This page lists publications by nonCAIDA researchers using skitter data. We compiled this list in November 2004. If you have a publication based on the analysis of skitter data that is not included here, please email skitterinfo@caida.org and we will be happy to update our list.
See also: NonCAIDA publications referencing skitter tool or data
Publications based on skitter data
Indexed by Topic (# of entries); 40 entries total
[PDF] Analyzing
and modelling the ASlevel Internet
topology
S Zhou, RJ
Mondragon
... and Communication, 2001. [18]
Skitter, CAIDA’s topology measurement
tool,
www.caida.org/tools/measurement/skitter/. [19] Y. Hyun
...
Proc. of HETNETs’
03,(arXive: cs. NI/0303030), 2003  arxiv.org 
arxiv.org 
adsabs.harvard.edu
[PDF] Accurately
modeling the Internet topology
S Zhou, RJ Mondragon 
... into the basic mechanisms that could be
responsible for the evolving topology of
complex ... in this research was collected as part of
CAIDA’s Skitter initiative
...
Arxiv preprint cs.NI/0402011, 2004 
arxiv.org 
arxiv.org 
adsabs.harvard.edu
Model Validation
[PDF]
Redundancy and Robustness of the ASlevel Internet
topology
and its models
S Zhou, RJ Mondragon
... topology,” Proc. of HETNETs’03,
(arXive:cs.NI/0303030), 2003. [4] The ITDK0204
data used in this research was collected as part of CAIDA’s
Skitter ...
Arxiv preprint
cs.NI/0402026, 2004  arxiv.org 
arxiv.org 
ieeexplore.ieee.org 
adsabs.harvard.edu
ITDK
[PDF]
Sampling biases in IP topology
measurements
A Lakhina, J
Byers, M Crovella, P Xie
Page 1. Sampling Biases in IP Topology Measurements.
... This experimental setup aims
to model the prevalent methodology employed to discover the Internet
topology. ...
IEEE INFOCOM, 2003  ieeexplore.ieee.org 
ieeeinfocom.org

cs.bu.edu 
cspeople.bu.edu
Comparison of topologies
[PDF] On
the Emergence of Highly Variable Distributions in the Autonomous
System Topology
M Fayed, P
Krapivsky, JW Byers, M Crovella, D …
... maps produced by mapping routers from the Mercator
[16] and Skitter [29] datasets
...
We conclude that, for topology generation, it is not
necessary to incorporate ...
ACM SIGCOMM Computer
Communication Review, 2003  portal.acm.org 
cs.bu.edu 
cspeople.bu.edu
Model Validation
[PDF]
M Fayed, P
Krapivsky, J Byers, M Crovella, D …
... solutions to empirical AS size distribution taken
from Mercator and Skitter datasets,
and ... This abstraction provides an attractive target
for Internet topology.
...
Technical Report
BUCSTR2003001, Boston University, …  csftp.bu.edu 
cspeople.bu.edu 
cs.bu.edu
compare model of AS growth with data
[PDF] On
the marginal utility of network topology
measurements
P
Barford, A Bestavros, J Byers, M Crovella
... dataset for this study was collected (May 2000),
the Skitter infrastructure consisted
...
random graphs) with idealized routing algorithms (such
as use of shortest ...
ACM SIGCOMM Internet
Measurement Workshop, 2001  portal.acm.org 
icir.org 
aciri.org 
cs.bu.edu
[PDF] An
Analysis on the Internet Topology
J
Leguay
... To achieve this study, we used the data from the
Skitter network measurement platform
...
of route collection and also a mean to get a realistic
topology of the ...
ep.liu.se
PhD
[PDF] Describing and Simulating Internet
Routes
J Leguay,
M Latapy, T Friedman, K Salamatian
... The work in this paper is based upon a study of
over seven million route traces produced
by CAIDA's skitter infrastructure.
...
Arxiv preprint
cs.NI/0411051 v1 16, 2004  arxiv.org
[PDF] Efficient Algorithms for Large Scale
Topology
Discoveries
B Donnet,
P Raoult, T Friedman, M Crovella
... There is a growing interest in discovery of
internet topology ... we show that
standard
topology discovery methods (e.g.,
skitter) are quite
inefficient...
