@article{MCB7CBBF9, title = "Efficient Method of Collecting Network Traces for Generating Network Topology", journal = "Journal of KIISE, JOK", year = "2018", issn = "2383-630X", doi = "10.5626/JOK.2018.45.12.1319", author = "Jinsoo Kim,Haengrok Oh", keywords = "destination selection,traceroute,route path collection,monitor deployment location,network topology", abstract = "Network topology information is critical in cyber security for designing security architecture and threat analysis as well as for network management and diagnosis. Numerous approaches have been proposed for obtaining information about network topology. In particular, graph analytical methods for inferring network topology are intensively researched. These methods collect path traces via traceroute and analyze them using graph theoretical methods for inferring network topology. However, there exist few research reports on choosing destinations and deployment locations of trace collectors which have the potential of significantly affecting network overhead and discovery time. This paper proposes a novel method of choosing destinations and determining trace collectors for the efficient collection of network traces. In the present work, we have also implemented a prototype of the proposed methods and experimentally validated their performance." }