Detecting third-party addresses in traceroute traces with IP timestamp option

15Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Traceroute is one of the most famous and widely adopted diagnostic tool for computer networks. Although traceroute is often used to infer links between Autonomous Systems (ASes), the presence of the so-called third-party (TP) addresses may induce the inference of false AS-level links. In this paper, we propose a novel active probing technique based on the IP timestamp option able to identify TP addresses. For evaluating both the applicability and the utility of the proposed technique, we perform a large-scale measurement campaign targeting - from multiple vantage points - more than 327K destinations belonging to about 14K ASes. The results show how TP addresses are very common and affect about 17% of AS-level links extracted from traceroute traces. Compared to a previously proposed heuristic method, our technique allows to identify many more TP addresses and to re-interpret part of its results. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Marchetta, P., De Donato, W., & Pescapé, A. (2013). Detecting third-party addresses in traceroute traces with IP timestamp option. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7799 LNCS, pp. 21–30). Springer Verlag. https://doi.org/10.1007/978-3-642-36516-4_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free