Artifacts in traceroute measurement output can lead to false inferences of AS-level links and paths when used to deduce AS topology. One traceroute artifact is caused by routers that respond to traceroute probes with a source address not in the ... an off-path address. The most well-known traceroute artifact, the third-party address, is caused by ... a technique to detect off-path addresses in traceroute paths [14]. Their technique assumed that a router IP address reported in a traceroute path towards a destination was off-path if, ...
Tópico(s): Network Packet Processing and Optimization
2014 - Springer Science+Business Media | Lecture notes in computer science
Fabien Viger, Brice Augustin, Xavier Cuvellier, Clémence Magnien, Matthieu Latapy, Timur Friedman, Renata Teixeira,
Traceroute is widely used, from the diagnosis of network problems to the assemblage of internet maps. Unfortunately, there are a number of problems with traceroute methodology, which lead to the inference of erroneous ... paper studies particular structures arising in nearly all traceroute measurements. We characterize them as "loops", "cycles", and " ... internet topology. We provide a new publicly available traceroute, called Paris traceroute, which, by controlling the packet header contents, provides ... single source tracing towards multiple destinations, and Paris traceroute allowed us to show that many of the ...
Tópico(s): Network Security and Intrusion Detection
2007 - Elsevier BV | Computer Networks
Matthew Luckie, Amogh Dhamdhere, kc claffy, David Murrell,
Data collected using traceroute-based algorithms underpins research into the Internet's router-level topology, though it is possible to infer false links ... from a given source to destination, and classic traceroute, which varies the UDP destination port number or ... to infer if a measurement artifact of classic traceroute induces a false router-level link. This technique ... links when macroscopic topology is inferred using classic traceroute. The effect of false links on ISP topology ... tier-1 ISP's routers derived from classic traceroute were inflated by a median factor of 2. ...
Tópico(s): Network Security and Intrusion Detection
2011 - Association for Computing Machinery | ACM SIGCOMM Computer Communication Review
Yu Zhang, Ricardo Oliveira, Yangyang Wang, Shen Su, Baobao Zhang, Jun Bi, Hongli Zhang, Lixia Zhang,
Although traceroute has the potential to discover AS links that are invisible to existing BGP monitors, it is well ... systematic framework to quantify the potential errors of traceroute measurement in AS-level topology inference. In comparing traceroute-derived AS paths with BGP AS paths, we ... works regarding the major cause of errors in traceroute measurement. With the approximate ground truth of the ... inside, we identify the inaccuracy of publicly available traceroute-derived topology datasets and find that between 8% ...
Tópico(s): Peroxisome Proliferator-Activated Receptors
2011 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications
Massimo Candela, Marco Di Bartolomeo, Giuseppe Di Battista, Claudio Squarcella,
... system, called TPlay, for the visualization of the traceroutes performed by the Internet probes deployed by active measurement projects. These traceroutes are continuously executed towards selected Internet targets. TPlay allows to look at traceroutes at different abstraction levels and to animate the evolution of traceroutes during a selected time interval. The system has been extensively tested on traceroutes performed by RIPE Atlas [22] Internet probes.
Tópico(s): Geographic Information Systems Studies
2013 - Springer Science+Business Media | Lecture notes in computer science
H. B. Acharya, Mohamed G. Gouda,
Traceroute is a widely used program for computing the topology of any network in the Internet. Using Traceroute, one starts from a node and chooses any other node in the network. Traceroute obtains the sequence of nodes that occur between ... routing tables in these nodes. Each use of Traceroute in a network produces a trace of nodes ... network. In every trace that is produced by Traceroute, each node occurs either by its unique identifier, ... trace set T that is produced by using Traceroute in network N, assuming that each edge in ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2009 - Springer Science+Business Media | Lecture notes in computer science
Dimitris Achlioptas, Aaron Clauset, David Kempe, Cristopher Moore,
... IP) addresses typically rely on indirect methods like traceroute to build what are approximately single-source, all- ... simulations, they observed that the degree distribution under traceroute sampling exhibits a power law even when the ... In this article, we study the bias of traceroute sampling mathematically and, for a very general class ... example applications of our machinery, we prove that traceroute sampling finds power-law degree distributions in both ...
Tópico(s): Graph theory and applications
2009 - Association for Computing Machinery | Journal of the ACM
Rob Sherwood, Adam Bender, Neil Spring,
... resolution"). Current topology discovery techniques use TTL-limited "traceroute" probes to discover links and use direct router ... but it is difficult to properly align with traceroute-based topologies because router RR implementations are under-standardized. Correctly aligned RR and traceroute topologies have fewer false links, include anonymous and ... system for aligning and cross-validating RR and traceroute topology data using observed engineering practices DisCarte uses ... constraint solving technique, to intelligently merge RR and traceroute data. We demonstrate that the resultant topology is ...
