Proceedings of the 2016 Internet Measurement Conference 2016
DOI: 10.1145/2987443.2987479
|View full text |Cite
|
Sign up to set email alerts
|

Yarrp'ing the Internet

Abstract: Obtaining a "snapshot" of the Internet topology remains an elusive task. Existing active topology discovery techniques and production systems require significant probing timetime during which the underlying network may change or experience short-lived dynamics. In this work, we consider how active probing can gather the Internet topology in minutes rather than days. Conventional approaches to active topology mapping face two primary speed and scale impediments: i) per-trace state maintenance; and ii) a low-deg… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Internet Control Message Protocol (ICMP) [60], [12] is commonly used in troubleshooting [24], topology discovery [5], [7], [36], [74], and network management [10], [70]. Wellknown tools like ping, traceroute, and their variations are all mainly based on ICMP.…”
Section: A Icmp Rate Limitingmentioning
confidence: 99%
See 1 more Smart Citation
“…Internet Control Message Protocol (ICMP) [60], [12] is commonly used in troubleshooting [24], topology discovery [5], [7], [36], [74], and network management [10], [70]. Wellknown tools like ping, traceroute, and their variations are all mainly based on ICMP.…”
Section: A Icmp Rate Limitingmentioning
confidence: 99%
“…These peripheries are actually the remote "vantage points" (RVPs) that will be used in the subsequent measurements. To collect the data pairs, we implement a stateless scanner like many existing high-speed probers [16], [5], [36]. In consideration of the large address space of IPv6 networks, we cannot perform an exhaustive scan.…”
Section: "Vantage Point" Discoverymentioning
confidence: 99%
“…The ARK probing platform, with its extensive deployment of probing sources in over 40 countries, has significantly expanded the coverage of network topology discovery, enhanced data quality and magnitude, and provided valuable resources for researching global Internet structures. To further accelerate network-wide probing, Beverly [25] adopted and improved the stateless asynchronous packettransmission mechanism introduced by Durumeric et al [26]. This approach established independent and parallel probing and response threads, thereby substantially increasing the scanning efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…Internet-wide scanning allows researchers and network operators to understand how the Internet works in practice, and has been used to study network topology [16,38], operator decisions [20,28] and security vulnerabilities [15,17]. Internet-wide scanning works by initiating network connections with services on a set of given ports.…”
Section: Introductionmentioning
confidence: 99%