IP定位技术的研究
作者:
基金项目:

国家重点基础研究发展计划(973)(2012CB315806);国家自然科学基金(61371119,61379149,61103225,61070173)


Research on the IP Geolocation Technology
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [60]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    IP定位技术就是确定Internet中IP设备的地理位置,它可以帮助网络应用改善性能、提高安全性以及提供新的服务.首先概述了IP定位技术的基本概念和应用情况;然后,将现有定位算法分为独立于客户端和基于客户端两类定位算法,并对每一类算法中的典型算法进行了具体分析,讨论了隐私保护技术和新技术的影响;最后,对现有的IP定位算法进行了综合对比,指出了IP定位技术的研究方向.

    Abstract:

    IP geolocation aims at determining the geographic location of an Internet host, which can improve the performance and security of the Internet application, and bring about novel services. This paper firstly illustrates the concept and applications of the IP geolocation, and then categorizes current typical IP address geolocation algorithms into two classes, namly, client-independent geolocation algorithms and client-dependent geolocation algortithms. Next, the main ideas of the representative algorithms of each class are illustrated, and the privacy protection techniques and the influence of new techniques are discussed. Finally, a comprehensive comparison is made on the IP geolocation algorithms and systems, and the future trends of the IP geolocation are discussed.

    参考文献
    [1] Wong B, Stoyanov I, Sirer EG. Octant: A comprehensive framework for the geolocalization of Internet hosts. In: Proc. of the NSDI 2007 Symp. Cambridge: ACM Press, 2007. 313-326. http://www.cs.cornell.edu/People/egs/papers/octant-nsdi.pdf
    [2] Azureus Software, Inc. Vuze bittorrent client. 2014. http://www.vuze.com/
    [3] Katz-Bassett E, John J, Krishnamurthy A, Wetherall D, Anderson T, Chawathe Y. Towards IP geolocation using delay and topology measurements. In: Proc. of the IMC 2006. Rio de Janeiro: ACM Press, 2006. 71-84. http://homes.cs.washington.edu/~arvind/papers/geoloc.pdf[doi: 10.1145/1177080.1177090]
    [4] Gill P, Ganjali Y, Dude WB. Dude, Where's that IP? Circumventing measurement-based IP geolocation. In: Proc. of the Usenix Security Symp. 2010. https://cs.uwaterloo.ca/~bernard/sec10.pdf
    [5] CAIDA. CAIDA's geolocation tools comparison. 2010. http://www.caida.org/projects/cybersecurity/geolocation/
    [6] IETF Geopriv Workgroup. draft-ietf-geopriv-uncertainty. 2014. http://tools.ietf.org/wg/geopriv/
    [7] Robin B, Travis L, Silvia P, Erika DN, Edward O. Html5 draft. 2012. http://dev.w3.org/html5/spec-author-view/
    [8] Gueye B, Uhlig S, Fdida S. Investigating the imprecision of IP block-based geolocation. In: Proc. of the PAM. 2007. 237-240.[doi: 10.1007/978-3-540-71617-4_26]
    [9] IP to latitude/longitude server. 2013. http://www.iptolatlng.com/
    [10] Moore D, Periakaruppan R, Donohoe J, Claffy K. Where is the world is netgeo.caida.org? In: Proc. of the INET 2000. 2000. http://www.caida.org/publications/papers/2000/inet_netgeo/inet_netgeo.html
    [11] Padmanabhan VN, Subramanian L. An investigation of geographic mapping techniques for Internet hosts. In: Proc. of the ACM SIGCOMM. San Diego: ACM Press, 2001. 173-185.[doi: 10.1145/964723.383073]
    [12] Gueye B, Ziviani A, Crovella M, Fdida S. Constraint-Based geolocation of Internet hosts. ACM/IEEE Trans. on Networking, 2006, 14(6):1219-1232.[doi: 10.1109/TNET.2006.886332]
    [13] Wang Y, Burgener D, Flores M, Kuzmanovic A, Huang C. Towards street-level client-independent IP geolocation. In: Proc. of the 8th USENIX Conf. on Networked Systems Design and Implementation. Berkeley, 2011. https://www.usenix.org/legacy/event/nsdi11/tech/full_papers/Wang_Yong.pdf
    [14] Eriksson B, Barford P, Sommersy J, Nowak R. A learning-based approach for IP geolocation. In: Proc. of the PAM. 2010.[doi: 10.1007/978-3-642-12334-4_18]