Tópico(s): Network Traffic and Congestion Control
2008 - Association for Computing Machinery | ACM SIGCOMM Computer Communication Review
Yu Zhang, Ricardo Oliveira, Hongli Zhang, Lixia Zhang,
Although traceroute has the potential to discover AS links that are invisible to existing BGP monitors, it is well ... IP2AS mapping for AS topology inference. In comparing traceroute-derived AS paths and BGP AS paths, we ... regarding the major cause of errors in converting traceroute paths to AS paths. Our results also show ... of AS adjacencies in two public repositories for traceroute-derived topology are false.
Tópico(s): IPv6, Mobility, Handover, Networks, Security
2010 - Springer Science+Business Media | Lecture notes in computer science
Joshua Juen, Aaron Johnson, Anupam Das, Nikita Borisov, Matthew Caesar,
... a measurement study by collecting 17.2 million traceroutes from Tor relays to destinations around the Internet. We compare the collected traceroute paths to predicted paths using state-of-the-art path inference techniques. We find that traceroutes present a very different picture, with the set of ASes seen in the traceroute path differing from the predicted path 80% of ... simulator to choose paths over a week, our traceroutes indicate a user has nearly a 100% chance ...
Tópico(s): Privacy-Preserving Technologies in Data
2015 - De Gruyter Open | Proceedings on Privacy Enhancing Technologies
Xing Jin, Wanqing Tu, S.-H. Gary Chan,
We consider using tools like traceroute to infer the underlay topology among a group of hosts. Traditional Max-Delta inference relies on a central server and is ... each host joins an overlay tree before conducting traceroute. A host then independently selects paths to traceroute and exchanges traceroute results with others through the overlay tree. As ... up a lookup table for routers to reduce traceroute size, and (c) conducting topology abstraction and reducing ...
Tópico(s): Network Traffic and Congestion Control
2008 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Parallel and Distributed Systems
... discuss scalable measurement and analysis of BGP and traceroute topology data, and practical applications of such data ... using BGP data to improve the interpretation of traceroute data, both for real-time diagnostics (e.g., AS traceroute) and for large-scale topology mapping; using both BGP and traceroute data to support detection and mapping infrastructure integrity, ...
Tópico(s): Network Traffic and Congestion Control
2012 - Association for Computing Machinery | ACM SIGCOMM Computer Communication Review
Pietro Marchetta, Walter de Donato, Antonio Pescapè,
Traceroute is one of the most famous and widely adopted diagnostic tool for computer networks. Although traceroute is often used to infer links between Autonomous ... about 17% of AS-level links extracted from traceroute traces. Compared to a previously proposed heuristic method, ...
Tópico(s): Software System Performance and Reliability
2013 - Springer Science+Business Media | Lecture notes in computer science
S. Branigan, Hal Burch, Bill Cheswick, F. Wojcik,
Traceroute has been a staple of network administration since the mid-1980s. This well-known utility traces ... a notice using one of their interface addresses. Traceroute records the addresses, which we can identify using the Domain Name System (DNS). Traceroute is an interactive tool that is not suitable ...
Tópico(s): Service-Oriented Architecture and Web Services
2001 - IEEE Computer Society | IEEE Internet Computing
Lixia Xie, Ying Ding, Hongyu Yang, Ze Hu,
... on the availability of the crucial links and traceroute flows. We consider the traceroute packet flows as time series with white Gaussian ... is proposed to detect the abnormal increase in traceroute packets which indicates the launch of LFA. Then ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2020 - Elsevier BV | Journal of Network and Computer Applications
Milena Janic, Fernando Kuipers, Xiaoming Zhou, Piet Van Mieghem,
Based on RIPE NCC traceroute measurement data, we attempt to model the Internet graph with the graph G1, which is the union of the most frequently occurring paths in the RIPE traceroute database. After analyzing the topological properties of this ... and comparing the simulated shortest paths with the traceroutes, no clear conclusions on the link weight structure ...
Tópico(s): Advanced Optical Network Technologies
2002 - Springer Science+Business Media | Lecture notes in computer science
Massimo Candela, Marco Di Bartolomeo, Giuseppe Di Battista, Claudio Squarcella,
... the Internet. Probes are systems that continuously perform traceroutes and other networking measurements (e.g., ping) towards ... present Radian, a tool that allows to visualize traceroute paths at different levels of detail and to ... also describe extensive tests of the tool using traceroutes performed by RIPE Atlas Internet probes.
