This page lists publications by non-CAIDA researchers using skitter data. We compiled this list in November 2004. If you have a publication based on the analysis of skitter data that is not included here, please email firstname.lastname@example.org and we will be happy to update our list.
Publications based on skitter data
Indexed by Topic (# of entries); 40 entries total
and modelling the AS-level Internet
S Zhou, RJ Mondragon
... and Communication, 2001.  Skitter, CAIDA’s topology measurement tool,
www.caida.org/tools/measurement/skitter/.  Y. Hyun ...
Proc. of HET-NETs’ 03,(arXive: cs. NI/0303030), 2003 - arxiv.org - arxiv.org - adsabs.harvard.edu
modeling the Internettopology
S Zhou, RJ Mondragon -
... into the basic mechanisms that could be responsible for the evolving topology of
complex ... in this research was collected as part of CAIDA’s Skitter initiative ...
Arxiv preprint cs.NI/0402011, 2004 - arxiv.org - arxiv.org - adsabs.harvard.edu
[PDF] Redundancy and Robustness of the AS-level Internettopologyand its models
S Zhou, RJ Mondragon
...topology,” Proc. of HET-NETs’03, (arXive:cs.NI/0303030), 2003.  The ITDK0204
data used in this research was collected as part of CAIDA’s Skitter...
Arxiv preprint cs.NI/0402026, 2004 - arxiv.org - arxiv.org - ieeexplore.ieee.org - adsabs.harvard.edu
Sampling biases in IP topology
A Lakhina, J Byers, M Crovella, P Xie
Page 1. Sampling Biases in IP Topology Measurements. ... This experimental setup aims
to model the prevalent methodology employed to discover the Internet topology. ...
IEEE INFOCOM, 2003 - ieeexplore.ieee.org - ieee-infocom.org - cs.bu.edu - cs-people.bu.edu
Comparison of topologies
the Emergence of Highly Variable Distributions in the Autonomous
M Fayed, P Krapivsky, JW Byers, M Crovella, D …
... maps produced by mapping routers from the Mercator  and Skitter  datasets ...
We conclude that, for topology generation, it is not necessary to incorporate ...
ACM SIGCOMM Computer Communication Review, 2003 - portal.acm.org - cs.bu.edu - cs-people.bu.edu
M Fayed, P Krapivsky, J Byers, M Crovella, D …
... solutions to empirical AS size distribution taken from Mercator and Skitter datasets,
and ... This abstraction provides an attractive target for Internet topology. ...
Technical Report BUCS-TR-2003-001, Boston University, … - cs-ftp.bu.edu - cs-people.bu.edu - cs.bu.edu
compare model of AS growth with data
the marginal utility of network topology
P Barford, A Bestavros, J Byers, M Crovella
... dataset for this study was collected (May 2000), the Skitter infrastructure consisted ...
random graphs) with idealized routing algorithms (such as use of shortest ...
ACM SIGCOMM Internet Measurement Workshop, 2001 - portal.acm.org - icir.org - aciri.org - cs.bu.edu
Analysis on the InternetTopology
... To achieve this study, we used the data from the Skitter network measurement platform ...
of route collection and also a mean to get a realistic topology of the ...
[PDF] Describing and Simulating Internet
J Leguay, M Latapy, T Friedman, K Salamatian
... The work in this paper is based upon a study of over seven million route traces produced
by CAIDA's skitter infrastructure. ...
Arxiv preprint cs.NI/0411051 v1 16, 2004 - arxiv.org
[PDF] Efficient Algorithms for Large ScaleTopologyDiscoveries
B Donnet, P Raoult, T Friedman, M Crovella
... There is a growing interest in discovery of internet topology... we show that standard
topology discovery methods (e.g., skitter) are quite inefficient...
Arxiv preprint cs.NI/0411013 v1 7, 2004 - arxiv.org
Internet Path Diagnosis
R Mahajan, N Spring, D Wetherall, T Anderson
Page 1. User-level Internet Path Diagnosis. Ratul Mahajan Neil Spring David
Wetherall Thomas Anderson. University of Washington. ABSTRACT ...
SOSP’03 - portal.acm.org - athos.rutgers.edu - eecs.umich.edu - bauhaus.cs.washington.edu
5000 IP addresses from our list
[PDF] Understanding BGP misconfiguration
R Mahajan, D Wetherall, T Anderson
... Over a three week period, we analyzed routing table advertisements from 23 vantage
points across the Internet backbone to detect incidents of misconfiguration. ...
