{"id":"https://openalex.org/W4417284313","doi":"https://doi.org/10.1109/tdsc.2025.3643435","title":"AS-Level Topology Inference for Path-Aware Networking","display_name":"AS-Level Topology Inference for Path-Aware Networking","publication_year":2025,"publication_date":"2025-12-12","ids":{"openalex":"https://openalex.org/W4417284313","doi":"https://doi.org/10.1109/tdsc.2025.3643435"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3643435","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3643435","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089981289","display_name":"Yuxin Mao","orcid":"https://orcid.org/0000-0001-8332-2467"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuxin Mao","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102700194","display_name":"Hongbin Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongbin Luo","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462285","display_name":"Zhiyuan Wang","orcid":"https://orcid.org/0000-0002-1966-2421"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyuan Wang","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101574616","display_name":"Shan Zhang","orcid":"https://orcid.org/0000-0002-2280-8583"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shan Zhang","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089981289"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45016308,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"4177","last_page":"4194"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.7368999719619751,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.7368999719619751,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.11140000075101852,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.047200001776218414,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6481000185012817},{"id":"https://openalex.org/keywords/traceroute","display_name":"traceroute","score":0.6276999711990356},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.6148999929428101},{"id":"https://openalex.org/keywords/internet-topology","display_name":"Internet topology","score":0.598800003528595},{"id":"https://openalex.org/keywords/logical-topology","display_name":"Logical topology","score":0.5777999758720398},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5360999703407288},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5353000164031982},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4941999912261963}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8163999915122986},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6481000185012817},{"id":"https://openalex.org/C157497606","wikidata":"https://www.wikidata.org/wiki/Q603227","display_name":"traceroute","level":3,"score":0.6276999711990356},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.6148999929428101},{"id":"https://openalex.org/C99237066","wikidata":"https://www.wikidata.org/wiki/Q17092610","display_name":"Internet topology","level":3,"score":0.598800003528595},{"id":"https://openalex.org/C117729477","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Logical topology","level":3,"score":0.5777999758720398},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5360999703407288},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5353000164031982},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4941999912261963},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4593999981880188},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42800000309944153},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.4059000015258789},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3935999870300293},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38499999046325684},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.3815999925136566},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.3537999987602234},{"id":"https://openalex.org/C143913944","wikidata":"https://www.wikidata.org/wiki/Q5421952","display_name":"Extension topology","level":4,"score":0.3531999886035919},{"id":"https://openalex.org/C123222754","wikidata":"https://www.wikidata.org/wiki/Q1070472","display_name":"Product