Detecting Third-Party Addresses in Traceroute Traces with IP Timestamp Option

  • Pietro Marchetta
  • Walter de Donato
  • Antonio Pescapé
Conference paper

DOI: 10.1007/978-3-642-36516-4_3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7799)
Cite this paper as:
Marchetta P., de Donato W., Pescapé A. (2013) Detecting Third-Party Addresses in Traceroute Traces with IP Timestamp Option. In: Roughan M., Chang R. (eds) Passive and Active Measurement. PAM 2013. Lecture Notes in Computer Science, vol 7799. Springer, Berlin, Heidelberg

Abstract

Traceroute is one of the most famous and widely adopted diagnostic tool for computer networks. Although traceroute is often used to infer links between Autonomous Systems (ASes), the presence of the so-called third-party (TP) addresses may induce the inference of false AS-level links. In this paper, we propose a novel active probing technique based on the IP timestamp option able to identify TP addresses. For evaluating both the applicability and the utility of the proposed technique, we perform a large-scale measurement campaign targeting – from multiple vantage points – more than 327K destinations belonging to about 14K ASes. The results show how TP addresses are very common and affect about 17% of AS-level links extracted from traceroute traces. Compared to a previously proposed heuristic method, our technique allows to identify many more TP addresses and to re-interpret part of its results.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Pietro Marchetta
    • 1
  • Walter de Donato
    • 1
  • Antonio Pescapé
    • 1
  1. 1.University of Napoli Federico IIItaly

Personalised recommendations