Detecting Third-party Addresses in Traceroute IP Paths

被引:0
|
作者
Marchetta, Pietro [1 ]
de Donato, Walter [1 ]
Pescape, Antonio [1 ]
机构
[1] Univ Naples Federico II, Naples, Italy
关键词
Measurement; Traceroute; Internet topology; AS-level path;
D O I
10.1145/2377677.2377705
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traceroute is probably the most famous computer networks diagnostic tool, widely adopted for both performance troubleshooting and research. Unfortunately, traceroute is not free of inaccuracies. In this poster, we present our ongoing work to address the inaccuracy caused by third-party addresses We discuss the impact of third-party addresses on traceroute applications and present a novel active probing technique able to identify such addresses in traceroute traces. Filially, we detail preliminary results suggesting how this phenomenon has been largely underestimated.
引用
收藏
页码:109 / 110
页数:2
相关论文
共 50 条
  • [21] THIRD-PARTY PROGRAMS
    BRYAN, RC
    JOURNAL OF THE AMERICAN PHARMACEUTICAL ASSOCIATION, 1971, NS11 (06): : 311 - &
  • [22] THIRD-PARTY REIMBURSEMENT
    KURZMAN, PA
    SOCIAL WORK, 1973, 18 (06) : 11 - 22
  • [23] Third-party Relationships and Third-party Protection in the European Property Law Regulations
    Mankowski, Peter
    RABELS ZEITSCHRIFT FUR AUSLANDISCHES UND INTERNATIONALES PRIVATRECHT, 2021, 85 (03): : 681 - 688
  • [24] Detecting Malicious Modifications of Data in Third-Party Intellectual Property Cores
    Rajendran, Jeyavijayan
    Vedula, Vivekananda
    Karri, Ramesh
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [25] Third-party purchase: An empirical study of third-party logistics providers in China
    Shi, Yangyan
    Zhang, Abraham
    Arthanari, Tiru
    Liu, Yanping
    Cheng, T. C. E.
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2016, 171 : 189 - 200
  • [26] Third-party purchase: an empirical study of Chinese third-party logistics users
    Shi, Yangyan
    Zhang, Abraham
    Arthanari, Tiru
    Liu, Yanping
    INTERNATIONAL JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT, 2016, 36 (03) : 286 - 307
  • [27] UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware
    Zhao, Binbin
    Ji, Shouling
    Zhang, Xuhong
    Tian, Yuan
    Wang, Qinying
    Pu, Yuwen
    Lyu, Chenyang
    Beyah, Raheem
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 3421 - 3438
  • [28] Detecting Third-Party Libraries in Android Applications with High Precision and Recall
    Zhang, Yuan
    Dai, Jiarun
    Zhang, Xiaohan
    Huang, Sirong
    Yang, Zhemin
    Yang, Min
    Chen, Hao
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2018), 2018, : 141 - 152
  • [29] Demo: Detecting Third-Party Library Problems with Combined Program Analysis
    Ntousakis, Grigoris
    Ioannidis, Sotiris
    Vasilakis, Nikos
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2429 - 2431
  • [30] LibDB: An Effective and Efficient Framework for Detecting Third-Party Libraries in Binaries
    Tang, Wei
    Wang, Yanlin
    Zhang, Hongyu
    Han, Shi
    Luo, Ping
    Zhang, Dongmei
    2022 MINING SOFTWARE REPOSITORIES CONFERENCE (MSR 2022), 2022, : 423 - 434