Proc. ACM SIGCOMM - portal.acm.org - utdallas.edu - cs.rutgers.edu - cs.rice.edu
Properties of Internet Exchange Points and Their Impact on ASTopologyand
K Xu, Z Duan, ZL Zhang, J Chandrashekar
... This paper ex- plores the properties of IXPs and their impact on the AS topology
and AS business relations using Scriptroute and Skitter traceroute probes, BGP ...
springerlink.com - cs.fsu.edu
PATH DIVERSITY IN THE INTERNET
... Further, we developed a script to convert Skitter trace data into graphs showing
the topology of the network between a given source and destination. ...
UCSD, study of path diversity
impact of DHT routing geometry on resilience and
K Gummadi, R Gummadi, S Gribble, S Ratnasamy, S …
... We discuss this issue in Section 3. Another crucial question is how well DHTs can
adapt to the underlying Internet topology. Much research has been. 381. Page 2 ...
Proc. ACM SIGCOMM, 2003 - portal.acm.org - intel-research.net - liawww.epfl.ch - sics.se
[PDF]Geometric Exploration of the Landmark
L Tang, M Crovella
... While network structure is usually throught of as a property of topology, we take
a novel approach that leverages the notion of internet coordinates ...Skitter. ...
springerlink.com - cs.bu.edu - pam2004.org - pam2004.org
landmarks for the Internet
L Tang, M Crovella
... 3.4 Skitter The Skitter project  is a large-scale effort to continuously
monitor routing and connectivity across the Internet. ...
Proc. Internet Measurement Conference (IMC) - portal.acm.org - cs.bu.edu - icir.org - eecs.umich.edu
the Geographic Location of Internet
A Lakhina, JW Byers, M Crove lla, I Matta
... Our first topology dataset is a large collection of ICMP forward path (traceroute)
probes. This data was collected by Skitter, a measurement tool run on more ...
IEEE Journal on Selected Areas in Communications, 2003 - cs.wm.edu - cs.bu.edu - searchlore.org - fravia.com
in the South American Internet
F Junqueira, R Teixeira
... demands based on ow-level measurements on ingress links . Finally, some research
eorts focus on observing topology characteristics. ...skitter box maintained. ...
cs.ucsd.edu - cs.ucsd.edu
D Spence, T Harris
Page 1. Location-Based Resource Co-Allocation. David Spence and Tim Harris. University
of Cambridge Computer Laboratory firstname.lastname @cl.cam.ac.uk. Abstract ...
Peering for Multi-provider Content Delivery
L Amini, A Shaikh, H Schulzrinne
Page 1. Effective Peering for Multi-provider. Content Delivery Services.
Lisa Amini a,b , Anees Shaikh a , Henning Schulzrinne b a ...
Proceedings of IEEE Infocom, 2004 - ieee-infocom.org - research.ibm.com - cs.columbia.edu - research.ibm.com
Internet measurements (3)
Engineering the Internet
N Spring, D Wetherall, T Anderson
...Skitter  peri- odically collects the topology between IP addresses. ... database:
0. Topology (IP) Skitter  Traceroute to all destinations. 2 × S × A. ...
ACM SIGCOMM Computer Communication Review, 2004 - portal.acm.org - cs.washington.edu - nms.lcs.mit.edu - bauhaus.cs.washington.edu
Planning future research
ISP topologies with Rocketfuel
N Spring, R Mahajan, D Wetherall, T Anderson
...Topology influences the dy- namics of routing protocols , , the scalability
of multicast ... and links in our area of focus than a recent Skitter  dataset ...
ACM SIGCOMM, 2002 - portal.acm.org - cs.washington.edu - cs.sunysb.edu - cs.nps.navy.mil
compare skitter with their tool
Representative Internet Measurements
A Akella, S Seshan, A Shaikh
... nodes. Skitter : The Skitter project is a CAIDA project that aims to map
Internet paths and uncover topology changes. The testbed ...
nyman-workshop.org - www-2.cs.cmu.edu - cs.cmu.edu - cs.cmu.edu
evaluate & compare with other testbeds
A New Defense Mechanism against IP Spoofing and DDoS
... and Cheswick’s Internet Mapping Project [4, 16] and from the Skitter Project distributed ...