    [15] Davis C, Vixie P, Goodwin T, Dickinson I. A means for expressing location information in the domain name system. 1996. http://tools.ietf.org/html/rfc1876.html
    [16] Youn I, Mark BL, Richards D. Statistical geolocation of Internet hosts. In: Proc. of the Int'l Conf. on Computer Communications and Networks (ICCCN). 2009. 1-6.[doi: 10.1109/ICCCN.2009.5235373]
    [17] Laki S, Mátray P, Hága P, Sebök T, Csabai I, Vattay G. Spotter: A model based active geolocation service. In: Proc. of the INFOCOM. Shanghai: IEEE Press, 2011. 3173-3181.[doi: 10.1109/INFCOM.2011.5935165]
    [18] Abboud O, Kovacevic A, Graffi K, Pussep K, Steinmetz R. Underlay awareness in P2P systems: Techniques and challenges. In: Proc. of the 23rd IEEE Int'l Symp. on Parallel and Distributed Processing (IPDPS). Rome, 2009. 1-8.[doi: 10.1109/IPDPS.2009. 5160955]
    [19] Cheng C, Hsiu P. Extend your journey: Introducing signal strength into location-based applications. In: Proc. of the INFOCOM. Turin: IEEE Press, 2013. 2742-2750.[doi: 10.1109/INFCOM.2013.6567083]
    [20] Algis K. What is geolocation and how does it apply to network detection? 2009. http://www.sans.org/security-resources/idfaq/geolocation-network-detection.php
    [21] Liu X, Liu KK, Guo L, Li X, Fang Y. A game-theoretic approach for achieving k-anonymity in location based services. In: Proc. of the INFOCOM. Turin: IEEE Press, 2013. 2985-2993.[doi: 10.1109/INFCOM.2013.6567110]
    [22] Visualware Inc. 2014. http://www.visualroute.com
    [23] NeoTrace. 2014. http://www.neoworx.com/products/neotrace/default.asp
    [24] Periakaruppan R, Nemeth E. Gtrace—A Graphical Traceroute Tool. Usenix LISA, 1999.
    [25] Anderson M, Bansal A, Doctor B, Hadjiyiannis G, Herringshaw G, Karplus E, Muniz D. Method and apparatus for estimating a geographic location of a networked entity. Int Cl: G06F15/16, United States Pat 6, 684, 250, 2004-1-27.
    [26] MaxMind. 2012. http://www.maxmind.com
    [27] EdgeScape. 2010. http://www.akamai.com/html/technology/products/edgescape.html
    [28] Digital Island Inc. 2011. http://www.digitalisland.com/
    [29] Software77. 2010. http://software77.net/geo-ip/
    [30] IPligence. 2010. http://www.ipligence.com/products/
    [31] HostIP. 2010. http://www.hostip.info/dl/index.html
    [32] IPInfoDB. 2010. http://ipinfodb.com/
    [33] Eriksson B, Barford P, Maggs B, Nowak R. Posit: A lightweight approach for IP geolocation. Sigmetrics Performance Evaluation Review, 2012,40(2):2-11.[doi: 10.1145/2381056.2381058]
    [34] Arif MJ, Karunasekera S, Kulkarni S. GeoWeight: Internet host geolocation based on a probability model for latency measurements. In: Proc. of the ACSC 2010 33rd Australasian Conf. on Computer Science. 2010. 89-98. http://dl.acm.org/citation.cfm?id= 1862209&dl=ACM&coll=DL&CFID=480394846&CFTOKEN=71466975
    [35] Hu Z, Heidemann J, Pradkin Y. Towards geolocation of millions of IP addresses. In: Proc. of the IMC. 2012. 123-130.[doi: 10.1145/2398776.239879]
    [36] Arif MJ, Karunasekera S, Kulkarni S, Gunatilaka A, Ristic B. Internet host geolocation using maximum likelihood estimation technique. In: Proc. of the IEEE Int'l Conf. on Advanced Information Networking and Applications (AINA). Perth: IEEE Press, 2010. 422-429.[doi: 10.1109/AINA.2010.139]
    [37] Laki S, Mátray P, Hága P, Csabai I, Vattay G. A model based approach for improving router geolocation. Computer Networks, 2010,54(9):1490-1501.[doi: 10.1016/j.comnet.2009.12.004]
    [38] Wang H, Wang ZY, Guobin S, Li F, Han S, Zhao F. WheelLoc: Enabling continuous location service on mobile phone for outdoor scenarios. In: Proc. of the INFOCOM. Turin: IEEE Press, 2013. 2733-2741.[doi: 10.1109/INFCOM.2013.6567082]
    [39] Guha S, Plarre K, Lissner D, Mitra S, Krishna B, Dutta P, KumarS. Autowitness: Locating and tracking stolen property while tolerating gps and radio outages. In: Proc. of the SenSys 2010. 2010. 29-42.[doi: 10.1145/1869983.1869988]
