skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: as2org+: Enriching AS-to-Organization Mappings with PeeringDB
An organization-level topology of the Internet is a valuable resource with uses that range from the study of organizations’ footprints and Internet centralization trends, to analysis of the dynamics of the Internet’s corporate structures as result of (de)mergers and acquisitions. Current approaches to infer this topology rely exclusively on WHOIS databases and are thus impacted by its limitations, including errors and outdated data. We argue that a collaborative, operator-oriented database such as PeeringDB can bring a complementary perspective from the legally-bounded information available in WHOIS records. We present as2org+, a new framework that leverages self-reported information available on PeeringDB to boost the state-of-the-art WHOIS-based methodologies. We discuss the challenges and opportunities with using PeeringDB records for AS-to-organization mappings, present the design of as2org+ and demonstrate its value identifying companies operating in multiple continents and mergers and acquisitions over a five-year period.  more » « less
Award ID(s):
2107392
PAR ID:
10535305
Author(s) / Creator(s):
; ;
Publisher / Repository:
Passive and Active Measurement (PAM) 2023
Date Published:
ISBN:
978-3-031-28485-4
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract Many industries have become increasingly concentrated through mergers and acquisitions, which in health care may have important consequences for spending and outcomes. Using a rich panel of Medicare claims data for nearly one million dialysis patients, we advance the literature on the effects of mergers and acquisitions by studying the precise ways providers change their behavior following an acquisition. We base our empirical analysis on more than 1,200 acquisitions of independent dialysis facilities by large chains over a 12-year period and find that chains transfer several prominent strategies to the facilities they acquire. Most notably, acquired facilities converge to the behavior of their new parent companies by increasing patients’ doses of highly reimbursed drugs, replacing high-skill nurses with less-skilled technicians, and waitlisting fewer patients for kidney transplants. We then show that patients fare worse as a result of these changes: outcomes such as hospitalizations and mortality deteriorate, with our long panel allowing us to identify these effects from within-facility or within-patient variation around the acquisitions. Because overall Medicare spending increases at acquired facilities, mostly as a result of higher drug reimbursements, this decline in quality corresponds to a decline in value for payers. We conclude the article by considering the channels through which acquisitions produce such large changes in provider behavior and outcomes, finding that increased market power cannot explain the decline in quality. Rather, the adoption of the acquiring firm’s strategies and practices drives our main results, with greater economies of scale for drug purchasing responsible for more than half of the change in profits following an acquisition. 
    more » « less
  2. Accurate mapping of Autonomous Systems (ASes) to their owner organizations is fundamental for understanding the structure and dynamics of the Internet. However, as AS numbers have traditionally been delegated in an ad-hoc manner and organizational ownership has evolved over time, many organizations have registered resources under different names. Traditionally, researchers have relied on datasets like AS2Org, which map ASNs to organizations primarily using WHOIS records, but WHOIS inconsistencies often lead to missed and false relationships. We propose a new approach by leveraging the Resource Public Key Infrastructure (RPKI) to map ASNs to their managing organization. Our methodology combines multiple data sources: WHOIS records to extract organization names, RPKI certificates to identify potential siblings, and Large Language Models (LLMs) to find evidence not visible in WHOIS records currently. This integrated approach enables a more robust and accurate mapping of ASNs to organizations, notably improving inferences for 14% of multi-ASN clusters. 
    more » « less
  3. Abstract Taking an action research approach, we engaged in fieldwork with school-based behavioral health care teams to: observe record keeping practices, design and deploy a prototype system addressing key challenges, and reflect on its use. We describe the challenges of capturing behavioral data using both paper and electronic records. Creating records of behaviors requires direct observation, and as a result the record keeping responsibility is challenging to distribute across a care team. Behavioral data on paper must be transferred and prepared for reporting, both inside the organization and to stakeholders outside of the organization. In prototyping a computerized working record, we targeted user needs for capturing details of a behavioral incident in the moment. Challenges persisted through the transition from paper to our prototype, and based on these empirical findings over two years of fieldwork, we present five tensions in representing behavioral data in an electronic health record. These tensions reflect the differences between entering behavioral data into the record for intraorganizational use versus interorganizational use. 
    more » « less
  4. Recently, the ubiquity of mobile devices leads to an increasing demand of public network services, e.g., WiFi hot spots. As a part of this trend, modern transportation systems are equipped with public WiFi devices to provide Internet access for passengers as people spend a large amount of time on public transportation in their daily life. However, one of the key issues in public WiFi spots is the privacy concern due to its open access nature. Existing works either studied location privacy risk in human traces or privacy leakage in private networks such as cellular networks based on the data from cellular carriers. To the best of our knowledge, none of these work has been focused on bus WiFi privacy based on large-scale real-world data. In this paper, to explore the privacy risk in bus WiFi systems, we focus on two key questions how likely bus WiFi users can be uniquely re-identified if partial usage information is leaked and how we can protect users from the leaked information. To understand the above questions, we conduct a case study in a large-scale bus WiFi system, which contains 20 million connection records and 78 million location records from 770 thousand bus WiFi users during a two-month period. Technically, we design two models for our uniqueness analyses and protection, i.e., a PB-FIND model to identify the probability a user can be uniquely re-identified from leaked information; a PB-HIDE model to protect users from potentially leaked information. Specifically, we systematically measure the user uniqueness on users' finger traces (i.e., connection URL and domain), foot traces (i.e., locations), and hybrid traces (i.e., both finger and foot traces). Our measurement results reveal (i) 97.8% users can be uniquely re-identified by 4 random domain records of their finger traces and 96.2% users can be uniquely re-identified by 5 random locations on buses; (ii) 98.1% users can be uniquely re-identified by only 2 random records if both their connection records and locations are leaked to attackers. Moreover, the evaluation results show our PB-HIDE algorithm protects more than 95% users from the potentially leaked information by inserting only 1.5% synthetic records in the original dataset to preserve their data utility. 
    more » « less
  5. Abstract In the emerging quantum internet, complex network topology could lead to efficient quantum communication and robustness against failures. However, there are concerns about complexity in quantum communication networks, such as potentially limited end-to-end transmission capacity. These challenges call for model systems in which the impact of complex topology on quantum communication protocols can be explored. Here, we present a theoretical model for complex quantum communication networks on a lattice of spins, wherein entangled spin clusters in interacting quantum spin systems serve as communication links between appropriately selected regions of spins. Specifically, we show that ground state Greenberger-Horne-Zeilinger clusters of the two-dimensional random transverse-field Ising model can be used as communication links between regions of spins. Further, the resulting quantum networks can have complexity comparable to that of the classical internet. Our work provides a generative model for further studies towards determining the network characteristics of the emerging quantum internet. 
    more » « less