Arxiv preprint
cs.NI/0411013 v1 7, 2004  arxiv.org
[PDF] Userlevel
Internet Path Diagnosis
R Mahajan,
N Spring, D Wetherall, T Anderson
Page 1. Userlevel Internet Path Diagnosis. Ratul Mahajan Neil Spring
David
Wetherall Thomas Anderson. University of Washington. ABSTRACT
...
SOSP’03 
portal.acm.org 
athos.rutgers.edu 
eecs.umich.edu 
bauhaus.cs.washington.edu
5000 IP addresses from
our list
[PDF] Understanding BGP misconfiguration
R Mahajan,
D Wetherall, T Anderson
... Over a three week period, we analyzed
routing table advertisements from 23 vantage
points across the Internet backbone to detect incidents of
misconfiguration. ...
Proc. ACM SIGCOMM 
portal.acm.org 
utdallas.edu 
cs.rutgers.edu 
cs.rice.edu
[PDF] On
Properties of Internet Exchange Points and Their Impact on AS
Topology
and
Relationship
K Xu, Z Duan, ZL Zhang, J
Chandrashekar
... This paper ex plores the properties of IXPs and
their impact on the AS topology
and AS business relations using Scriptroute and
Skitter traceroute probes, BGP
...
springerlink.com 
cs.fsu.edu
[PDF] LOCALAREA
PATH DIVERSITY IN THE INTERNET
ALB
PRIMER
... Further, we developed a script to convert
Skitter trace data into graphs showing
the topology of the network between a given source and
destination. ...
cs.ucsd.edu
UCSD, study of path diversity
[PDF] The
impact of DHT routing geometry on resilience and
proximity
K Gummadi,
R Gummadi, S Gribble, S Ratnasamy, S …
... We discuss this issue in Section 3. Another
crucial question is how well DHTs can
adapt to the underlying Internet topology. Much
research has been. 381. Page 2 ...
Proc. ACM
SIGCOMM, 2003  portal.acm.org 
intelresearch.net 
liawww.epfl.ch 
sics.se
latencies
[PDF]
Geometric Exploration of the Landmark
Selection Problem
L Tang, M
Crovella
... While network structure is usually throught of as
a property of topology, we take
a novel approach that leverages the notion of internet coordinates
... Skitter.
...
springerlink.com 
cs.bu.edu 
pam2004.org 
pam2004.org
[PDF]
Virtual
landmarks for the Internet
L Tang, M
Crovella
... 3.4 Skitter The
Skitter project [21] is a largescale effort to
continuously
monitor routing and connectivity across the Internet.
...
Proc. Internet
Measurement Conference (IMC)  portal.acm.org 
cs.bu.edu 
icir.org 
eecs.umich.edu
[PDF]
On
the Geographic Location of Internet
Resources
A Lakhina, JW Byers, M Crove lla, I
Matta
... Our first topology dataset is a
large collection of ICMP forward path (traceroute)
probes. This data was collected by Skitter, a
measurement tool run on more ...
IEEE Journal on Selected
Areas in Communications, 2003  cs.wm.edu 
cs.bu.edu 
searchlore.org 
fravia.com
[PS] Connectivity
in the South American Internet
F
Junqueira, R Teixeira
... demands based on owlevel measurements on ingress
links [6]. Finally, some research
eorts focus on observing topology characteristics.
... skitter box maintained.
...
cs.ucsd.edu 
cs.ucsd.edu
[PDF] LocationBased
Resource CoAllocation
D Spence,
T Harris
Page 1. LocationBased Resource CoAllocation. David Spence and Tim
Harris. University
of Cambridge Computer Laboratory firstname.lastname @cl.cam.ac.uk.
Abstract ...
cl.cam.ac.uk
[PDF] Effective
Peering for Multiprovider Content Delivery
Services
L Amini, A
Shaikh, H Schulzrinne
Page 1. Effective Peering for Multiprovider. Content Delivery
Services.
Lisa Amini a,b , Anees Shaikh a , Henning Schulzrinne b a
...
