An investigation of geographic mapping techniques for internet hosts
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Measuring ISP topologies with rocketfuel
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Computer Networking: A Top-Down Approach Featuring the Internet
Computer Networking: A Top-Down Approach Featuring the Internet
Towards IP geolocation using delay and topology measurements
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Internet Measurement: Infrastructure, Traffic and Applications
Internet Measurement: Infrastructure, Traffic and Applications
Constraint-based geolocation of internet hosts
IEEE/ACM Transactions on Networking (TON)
Internet geolocation: Evasion and counterevasion
ACM Computing Surveys (CSUR)
Statistical Geolocation of Internet Hosts
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Geolocalization of proxied services and its application to fast-flux hidden servers
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Proceedings of the 16th ACM conference on Computer and communications security
The flattening internet topology: natural evolution, unsightly barnacles or contrived collapse?
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Towards trusted cloud computing
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
A learning-based approach for IP geolocation
PAM'10 Proceedings of the 11th international conference on Passive and active measurement
Peering through the shroud: the effect of edge opacity on ip-based client identification
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Octant: a comprehensive framework for the geolocalization of internet hosts
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
A position paper on data sovereignty: the importance of geolocating data in the cloud
HotCloud'11 Proceedings of the 3rd USENIX conference on Hot topics in cloud computing
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Geolocation of data in the cloud
Proceedings of the third ACM conference on Data and application security and privacy
Providing a data location assurance service for cloud storage environments
Journal of Mobile Multimedia
Hi-index | 0.00 |
Many applications of IP geolocation can benefit from geolocation that is robust to adversarial clients. These include applications that limit access to online content to a specific geographic region and cloud computing, where some organizations must ensure their virtual machines stay in an appropriate geographic region. This paper studies the applicability of current IP geolocation techniques against an adversary who tries to subvert the techniques into returning a forged result. We propose and evaluate attacks on both delay-based IP geolocation techniques and more advanced topology-aware techniques. Against delay-based techniques, we find that the adversary has a clear trade-off between the accuracy and the detectability of an attack. In contrast, we observe that more sophisticated topology-aware techniques actually fare worse against an adversary because they give the adversary more inputs to manipulate through their use of topology and delay information.