[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2534748.2534759guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

From an IP address to a street address: using wireless signals to locate a target

Published: 13 August 2013 Publication History

Abstract

How quickly can somebody convert an IP address of a target into a real-word street address? Law enforcement regularly has need to determine a suspect's exact location when investigating crimes on the Internet. They first use geolocation software and databases to determine the suspect's rough location. Recent research has been able to scope a targeted IP address to within a 690m (0.43 mile) radius circle, which is enough to determine the relevant law enforcement department that has jurisdiction. Unfortunately, investigators face a "last half mile" problem: their only mechanism to determine the exact address of the suspect is to subpoena the suspect's Internet Service Provider, a process that can take weeks. Instead, law enforcement would rather locate the suspect within the hour with the hope of catching the suspect while the crime is still on-going, which leads to stronger evidence and straightforward prosecution.
Given these time constraints, we investigate how quickly an adversary can locate a target without any special law enforcement powers. Instead, we leverage the use of ubiquitous wireless networks and a mobile physical observer that performs wireless monitoring (akin to "wardriving," which seeks to search for wireless networks). We develop an approach that allows an adversary to send traffic to the target's address that can be detected by the observer, even if wireless encryption is in use.
We evaluated the approach in two common real-world settings. In one of these, a residential neighborhood, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes (with potential for more exact results using hardware such as directional antennas). This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. These results show significant promise for the geolocation strategy and demonstrate that adversaries with multiple potential observation points, such as law enforcement personnel, could quickly locate a target.

References

[1]
Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, "Towards street-level client-independent IP geolocation," in USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2011.
[2]
US Census, "Guide to state and local census geography," www. census.gov/geo/www/guidestloc/pdf/All GSLCG.pdf, 2011.
[3]
Business Wire, "Strategy analytics: A quarter of households worldwide now have wireless home networks," http://www.businesswire.com/portal/site/home/ permalink/?ndmViewId=news view&newsLang=en&newsId= 20120404006331&div=-1063439563, April 2012.
[4]
iGR, "Wifi bandwidth use in the U.S. home forecast to more than double in the next four years," http://www.marketwire.com/press-release/wifi-bandwidth-use-us-home-forecast-more-than-double-next-four-years-1589239.htm, November 2011.
[5]
Y. Chen, Z. Liu, B. Liu, X. Fu, and W. Zhao, "Identifying mobiles hiding behind wireless routers," in IEEE INFOCOM, 2011, pp. 2651-2659.
[6]
M. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan, "Geographic locality of IP prefixes," in ACM SIGCOMM Internet Measurement Conferences. USENIX Association, 2005, pp. 13-13.
[7]
B. Gueye, A. Ziviani, M. Crovella, and S. Fdida, "Constraint-based geolocation of Internet hosts," IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1219-1232, 2006.
[8]
B. Wong, I. Stoyanov, and E. Sirer, "Octant: A comprehensive framework for the geolocalization of Internet hosts," in Proceedings of the NSDI, vol. 7, 2007.
[9]
C. Guo, Y. Liu, W. Shen, H. Wang, Q. Yu, and Y. Zhang, "Mining the web and the Internet for accurate IP address geolocations," in IEEE INFOCOM Mini-Conference. IEEE, 2009, pp. 2841-2845.
[10]
S. Katzenbeisser and F. Petitcolas, "Information hiding techniques for steganography and digital watermarking," in Artech House Inc., 1999.
[11]
J. Giffin, R. Greenstadt, P. Litwack, and R. Tibbetts, "Covert messaging through TCP timestamps," in Privacy Enhancing Technologies. Springer, 2003, pp. 189-193.
[12]
G. Fisk, M. Fisk, C. Papadopoulos, and J. Neil, "Eliminating steganography in Internet traffic with active wardens," in Information Hiding. Springer, 2003, pp. 18-35.
[13]
S. Murdoch and S. Lewis, "Embedding covert channels into tcp/ip," in Information Hiding Workshop, 2005.
[14]
G. Shah, A. Molina, and M. Blaze, "Keyboards and covert channels," in USENIX Security Symposium, vol. 15, 2006.
[15]
S. Zander, G. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," in IEEE Communications Surveys, 2007.
[16]
N. Anderson, ""the hidden side of your soul": How the FBI uses the web as a child porn honeypot," http://arstechnica.com/techpolicy/news/2012/04/the-hidden-side-of-your-soul-how-the-fbi-uses-the-web-as-a-child-porn-honeypot.ars, April 2012.
[17]
M. Clyburn, "Blog of Commissioner Clyburn," http://reboot.fcc. gov/commissioners/clyburn/blog?entryId=932133, October 2010.
[18]
G. Tristani, "Keeping the local in local radio," http://transition. fcc.gov/Speeches/Tristani/spgt811.html, September 1998.
[19]
D. Cooper, "You've heard of the child catcher? meet the WiFi snatcher," http://www.engadget.com/2012/08/02/olympic-wifi-snatcher/?a_dgi=aolshare_twitter, Aug. 2012.
[20]
M. Handley, V. Paxson, and C. Kreibich, "Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics," in Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, 2001.
[21]
P. Srisuresh and M. Holdrege, "Ip network address translator (nat) terminology and considerations," IETF RFC 2663, August 1999.
[22]
S. Guha, K. Kiswas, B. Ford, S. Sivakumar, and P. Srisuresh, "Nat behavioral requirements for tcp," IETF RFC 5382, October 2008.
[23]
J. Doyle and J. D. Carroll, Routing TCP/IP, ser. CCIE Professional Development. Cisco Press, April 2001, vol. 2, ch. 4.
[24]
Y. Lin, C. Lu, Y. Lai, W. Peng, and P. Lin, "Application classification using packet size distribution and port association," Journal of Network and Computer Applications, vol. 32, no. 5, pp. 1023-1030, 2009.
[25]
Dist. Court, ND Illinois, "In re innovatio IP ventures, LLC patent litigation," MDL Docket No. 2303, Aug. 2012.

Cited By

View all
  • (2021)IP Geolocation through Reverse DNSACM Transactions on Internet Technology10.1145/345761122:1(1-29)Online publication date: 15-Oct-2021
  • (2016)Improving IP Geolocation using Query LogsProceedings of the Ninth ACM International Conference on Web Search and Data Mining10.1145/2835776.2835820(347-356)Online publication date: 8-Feb-2016
  1. From an IP address to a street address: using wireless signals to locate a target

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      WOOT'13: Proceedings of the 7th USENIX conference on Offensive Technologies
      August 2013
      13 pages

      Sponsors

      • Google Inc.
      • DUOS: DUO Security

      Publisher

      USENIX Association

      United States

      Publication History

      Published: 13 August 2013

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 25 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)IP Geolocation through Reverse DNSACM Transactions on Internet Technology10.1145/345761122:1(1-29)Online publication date: 15-Oct-2021
      • (2016)Improving IP Geolocation using Query LogsProceedings of the Ninth ACM International Conference on Web Search and Data Mining10.1145/2835776.2835820(347-356)Online publication date: 8-Feb-2016

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media