Internet Geolocation: Evasion and Counterevasion.
Saved in:
| Title: | Internet Geolocation: Evasion and Counterevasion. |
|---|---|
| Authors: | MUIR, JAMES A., VAN OORSCHOT, PAUL C. |
| Source: | ACM Computing Surveys; Dec2009, Vol. 42 Issue 1, p4-4:23, 23p, 3 Charts |
| Subject Terms: | GEOGRAPHIC information systems, INTERNET, ANONYMITY, COMPUTER security, JAVA programming language, HTTP (Computer network protocol) |
| Abstract: | Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications such as reducing credit card fraud. This raises questions about the veracity of claims of accurate and reliable geolocation. We provide a survey of Internet geolocation technologies with an emphasis on adversarial contexts; that is, we consider how this technology performs against a knowledgeable adversary whose goal is to evade geolocation. We do so by examining first the limitations of existing techniques, and then, from this base, determining how best to evade existing geolocation techniques. We also consider two further geolocation techniques which may be of use even against adversarial targets: (1) the extraction of client IP addresses using functionality introduced in the 1.5 Java API, and (2) the collection of round-trip times using HTTP refreshes. These techniques illustrate that the seemingly straightforward technique of evading geolocation by relaying traffic through a proxy server (or network of proxy servers) is not as straightforward as many end-users might expect. We give a demonstration of this for users of the popular Tor anonymizing network. [ABSTRACT FROM AUTHOR] |
| Copyright of ACM Computing Surveys is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=03600300&ISBN=&volume=42&issue=1&date=20091201&spage=4&pages=4-26&title=ACM Computing Surveys&atitle=Internet%20Geolocation%3A%20Evasion%20and%20Counterevasion.&aulast=MUIR%2C%20JAMES%20A.&id=DOI:10.1145/1592451.1592455 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=MUIR%20JA Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 46982349 RelevancyScore: 834 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 833.5 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Internet Geolocation: Evasion and Counterevasion. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22MUIR%2C+JAMES+A%2E%22">MUIR, JAMES A.</searchLink><br /><searchLink fieldCode="AR" term="%22VAN+OORSCHOT%2C+PAUL+C%2E%22">VAN OORSCHOT, PAUL C.</searchLink> – Name: TitleSource Label: Source Group: Src Data: ACM Computing Surveys; Dec2009, Vol. 42 Issue 1, p4-4:23, 23p, 3 Charts – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22GEOGRAPHIC+information+systems%22">GEOGRAPHIC information systems</searchLink><br /><searchLink fieldCode="DE" term="%22INTERNET%22">INTERNET</searchLink><br /><searchLink fieldCode="DE" term="%22ANONYMITY%22">ANONYMITY</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+security%22">COMPUTER security</searchLink><br /><searchLink fieldCode="DE" term="%22JAVA+programming+language%22">JAVA programming language</searchLink><br /><searchLink fieldCode="DE" term="%22HTTP+%28Computer+network+protocol%29%22">HTTP (Computer network protocol)</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications such as reducing credit card fraud. This raises questions about the veracity of claims of accurate and reliable geolocation. We provide a survey of Internet geolocation technologies with an emphasis on adversarial contexts; that is, we consider how this technology performs against a knowledgeable adversary whose goal is to evade geolocation. We do so by examining first the limitations of existing techniques, and then, from this base, determining how best to evade existing geolocation techniques. We also consider two further geolocation techniques which may be of use even against adversarial targets: (1) the extraction of client IP addresses using functionality introduced in the 1.5 Java API, and (2) the collection of round-trip times using HTTP refreshes. These techniques illustrate that the seemingly straightforward technique of evading geolocation by relaying traffic through a proxy server (or network of proxy servers) is not as straightforward as many end-users might expect. We give a demonstration of this for users of the popular Tor anonymizing network. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of ACM Computing Surveys is the property of Association for Computing Machinery and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=46982349 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1145/1592451.1592455 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 23 StartPage: 4 Subjects: – SubjectFull: GEOGRAPHIC information systems Type: general – SubjectFull: INTERNET Type: general – SubjectFull: ANONYMITY Type: general – SubjectFull: COMPUTER security Type: general – SubjectFull: JAVA programming language Type: general – SubjectFull: HTTP (Computer network protocol) Type: general Titles: – TitleFull: Internet Geolocation: Evasion and Counterevasion. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: MUIR, JAMES A. – PersonEntity: Name: NameFull: VAN OORSCHOT, PAUL C. IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 12 Text: Dec2009 Type: published Y: 2009 Identifiers: – Type: issn-print Value: 03600300 Numbering: – Type: volume Value: 42 – Type: issue Value: 1 Titles: – TitleFull: ACM Computing Surveys Type: main |
| ResultId | 1 |
Full Text Finder
Nájsť tento článok vo Web of Science