    [40] Zheng Y, Chen Y, Xie X, Ma WY. Geolife2.0: A location-based social networking service. In: Proc. of the MDM 2009. 2009. 357-358.[doi: 10.1109/MDM.2009.50]
    [41] Constandache I, Gaonkar S, Sayler M, Choudhury RR, Cox L. Enloc: Energy-Efficient localization for mobile phones. In: Proc. of the IEEE INFOCOM Mini Conf. 2009. 2716-2720.[doi: 10.1109/INFCOM.2009.5062218]
    [42] Feldmann S, Kyamakya K, Zapater A, Lue Z. An indoor Bluetooth-based positioning system: Concept, implementation and experimental evaluation. In: Proc. of the Int'l Conf. on Wireless Networks. 2003.
    [43] Google maps with my location. 2009. http://www.google.com/mobile/gmm/mylocation/index.html
    [44] Skyhook. 2014. http://www.skyhookwireless.com/
    [45] Yan Z. Precise location technology based on chirp spread spectrum. Journal of Networks, 2011,6(6):872-878.[doi: 10.4304/jnw. 6.6.872-878]
    [46] Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services. In: Proc. of the 21st Int'l Conf. on Data Engineering Workshops. 2005. 1248-1252.[doi: 10.1109/ICDE.2005.269]
    [47] Zang H, Bolot J. Anonymization of location data does not work: A large-scale measurement study. In: Proc. of the 17th Annualinternational Conf. on Mobile Computing and Networking. 2011. 145-156.[doi: 10.1145/2030613.2030630]
    [48] Chow CY, Mokbel MF, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proc. of the ACM GIS. New York: ACM Press, 2006. 171-178.[doi: 10.1145/1183471.1183500]
    [49] Beresford A, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003,2(1):46-55.[doi: 10.1109/MPRV.2003.1186725]
    [50] Li X, Jung T. Search me if you can: Privacy-Preserving location query service. In: Proc. of the INFOCOM. Turin: IEEE Press, 2013. 2760-2768.[doi: 10.1109/INFCOM.2013.6567085]
    [51] Yang D, Fang X, Xue G. Truthful incentive mechanisms for k-anonymity location privacy. In: Proc. of the INFOCOM. Turin: IEEE Press, 2013. 2994-3002.[doi: 10.1109/INFCOM.2013.6567111]
    [52] The state of the Internet. 2014. http://www.akamai.com/stateoftheinternet/
    [53] Deering S, Hinden R. Internet protocol. Version 6 (IPv6) Specification. 2014. https://tools.ietf.org/html/rfc2460
    [54] The locator/idenfifier separation protocol. 2008. http://www.lisp4.net/
    [55] Zan FB, Xu MW, Wu JP. Survey of host identity protocol (HIP). Journal of Chinese Computer Systems, 2007,28(2):4-5 (in Chinese with English abstract).[doi: 10.3969/j.issn.1000-1220.2007.02.007]
    [56] Moskwitz R, Nikander P, Henderson T. Host identity protocol. 2008. https://tools.ietf.org/html/rfc5201
    [57] Muir AJ, Oorschot PC. Internet geolocation: Evasion and counterevasion. ACM Computing Surveys, 2009,42(1):1-22.[doi: 10. 1145/1592451.1592455]
    [58] Shavitt Y, Zilberman N. A study of geolocation databases. selected areas in communications. IEEE Journal on Networks, 2010, 29(10):2044-2056.[doi: 10.1109/JSAC.2011.111214]
    [59] Guo C, Liu Y, Shen W, Wang HJ, Yu Q, Zhang Y. Mining the Web and the Internet for accurate IP address geolocations. In: Proc. of the INFOCOM. Rio de Janeiro: IEEE Press, 2009. 2841-2845.[doi: 10.1109/INFCOM.2009.5062243]
    [60] Siwpersad SS, Gueye B, Uhlig S. Assessing the geographic resolution of exhaustive tabulation for geolocating Internet hosts. In: Proc. of the PAM. Berlin: Springer-Verlag, 2008. 11-20.[doi: 10.1007/978-3-540-79232-1_2]
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

王占丰,冯径,邢长友,张国敏,许博. IP定位技术的研究.软件学报,2014,25(7):1527-1540

复制
分享
文章指标
  • 点击次数:7640
  • 下载次数: 13658
  • HTML阅读次数: 4844
  • 引用次数: 0
历史
  • 收稿日期:2013-09-21
  • 最后修改日期:2014-04-08
  • 在线发布日期: 2014-07-08
文章二维码
您是第20542261位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号