Proceedings of IEEE
Infocom, 2004  ieeeinfocom.org 
research.ibm.com 
cs.columbia.edu 
research.ibm.com
ITDK
[PDF]
Client
Clustering for Traffic and Location
Estimation
L Amini, H Schu lzrinne
... 24 cluster. The average. a) AMP (I1) sites b)
Skitter (D1) collection sites
Figure 2: Collection sites for I1, D1 data. a) The I1
...
24th International Conference on
Distributed Computing …  ieeexplore.ieee.org 
ieeexplore.ieee.org 
portal.acm.org
Internet measurements (3)
[PDF] Reverse
Engineering the Internet
N Spring,
D Wetherall, T Anderson
... Skitter [9] peri odically
collects the topology between IP addresses.
... database:
0. Topology (IP) Skitter [9]
Traceroute to all destinations. 2 × S × A.
...
ACM SIGCOMM Computer
Communication Review, 2004  portal.acm.org 
cs.washington.edu 
nms.lcs.mit.edu 
bauhaus.cs.washington.edu
Planning future
research
[PDF] Measuring
ISP topologies with Rocketfuel
N Spring,
R Mahajan, D Wetherall, T Anderson
... Topology influences the dy
namics of routing protocols [3], [11], the scalability
of multicast ... and links in our area of focus than a
recent Skitter [7] dataset
...
ACM SIGCOMM, 2002 
portal.acm.org 
cs.washington.edu 
cs.sunysb.edu 
cs.nps.navy.mil
compare skitter with
their tool
[PDF] Toward
Representative Internet Measurements
A Akella,
S Seshan, A Shaikh
... nodes. Skitter [7]: The
Skitter project is a CAIDA project that aims to
map
Internet paths and uncover topology changes. The
testbed ...
nymanworkshop.org 
www2.cs.cmu.edu 
cs.cmu.edu 
cs.cmu.edu
evaluate & compare with other testbeds
[PDF] StackPi:
A New Defense Mechanism against IP Spoofing and DDoS
Attacks
APDSA
Yaar
... and Cheswick’s Internet Mapping Project [4, 16]
and from the Skitter Project distributed
...
number of paths are selected, at random, from the
topology file and ...
reportsarchive.adm.cs.cmu.edu

cs.umn.edu 
cs.jhu.edu 
ece.cmu.edu
[PDF] Pi:
A Path Identification Mechanism to Defend against DDoS
Attacks
AYAPD
Song
... We chose n = 1 and n = 2 based on the
Skitter [6] and Internet Map [14, 4] data
sets. It is possible that the real Internet topology
may be substantially ...
cs.biu.ac.il 
whatever.org.ar 
ece.cmu.edu 
eecs.umich.edu
[PDF] A
Study on Marking Bit Size for Path Identification Method: Deploying the
Pi Filter at the End Host
A
Lagana…
... In our experiments, we use the Internet
topology: CAIDA’s Skitter Map [2].
This
topology was created by using a single host send
traceroutes to the other ...
springerlink.com
Ajou Univ., Korea – defense against DDoS
[PDF] Effective
Packet Marking Approach to Defend against DDoS
Attack
H Lim, M Hong
... We used real Internet topology
that is CAIDA's Skitter MAP[3]. This data were
created
by one host that sends traceroute information to randomly chosen
...
springerlink.com
Ajou Univ., Korea – defense against DDoS
[PDF] An
Implementation and Verification of a Hierarchical Architecture for IP
Traceback
M Oe, Y
Kadobayashi
... in 500 physical nodes (5000 virtual nodes) on
StarBED [18],which isanInternetsimulator.
In this test, the AS topology map based on
Skitter will be constructed
...
doi.wiley.com
NARA Institute, Japan
[PDF] An
implementation of a hierarchical IP traceback
architecture
OE
Masafumi, Y KADOBAYASHI, S YAMAGUCHI
... 3. Thus, the ITM network topology
is the same as the AS the network topology.
... core
AS groups that CAIDA selects from the operation result of
Skitter[9]. The ...
