Proceedings of the Internet Measurement Conference 2018 2018
DOI: 10.1145/3278532.3278559
|View full text |Cite
|
Sign up to set email alerts
|

In the IP of the Beholder

Abstract: Existing methods for active topology discovery within the IPv6 Internet largely mirror those of IPv4. In light of the large and sparsely populated address space, in conjunction with aggressive ICMPv6 rate limiting by routers, this work develops a different approach to Internet-wide IPv6 topology mapping. We adopt randomized probing techniques in order to distribute probing load, minimize the effects of rate limiting, and probe at higher rates. Second, we extensively analyze the efficiency and efficacy of vario… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(11 citation statements)
references
References 46 publications
1
9
0
Order By: Relevance
“…One year later, Li et al [24] describe a similar approach, discovering more than 50 M last hop router addresses through tracerouting non-existent IPv6 addresses in known or suspected customer subnets of ISPs. Lastly, Beverly et al [25] presented their work focussing on IPv6 topology discovery. They develop and analyze strategies to collect new interfaces by efficient TTL-limited probing of target address sets, finding 1.3 M new router interfaces from their single vantage point.…”
Section: Related Workmentioning
confidence: 99%
“…One year later, Li et al [24] describe a similar approach, discovering more than 50 M last hop router addresses through tracerouting non-existent IPv6 addresses in known or suspected customer subnets of ISPs. Lastly, Beverly et al [25] presented their work focussing on IPv6 topology discovery. They develop and analyze strategies to collect new interfaces by efficient TTL-limited probing of target address sets, finding 1.3 M new router interfaces from their single vantage point.…”
Section: Related Workmentioning
confidence: 99%
“…Firstly, the arms of the multi-armed bandit are defined as the input of generic patterns from line 12 in Algorithm 3, which contains similar wildcard counts. Secondly, the reward function representing the feedback of each probing outcome is presented in formula (1), where R t (p) is the reward of choice pattern p in iteration t, S t (p) is the active address count, and A t (p) is the aliased coefficient defined in formula (2).…”
Section: Exploration and Exploitation Of Generic Patternmentioning
confidence: 99%
“…According to Google's statistics [1], the proportion of users accessing Google via IPv6 has consistently increased, reaching 45.17% in October 2023, approximately 3.7 times higher than that of five years ago. In the context of the ongoing rise in IPv6 deployment rate, there is substantial demand for IPv6 Internetscale network surveys provide a better understanding of the real-world dynamics of IPv6 networks, including network topology measurements [2], [3], geolocation [4]- [7], Internet services evaluation [8], [9], and security analysis [10]- [13]. However, unlike IPv4, due to the vast address space of the IPv6 network, it is infeasible to perform exhaustive scans of all addresses [14].…”
Section: Introductionmentioning
confidence: 99%
“…We build upon their approach, but exclusively use publicly available sources in order to make our work reproducible. Recently, Beverly et al analyze the IPv6 topology using large-scale traceroutes, leveraging Gasser et al's public hitlist among other sources [16].…”
Section: Previous Workmentioning
confidence: 99%