Can Cyber Cell track your IP address?
Answers from top 8 papers
More filters
Papers (8) | Insight |
---|---|
The advantages of this method are that: (1) the logical distance of IP addresses is represented intuitively; (2) Internet address space is visualized economically; (3) macroscopic information (Internet level) and microscopic information (local level) are visualized simultaneously. | |
21 Citations | IP traceback is a solution for attributing cyber attacks, and it is also useful for accounting user traffic and network diagnosis. |
In this paper, a new mechanism for IP traceback based on the geographic information rather than the traditional IP address information is proposed. | |
31 Oct 2016 22 Citations | Out profound insight to tackle this problem is that we can build a connection between the cyber space and the physical space with the stable location distribution of IP addresses. |
If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. | |
To our knowledge, this is the first successful attempt to automatically identify and understand IP address dynamics. | |
76 Citations | This paper proposes passive IP traceback (PIT) that bypasses the deployment difficulties of IP traceback techniques. |
18 Oct 1998 11 Citations | It is shown that other address assignment schemes can also be applied to the military architecture without any modification to the mobile IP. |