topology","level":2,"score":0.32429999113082886},{"id":"https://openalex.org/C176809094","wikidata":"https://www.wikidata.org/wiki/Q15401496","display_name":"Traverse","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.2971000075340271},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3643435","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3643435","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W792552903","https://openalex.org/W1726879018","https://openalex.org/W1959318606","https://openalex.org/W2019275299","https://openalex.org/W2021358715","https://openalex.org/W2075548827","https://openalex.org/W2095575865","https://openalex.org/W2109244201","https://openalex.org/W2132957552","https://openalex.org/W2164363093","https://openalex.org/W2600778551","https://openalex.org/W2618528322","https://openalex.org/W2751051188","https://openalex.org/W2792300086","https://openalex.org/W2799905015","https://openalex.org/W2800397646","https://openalex.org/W2899670782","https://openalex.org/W2941148427","https://openalex.org/W2950632007","https://openalex.org/W2956151113","https://openalex.org/W2968216967","https://openalex.org/W3094602625","https://openalex.org/W3101455050","https://openalex.org/W3129780405","https://openalex.org/W3130002881","https://openalex.org/W3155683139","https://openalex.org/W3166977667","https://openalex.org/W3217429102","https://openalex.org/W4200618791","https://openalex.org/W4210636637","https://openalex.org/W4236793779","https://openalex.org/W4238177034","https://openalex.org/W4250493029","https://openalex.org/W4285212123","https://openalex.org/W4308086346","https://openalex.org/W4324007233","https://openalex.org/W4324116414","https://openalex.org/W4386385535","https://openalex.org/W4389161427","https://openalex.org/W4393944063","https://openalex.org/W4393972793","https://openalex.org/W4394595499","https://openalex.org/W4394994385","https://openalex.org/W4401508035","https://openalex.org/W4401508628","https://openalex.org/W4402771585","https://openalex.org/W4402915109","https://openalex.org/W4404371432","https://openalex.org/W4406138043","https://openalex.org/W4410949841","https://openalex.org/W4411725910","https://openalex.org/W4412164105","https://openalex.org/W7091609646"],"related_works":[],"abstract_inverted_index":{"As":[0],"the":[1,49,58,75,100,118,139,152,183,203,210,226,230,236,240,258,265],"frequency":[2],"of":[3,77,232,242,253,260],"cyber":[4],"attacks":[5],"(e.g.,":[6,83,94],"DDoS)":[7],"continues":[8],"to":[9,15,45,74,88,105,133,137,145,181],"rise,":[10],"it":[11],"becomes":[12],"increasingly":[13],"crucial":[14],"trace":[16],"malicious":[17],"packets":[18,36,270],"and":[19,28,52,64,109,130,168,171,178,192,208,220],"identify":[20,89,106],"which":[21],"autonomous":[22],"systems":[23],"(ASes)":[24],"they":[25],"originate":[26],"from":[27,239,271],"traverse":[29],"through.":[30],"Path-aware":[31],"networking":[32],"(PAN)":[33],"architectures,":[34],"forwarding":[35],"based":[37,155,248],"on":[38,60,125,156,249],"in-packet":[39,135,157],"path":[40,55,65,78],"identifiers":[41],"(PIDs),":[42],"enable":[43],"end-hosts":[44],"gain":[46],"insights":[47],"into":[48],"AS-level":[50,54,61,140,149,197],"topology":[51,62,150,198,204,238,252],"facilitate":[53],"traceback.":[56],"However,":[57],"study":[59],"inference":[63,119,184,219],"traceback":[66,176,179],"under":[67],"PAN":[68,81,126],"has":[69],"been":[70],"overlooked,":[71],"primarily":[72],"due":[73],"diversity":[76],"identification.":[79],"Some":[80],"architectures":[82],"SCION)":[84],"use":[85,134],"deterministic":[86],"PIDs":[87,129,136],"inter-domain":[90,107],"paths,":[91,108],"while":[92,225],"others":[93],"CoLoR)":[95],"adopt":[96],"prefix-deterministic":[97,128],"PIDs.":[98,158],"In":[99],"latter,":[101],"PID-Prefix":[102,218],"is":[103,111,144],"used":[104],"PID-Suffix":[110],"reserved":[112],"for":[113,196],"additional":[114],"security":[115],"functions,":[116],"making":[117],"problem":[120],"complicated.":[121],"This":[122],"paper":[123],"focuses":[124],"with":[127,151,235],"investigates":[131],"how":[132],"infer":[138],"topology.":[141,212],"Our":[142],"goal":[143],"construct":[146],"a":[147],"tree-like":[148],"corresponding":[153],"PID-Prefixes":[154],"We":[159],"first":[160],"introduce":[161],"two":[162,172],"macro":[163],"metrics":[164,174],"(i.e.,":[165,175],"completion":[166],"rate":[167],"precision":[169],"rate)":[170],"micro":[173],"division":[177],"aggregation)":[180],"evaluate":[182],"accuracy.":[185],"Furthermore,":[186],"we":[187],"propose":[188],"an":[189],"Alternating":[190],"Expanding":[191],"Checking":[193],"(AEC)":[194],"algorithm":[195,201],"inference.":[199],"AEC":[200,261],"constructs":[202],"by":[205],"iteratively":[206],"expanding":[207,214],"checking":[209,227],"current":[211,237],"The":[213],"phase":[215,228],"performs":[216],"one-hop":[217],"generates":[221],"new":[222,244],"child":[223,245],"ASes,":[224],"verifies":[229],"consistency":[231],"PID":[233],"sequences":[234],"perspective":[241],"each":[243,272],"AS.":[246,273],"Experiments":[247],"empirical":[250],"Internet":[251],"201":[254],"ASes":[255],"show":[256],"that":[257],"accuracy":[259],"reaches":[262],"99.6%":[263],"when":[264],"observer":[266],"receives":[267],"only":[268],"30":[269]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-12T00:00:00"}