Proceedings of the
2003 Symposium on Applications and the …, 2003  ieeexplore.ieee.org 
portal.acm.org
[PDF] LargeScale
IP Traceback in HighSpeed Internet: Practical Techniques and
Theoretical Foundation
J Li, M
Sung, J Xu, L Li, L Technologies, Q Zhao
... Simulation results based on realworld network
topologies (eg Skitter) matches very
...
it requires the knowledge of the routerlevel Internet
topology, which may ...
Security
and Privacy, 2004. Proceedings. 2004 IEEE Symposium …  cc.gatech.edu 
cc.gatech.edu 
ieeexplore.ieee.org
DDoS defense
[PDF] IP
Tracebackbased Intelligent Packet Filtering: A Novel Technique for
Defending Against Internet …
M Sung, J
Xu
... results based on realworld net work topologies
(eg, Skitter) all demonstrate that
the ... on parameters such as the number of attackers
and the network topology.
...
Proceedings of of IEEE
ICNP’2002  ieeeicnp.org 
cc.gatech.edu 
ieeexplore.ieee.org 
portal.acm.org
[PDF] An
Empirical Analysis of TargetResident DoS
Filters
M Collins,
MK Reiter
... over the 26 network maps corresponding to the 26
Skitter sensors (260 ... a 10%
false
negative rate, even without detailed knowledge of the network
topology. ...
Security
and Privacy, 2004. Proceedings. 2004 IEEE Symposium …  ece.cmu.edu 
ieeexplore.ieee.org
map to test filtering
techniques
[PDF] Internet
Intrusions: Global Characteristics and
Prevalence
V
Yegneswaran, P Barford, J Ullrich
... Figure 1 is a Skitterbased
AS level graph that shows the global distribution
of the providers that submit to DSHIELD. A Skitter
...
ACM SIGMETRICS,
2003  portal.acm.org 
isi.edu 
cs.jhu.edu 
merlot.usc.edu
AScore graph
[PDF] Robustness
Pefiomance of the Internet Connectivity Under Targeted
Attacks
D
Magoni
... the IP giant component (a 52505node map
created from the Skitter data) under
... INTERNET
MAP Studying Internet robustness involves knowing the Internet
topology. ...
Communication
Technology Proceedings, 2003. ICCT 2003. …, 2003 
ieeexplore.ieee.org 
ieeexplore.ieee.org
France
[PDF] MULTI+:
Building TopologyAware Overlay Multicast
Trees
L
GarcesErice, EW Biersack, PA Felber
... Research Report RR04107. MULTI+: Building
TopologyAware Overlay Multicast Trees.
April 2004. ... Page 3. MULTI+: Building
TopologyAware Overlay Multicast Trees.
...
eurecom.fr 
eurecom.fr
skitter coordinate
space
[PDF]
SmallWorld
Characteristics of the Internet and Multicast
Scaling
S Jin, A
Bestavros
... compared degreebased topology
generators such as Inet and structural topology
generators such ... were obtained from [8]. They were
measured using the Skitter tool
...
Modeling, Analysis and
Simulation of Computer …, 2003  ieeexplore.ieee.org 
cspeople.bu.edu 
cspeople.bu.edu 
eecs.cwru.edu
model of topology
[PDF]
SCALABILITY
OF MULTICASTBASED STREAMING DELIVERY MECHANISMS ON THE
INTERNET
S
JIN
... 62. 4.4 Smallworld Internet
Topology Generation . . . . . ... 56.
4.2
Subgraphs recorded by 13 skitter monitors. . . . .
...
eecs.cwru.edu 
eecs.cwru.edu
PhD
[PDF] …
to Graduate Studies in Computing Project 1: Experiment and Learn to
Discover Network Topology
C
Gkantsidis
... Another tool used is Skitter,
which was developed by CAIDA ([12] and [16 ... number
of
commercial products, which have implemented algorithms for
topology discovery ...
cc.gatech.edu 
cc.gatech.edu
graduate course
 The initial list was obtained
by searching scholar.google.com for "skitter topology" and "skitter routing", November
2004.
 Lisa handfiltered this list to
exclude hits with CAIDA authors/CAIDA pages
 Marina separated the original list
into 2 lists: skitter usage (this file) & skitter
references