{"id":"https://openalex.org/W4403980995","doi":"https://doi.org/10.1145/3646547.3688417","title":"Rumors Stop with the Wise: Unveiling Inbound SAV Deployment through Spoofed ICMP Messages","display_name":"Rumors Stop with the Wise: Unveiling Inbound SAV Deployment through Spoofed ICMP Messages","publication_year":2024,"publication_date":"2024-11-01","ids":{"openalex":"https://openalex.org/W4403980995","doi":"https://doi.org/10.1145/3646547.3688417"},"language":"en","primary_location":{"id":"doi:10.1145/3646547.3688417","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3646547.3688417","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM on Internet Measurement Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020684252","display_name":"Shuaicong Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuaicong Yu","raw_affiliation_strings":["Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026586512","display_name":"Shuying Zhuang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuying Zhuang","raw_affiliation_strings":["Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tao Yu","orcid":"https://orcid.org/0009-0001-9788-0651"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tao Yu","raw_affiliation_strings":["Center for Information of Education Management, Ministry of Education (CIEM), Beijing, China"],"affiliations":[{"raw_affiliation_string":"Center for Information of Education Management, Ministry of Education (CIEM), Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077888500","display_name":"Chunlei An","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changqing An","raw_affiliation_strings":["Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100660344","display_name":"Jilong Wang","orcid":"https://orcid.org/0000-0002-4493-5145"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jilong Wang","raw_affiliation_strings":["Institute of Network Sciences and Cyberspace, Tsinghua University &amp; Quan Cheng Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Network Sciences and Cyberspace, Tsinghua University &amp; Quan Cheng Laboratory, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020684252"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.3434,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62607959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"199","last_page":"213"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-control-message-protocol","display_name":"Internet Control Message Protocol","score":0.9645633697509766},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8161375522613525},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6738601922988892},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6518846154212952},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5140074491500854},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37091630697250366},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11770167946815491}],"concepts":[{"id":"https://openalex.org/C195219913","wikidata":"https://www.wikidata.org/wiki/Q13162","display_name":"Internet Control Message Protocol","level":3,"score":0.9645633697509766},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8161375522613525},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6738601922988892},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6518846154212952},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5140074491500854},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37091630697250366},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11770167946815491},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3646547.3688417","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3646547.3688417","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM on Internet Measurement Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G708306450","display_name":null,"funder_award_id":"No.2020YFE0200500","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W192498908","https://openalex.org/W1590810061","https://openalex.org/W1920802909","https://openalex.org/W1954338761","https://openalex.org/W1989454965","https://openalex.org/W2098527270","https://openalex.org/W2117175761","https://openalex.org/W2137736034","https://openalex.org/W2239534643","https://openalex.org/W2281602502","https://openalex.org/W2548400217","https://openalex.org/W2588574340","https://openalex.org/W2734941459","https://openalex.org/W2898094482","https://openalex.org/W2985610488","https://openalex.org/W3084971599","https://openalex.org/W3093651667","https://openalex.org/W3094353319","https://openalex.org/W3209722324","https://openalex.org/W3212980631","https://openalex.org/W4200063541","https://openalex.org/W4243835522","https://openalex.org/W4288057715","https://openalex.org/W4296608051","https://openalex.org/W4300930169","https://openalex.org/W4306406240","https://openalex.org/W4361018052","https://openalex.org/W4392964112"],"related_works":["https://openalex.org/W2392196971","https://openalex.org/W2504080848","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W2998478967","https://openalex.org/W2354256422","https://openalex.org/W3128793638","https://openalex.org/W4388934690","https://openalex.org/W2348219379","https://openalex.org/W2051979939"],"abstract_inverted_index":{"In":[0],"the":[1,55,59,74,87,98,110,147,185,198],"era":[2],"of":[3,22,76,89,115,178,187,200],"increasing":[4],"network-based":[5],"threats,":[6],"particularly":[7],"IP":[8],"spoofing,":[9],"Source":[10,24],"Address":[11,25],"Validation":[12,26],"(SAV)":[13],"is":[14,28,193,206],"paramount":[15],"for":[16],"network":[17],"security.":[18,214],"The":[19,162,215],"effective":[20],"deployment":[21,192,205,221],"Inbound":[23],"(ISAV)":[27],"crucial":[29],"yet":[30],"often":[31],"inadequate,":[32],"posing":[33],"significant":[34,210],"risks":[35,114],"to":[36,100,170],"Internet":[37],"infrastructure.":[38],"This":[39],"study":[40],"presents":[41],"ICMP_Sonar,":[42],"a":[43,172],"measurement":[44],"system":[45],"that":[46,72,183,219],"deploys":[47],"\"rumors\"":[48],"-carefully":[49],"crafted":[50],"spoofed":[51],"ICMP":[52,77,81,116],"packets-to":[53],"probe":[54],"network's":[56],"defenses,":[57],"revealing":[58],"\"wise\"":[60],"networks":[61,226],"with":[62,189,202],"their":[63],"robust":[64],"ISAV":[65,179,191,204,220],"implementations.":[66],"ICMP_Sonar":[67,122],"introduces":[68],"two":[69],"novel":[70],"approaches":[71],"exploit":[73],"characteristics":[75],"unreachable":[78],"messages":[79],"and":[80,85,97,105,112,139,157,175,227,230],"fragment":[82],"needed":[83],"messages,":[84],"exhibits":[86],"advantages":[88],"high":[90],"coverage,":[91],"fine":[92],"granularity,":[93],"low":[94],"error":[95,117],"rates,":[96],"ability":[99],"measure":[101],"in":[102,212],"both":[103],"IPv4":[104,126,132,141,229],"IPv6.":[106,231],"We":[107],"also":[108,217],"evaluate":[109],"applicability":[111],"security":[113],"messages.":[118],"Through":[119],"large-scale":[120],"measurements,":[121],"successfully":[123],"covers":[124],"86M":[125],"hosts":[127],"(0.8M":[128],"IPv6":[129,136,144],"hosts),":[130],"3.5M":[131],"/24":[133],"subnets":[134],"(24K":[135],"/40":[137],"subnets),":[138],"59K":[140],"ASes":[142,188,201],"(8.3K":[143],"ASes),":[145],"surpassing":[146],"state-of-the-art":[148],"dual-stack":[149],"method's":[150],"coverage":[151,164],"by":[152],"16.2":[153],"(51.6),":[154],"2.9":[155],"(2.34),":[156],"1.7":[158],"(1.7)":[159],"times,":[160],"respectively.":[161],"broad":[163],"across":[165,224],"multiple":[166],"granularities":[167],"enables":[168],"us":[169],"capture":[171],"more":[173],"comprehensive":[174],"fine-grained":[176],"view":[177],"deployment.":[180],"Measurements":[181],"show":[182],"while":[184],"percentage":[186,199],"no":[190],"lower":[194],"than":[195],"previously":[196],"identified,":[197],"partial":[203],"much":[207],"higher,":[208],"indicating":[209],"gaps":[211],"overall":[213],"analysis":[216],"reveals":[218],"practices":[222],"vary":[223],"different":[225],"between":[228]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
