Abstract

Computer crime causes significant impact and 
 losses to society and the public security of countries, and 
 even influences homeland security. From previous lessons, 
 we know that the physical location of computer criminals 
 plays an important role in combat with computer crime, 
 including IP Traceback and IP Location. Literature review 
 shows that there have been many studies of the topic of IP 
 Traceback. However, the most critical IP Location has not 
 yet been thoroughly discussed, and existing IP Location 
 approaches, as based on end-to-end delay measurement 
 from a set of landmarks, fail to outperform much simpler 
 techniques, and the error of these approaches is strongly 
 determined by the distance to the nearest landmark, even 
 when triangulation is used to combine estimates from 
 different landmarks. In view of this, this study uses the 
 concept of IP Location and Network Forensics to propose 
 the distributed agent-based IP Location system framework 
 in order that the "position" of the criminal can be traced, 
 and identity can be deduced by this mechanism, when 
 cybercriminal behavior occurs. The result of actual 
 implementation in WiMAX networks shows that the 
 accuracy of IP Location can be the coverage area of a base 
 station (in radius of 150-500 m in urban areas).

Highlights

  • Computer crime refers to any crime that involves a computer (IP device) and a network [1]

  • The logic of IP Location and individualization is that, in an environment of an integrated fixed network, mobile telecommunication network 3/3.5G, WiMAX, and generation network IP Multimedia Subsystem (IMS), each related node in the network is confirmed, the DPI (Deep Packet Inspection) is in charge of accessing, copying, decoding, and saving necessary data retention for IP Location, in order to analyze the location of the IP Address, and associatively identity IP users, according to an IP Address, time, and the information record retained from using IP services on the Internet

  • In 2009, Dan Li et al proposed an IP Location mapping scheme, GeoGet, which involves moderately connected Internet regions by HTTP/Get probing for delay measurement, and the results show that it can accurately map 35.4% of targeted clients to the city level, with a median error distance of approximately 120 km [19]

Read more

Summary

INTRODUCTION

Computer crime refers to any crime that involves a computer (IP device) and a network [1]. IP Location refers to the process of finding the physical location of an Internet host [16] It is currently proposed, or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications, such as reducing credit card fraud [17]. In use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications, such as reducing credit card fraud [17] This is a difficult problem, even putting mobility aside, as the decentralized management of the Internet means that there is no authoritative database of host locations.

RELATED WORKS
Nomadic
Mobility
Anonymity
Overview of the proposed Approach
IP Location measurements and data retention
IP Location mapping
LEA side IP Location inquiry system
Test environment and requirements
Scenarios
IP Location Mapping and analysis
Findings
CONCLUSIONS AND FUTURE WORKS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call