Internet Geolocation: Evasion and Counterevasion.

Saved in:
Bibliographic Details
Title: Internet Geolocation: Evasion and Counterevasion.
Authors: MUIR, JAMES A., VAN OORSCHOT, PAUL C.
Source: ACM Computing Surveys; Dec2009, Vol. 42 Issue 1, p4-4:23, 23p, 3 Charts
Subject Terms: GEOGRAPHIC information systems, INTERNET, ANONYMITY, COMPUTER security, JAVA programming language, HTTP (Computer network protocol)
Abstract: Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications such as reducing credit card fraud. This raises questions about the veracity of claims of accurate and reliable geolocation. We provide a survey of Internet geolocation technologies with an emphasis on adversarial contexts; that is, we consider how this technology performs against a knowledgeable adversary whose goal is to evade geolocation. We do so by examining first the limitations of existing techniques, and then, from this base, determining how best to evade existing geolocation techniques. We also consider two further geolocation techniques which may be of use even against adversarial targets: (1) the extraction of client IP addresses using functionality introduced in the 1.5 Java API, and (2) the collection of round-trip times using HTTP refreshes. These techniques illustrate that the seemingly straightforward technique of evading geolocation by relaying traffic through a proxy server (or network of proxy servers) is not as straightforward as many end-users might expect. We give a demonstration of this for users of the popular Tor anonymizing network. [ABSTRACT FROM AUTHOR]
Copyright of ACM Computing Surveys is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=03600300&ISBN=&volume=42&issue=1&date=20091201&spage=4&pages=4-26&title=ACM Computing Surveys&atitle=Internet%20Geolocation%3A%20Evasion%20and%20Counterevasion.&aulast=MUIR%2C%20JAMES%20A.&id=DOI:10.1145/1592451.1592455
    Name: Full Text Finder
    Category: fullText
    Text: Full Text Finder
    Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif
    MouseOverText: Full Text Finder
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=MUIR%20JA
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edb
DbLabel: Complementary Index
An: 46982349
RelevancyScore: 834
AccessLevel: 6
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 833.5
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Internet Geolocation: Evasion and Counterevasion.
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22MUIR%2C+JAMES+A%2E%22">MUIR, JAMES A.</searchLink><br /><searchLink fieldCode="AR" term="%22VAN+OORSCHOT%2C+PAUL+C%2E%22">VAN OORSCHOT, PAUL C.</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: ACM Computing Surveys; Dec2009, Vol. 42 Issue 1, p4-4:23, 23p, 3 Charts
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22GEOGRAPHIC+information+systems%22">GEOGRAPHIC information systems</searchLink><br /><searchLink fieldCode="DE" term="%22INTERNET%22">INTERNET</searchLink><br /><searchLink fieldCode="DE" term="%22ANONYMITY%22">ANONYMITY</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+security%22">COMPUTER security</searchLink><br /><searchLink fieldCode="DE" term="%22JAVA+programming+language%22">JAVA programming language</searchLink><br /><searchLink fieldCode="DE" term="%22HTTP+%28Computer+network+protocol%29%22">HTTP (Computer network protocol)</searchLink>
– Name: Abstract
  Label: Abstract
  Group: Ab
  Data: Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications such as reducing credit card fraud. This raises questions about the veracity of claims of accurate and reliable geolocation. We provide a survey of Internet geolocation technologies with an emphasis on adversarial contexts; that is, we consider how this technology performs against a knowledgeable adversary whose goal is to evade geolocation. We do so by examining first the limitations of existing techniques, and then, from this base, determining how best to evade existing geolocation techniques. We also consider two further geolocation techniques which may be of use even against adversarial targets: (1) the extraction of client IP addresses using functionality introduced in the 1.5 Java API, and (2) the collection of round-trip times using HTTP refreshes. These techniques illustrate that the seemingly straightforward technique of evading geolocation by relaying traffic through a proxy server (or network of proxy servers) is not as straightforward as many end-users might expect. We give a demonstration of this for users of the popular Tor anonymizing network. [ABSTRACT FROM AUTHOR]
– Name: Abstract
  Label:
  Group: Ab
  Data: <i>Copyright of ACM Computing Surveys is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.)
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=46982349
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1145/1592451.1592455
    Languages:
      – Code: eng
        Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 23
        StartPage: 4
    Subjects:
      – SubjectFull: GEOGRAPHIC information systems
        Type: general
      – SubjectFull: INTERNET
        Type: general
      – SubjectFull: ANONYMITY
        Type: general
      – SubjectFull: COMPUTER security
        Type: general
      – SubjectFull: JAVA programming language
        Type: general
      – SubjectFull: HTTP (Computer network protocol)
        Type: general
    Titles:
      – TitleFull: Internet Geolocation: Evasion and Counterevasion.
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: MUIR, JAMES A.
      – PersonEntity:
          Name:
            NameFull: VAN OORSCHOT, PAUL C.
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 12
              Text: Dec2009
              Type: published
              Y: 2009
          Identifiers:
            – Type: issn-print
              Value: 03600300
          Numbering:
            – Type: volume
              Value: 42
            – Type: issue
              Value: 1
          Titles:
            – TitleFull: ACM Computing Surveys
              Type: main
ResultId 1