number of paths are selected, at random, from the topology file and ...
reports-archive.adm.cs.cmu.edu - cs.umn.edu - cs.jhu.edu - ece.cmu.edu
A Path Identification Mechanism to Defend against DDoS
... We chose n = 1 and n = 2 based on the Skitter  and Internet Map [14, 4] data
sets. It is possible that the real Internet topology may be substantially ...
cs.biu.ac.il - whatever.org.ar - ece.cmu.edu - eecs.umich.edu
Study on Marking Bit Size for Path Identification Method: Deploying the
Pi Filter at the End Host
... In our experiments, we use the Internet topology: CAIDA’s Skitter Map . This
topology was created by using a single host send traceroutes to the other ...
Ajou Univ., Korea – defense against DDoS
Packet Marking Approach to Defend against DDoS
H Lim, M Hong
... We used real Internet topology that is CAIDA's Skitter MAP. This data were created
by one host that sends traceroute information to randomly chosen ...
Ajou Univ., Korea – defense against DDoS
Implementation and Verification of a Hierarchical Architecture for IP
M Oe, Y Kadobayashi
... in 500 physical nodes (5000 virtual nodes) on StarBED ,which isanInternetsimulator.
In this test, the AS topology map based on Skitter will be constructed ...
NARA Institute, Japan
implementation of a hierarchical IP traceback
OE Masafumi, Y KADOBAYASHI, S YAMAGUCHI
... 3. Thus, the ITM network topology is the same as the AS the network topology. ... core
AS groups that CAIDA selects from the operation result of Skitter. The ...
Proceedings of the 2003 Symposium on Applications and the …, 2003 - ieeexplore.ieee.org - portal.acm.org
IP Traceback in High-Speed Internet: Practical Techniques and
J Li, M Sung, J Xu, L Li, L Technologies, Q Zhao
... Simulation results based on real-world network topologies (eg Skitter) matches very ...
it requires the knowledge of the router-level Internet topology, which may ...
Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium … - cc.gatech.edu - cc.gatech.edu - ieeexplore.ieee.org
Traceback-based Intelligent Packet Filtering: A Novel Technique for
Defending Against Internet …
M Sung, J Xu
... results based on real-world net- work topologies (eg, Skitter) all demonstrate that
the ... on parameters such as the number of attackers and the network topology. ...
Proceedings of of IEEE ICNP’2002 - ieee-icnp.org - cc.gatech.edu - ieeexplore.ieee.org - portal.acm.org
Empirical Analysis of Target-Resident DoS
M Collins, MK Reiter
... over the 26 network maps corresponding to the 26 Skitter sensors (260 ... a 10% false
negative rate, even without detailed knowledge of the network topology. ...
Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium … - ece.cmu.edu - ieeexplore.ieee.org
map to test filtering techniques
BuildingTopology-Aware Overlay Multicast
L Garces-Erice, EW Biersack, PA Felber
... Research Report RR-04-107. MULTI+: Building Topology-Aware Overlay Multicast Trees.
April 2004. ... Page 3. MULTI+: Building Topology-Aware Overlay Multicast Trees. ...
eurecom.fr - eurecom.fr
skitter coordinate space
Characteristics of the Internet and Multicast
S Jin, A Bestavros
... compared degree-based topology generators such as Inet and structural topology
generators such ... were obtained from . They were measured using the Skitter tool ...
Modeling, Analysis and Simulation of Computer …, 2003 - ieeexplore.ieee.org - cs-people.bu.edu - cs-people.bu.edu - eecs.cwru.edu
model of topology
OF MULTICAST-BASED STREAMING DELIVERY MECHANISMS ON THE
... 62. 4.4 Small-world Internet Topology Generation . . . . . ... 56. 4.2
Subgraphs recorded by 13 skitter monitors. . . . . ...
eecs.cwru.edu - eecs.cwru.edu
to Graduate Studies in Computing Project 1: Experiment and Learn to
... Another tool used is Skitter, which was developed by CAIDA ( and [16 ... number of
commercial products, which have implemented algorithms for topology discovery ...
cc.gatech.edu - cc.gatech.edu
- The initial list was obtained
by searching scholar.google.com for"skitter topology" and "skitter routing", November
- Lisa hand-filtered this list to exclude hits with CAIDA authors/CAIDA pages
- Marina separated the original list into 2 lists: skitter usage (this file) & skitter references