F. Baker and P. Savola, Ingress Filtering for Multihomed Networks, RFC, vol.3704, 2004.

R. Beverly, A. Berger, Y. Hyun, and . Claffy, Understanding the Efficacy of Deployed Internet Source Address Validation Filtering, Internet Measurement Conference, 2009.

R. Beverly and S. Bauer, The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet, USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI) Workshop, 2005.

, CAIDA: The Spoofer Project

C. Deccio,

X. Dimitropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun et al., AS relationships: Inference and Validation, ACM SIGCOMM Computer Communication Review, vol.37, issue.1, pp.29-40, 2007.

D. Dittrich and E. Kenneally, The Menlo Report: Ethical Principles Guiding Information and, 2012.

Z. Durumeric, E. Wustrow, and J. A. Halderman, ZMap: Fast Internet-wide Scanning and Its Security Applications. In: USENIX Security Symposium, 2013.

D. Kaminsky, It's the End of the Cache as We Know It

M. Korczy?ski, M. Król, and M. Van-eeten, Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates, Internet Measurement Conference, 2016.

S. Kottler, DDoS Incident Report

T. Krenc and A. Feldmann, BGP Prefix Delegations: A Deep Dive. In: Internet Measurement Conference, pp.469-475, 2016.

M. Kührer, T. Hupperich, J. Bushart, C. Rossow, and T. Holz, Going Wild: Large-Scale Classification of Open DNS Resolvers, Internet Measurement Conference, 2015.

M. Kührer, T. Hupperich, C. Rossow, and T. Holz, Exit from Hell? Reducing the Impact of Amplification DDoS Attacks, USENIX Conference on Security Symposium, 2014.

F. Lichtblau, F. Streibelt, T. Krüger, P. Richter, and A. Feldmann, Detection, Classification, and Analysis of Inter-domain Traffic with Spoofed Source IP Addresses, Internet Measurement Conference, 2017.

Q. Lone, M. Luckie, M. Korczy?ski, H. Asghari, M. Javed et al., Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer, Traffic Monitoring and Analysis Conference, 2018.

Q. Lone, M. Luckie, M. Korczy?ski, and M. Van-eeten, Using Loops Observed in Traceroute to Infer the Ability to Spoof, Passive and Active Measurement Conference, 2017.

M. Luckie, R. Beverly, R. Koga, K. Keys, J. Kroll et al., Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet, Computer and Communications Security Conference (CCS), 2019.

J. Mauch, Spoofing ASNs

L. F. Müller, M. J. Luckie, B. Huffaker, and M. P. Barcellos, Conference on Emerging Networking Experiments And Technologies (CoNEXT), pp.96-109, 2019.

C. Rossow, Amplification Hell: Revisiting Network Protocols for DDoS Abuse, Network and Distributed System Security Symposium (NDSS), 2014.

S. Scheffler, S. Smith, Y. Gilad, and S. Goldberg, The Unintended Consequences of Email Spam Prevention, Passive and Active Measurement, 2018.

D. Senie and P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing, 2000.

C. Shue and A. Kalafut, Resolvers Revealed: Characterizing DNS Resolvers and their Clients, ACM Transactions on Internet Technology, 2013.

P. Vixie, S. Thomson, Y. Rekhter, and J. Bound, Dynamic Updates in the Domain Name System (DNS UPDATE), Internet RFC, p.2136, 1997.