Tópico(s): Peer-to-Peer Network Technologies
2017 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Visualization and Computer Graphics
We study active traceroute measurements from more than 1,000 vantage points towards a few targets over 24 hours or more. Our aim ... data that correspond to significant operational events. Because traceroute data is complex and noisy, little work in ... develop a measure for the differences between successive traceroute measurements, then we use this measure to cluster ...
Tópico(s): Anomaly Detection Techniques and Applications
2014 - Springer Science+Business Media | Lecture notes in computer science
Mattia Iodice, Massimo Candela, Giuseppe Di Battista,
... for tackling network issues. Looking at sequences of traceroutes in such data sets, it is common to ... novel algorithm for detecting periodicities in sequences of traceroutes. Then, we exploit the algorithm for analyzing the traceroutes produced by the RIPE Atlas, a popular public ... that: 1) a surprisingly large percentage of the traceroutes exhibit a periodic behavior; 2) a large number ...
Tópico(s): Network Packet Processing and Optimization
2019 - Institute of Electrical and Electronics Engineers | IEEE Access
Pietro Marchetta, Pascal Mérindol, Benoît Donnet, Antonio Pescapè, Jean‐Jacques Pansiot,
For a long time, traceroute measurements combined with alias resolution methods have been the sole way to collect Internet router level maps. Recently, a new ... advantages and drawbacks of probing approaches based on traceroute and mrinfo, we propose a hybrid discovery tool, ... Router Level of the INternet), mixing mrinfo and traceroute probes. Using a central server controlling a set ...
Tópico(s): Peer-to-Peer Network Technologies
2011 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications
H. B. Acharya, Mohamed G. Gouda,
... from publicly observable data. The standard method employs traceroute to obtain paths between nodes; next, a topology ... the observed paths occur in the graph. However, traceroute has the problem that some routers refuse to ... of network topology requires more powerful tools than traceroute.
Tópico(s): Network Traffic and Congestion Control
2011 - Springer Science+Business Media | Lecture notes in computer science
Milena Janic, Piet Van Mieghem,
... remarkably well. Furthermore, we examine the reliability of traceroute data and of traceroutes-based conclusions. We investigate the node degree distributions ... on the analysis of multicast trees based on traceroute data. Only few results have been available on ...
Tópico(s): Mobile Ad Hoc Networks
2005 - Wiley | International Journal of Communication Systems
Mehiar Dabbagh, Naoum Sayegh, Ayman Kayssi, Imad H. Elhajj, Ali Chehab,
Probing network devices using the Traceroute tool is a most popular network monitoring technique for troubleshooting and network mapping. Distributed scanning systems perform Traceroute periodically in order to detect routing anomalies. We ... the number of probes as compared to classical Traceroute that is launched periodically. This is an important ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2014 - Elsevier BV | Future Generation Computer Systems
... same router, is an important step in building traceroute-based Internet topology maps. Inaccuracies in alias resolution ...
Tópico(s): Internet Traffic Analysis and Secure E-voting
2009 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking
Venkata N. Padmanabhan, Daniel Simón,
... the central idea of which is a secure traceroute protocol that enables end hosts or routers to ...
Tópico(s): Network Security and Intrusion Detection
2003 - Association for Computing Machinery | ACM SIGCOMM Computer Communication Review
Yihua He, G. Siganos, Michalis Faloutsos, Srikanth V. Krishnamurthy,
... compare BGP routing tables, Internet routing registries, and traceroute data, while we extract significant new information from ... have been verified by either BGP tables or traceroute. Second, we identify properties of the new edges ...
Tópico(s): Caching and Content Delivery
2008 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking
Xing Jin, W.-P.K. Yiu, S.-H. Gary Chan, Yajun Wang,
We consider using traceroute-like end-to-end measurement to infer the underlay topology for a group of hosts. One major issue is ... without anonymous routers, traditionally full N(N-1) traceroutes are needed to determine the underlay topology. We ...
Tópico(s): Peer-to-Peer Network Technologies
2006 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications
Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat,
... sources most frequently used by the research community: traceroutes, BGP, and WHOIS. We discover that traceroute and BGP topologies are similar to one another ...
Tópico(s): Peer-to-Peer Network Technologies
2006 - Association for Computing Machinery | ACM SIGCOMM Computer Communication Review
Luca Dall’Asta, José Ignacio Alvarez-Hamelin, Alain Barrat, Alexei Vázquez, Alessandro Vespignani,
... from a limited set of sources by using traceroute-like probes. This methodology, akin to the merging ...
Tópico(s): Topological and Geometric Data Analysis
2006 - Elsevier BV | Theoretical Computer Science
... inferring end-to-end paths is to perform traceroute from sources to destinations. Unfortunately, traceroute requires the access to source machines and is ...
Tópico(s): Network Packet Processing and Optimization
2006 - Institute of Electrical and Electronics Engineers | Globecom