-id":["10.1145\/3730567.3732924","10.1145\/3730567"],"URL":"https:\/\/doi.org\/10.1145\/3730567.3732924","relation":{},"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"2025-10-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}