skip to main content
research-article

Internet geolocation: Evasion and counterevasion

Published:14 December 2009Publication History
Skip Abstract Section

Abstract

Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications such as reducing credit card fraud. This raises questions about the veracity of claims of accurate and reliable geolocation. We provide a survey of Internet geolocation technologies with an emphasis on adversarial contexts; that is, we consider how this technology performs against a knowledgeable adversary whose goal is to evade geolocation. We do so by examining first the limitations of existing techniques, and then, from this base, determining how best to evade existing geolocation techniques. We also consider two further geolocation techniques which may be of use even against adversarial targets: (1) the extraction of client IP addresses using functionality introduced in the 1.5 Java API, and (2) the collection of round-trip times using HTTP refreshes. These techniques illustrate that the seemingly straightforward technique of evading geolocation by relaying traffic through a proxy server (or network of proxy servers) is not as straightforward as many end-users might expect. We give a demonstration of this for users of the popular Tor anonymizing network.

References

  1. Anderson, M., Bansal, A., Doctor, B., Hadjiyiannis, G., Herringshaw, C., Karplus, E., and Muniz, D. 2004. Method and apparatus for estimating a geographic location of a networked entity. United States Patent 6,684,250. Assigned to Quova, Inc. Filed April 3, 2001. Issued January 27, 2004.Google ScholarGoogle Scholar
  2. Casado, M. and Freedman M. 2007. Peering through the Shroud: The effect of edge opacity on IP-based client identification. In Proceedings of the 4th USENIX Symposium on Networked Systems Design&Implementation (NSDI). 173--186. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Cooper, I., Melve, I., and Tomlinson, G. 2001. Internet Web replication and caching taxonomy. RFC 3040 January. http://www.rfc-archive.org. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Davis, C., Vixie, P., Goodwin, T., and Dickinson, I. 1996. A means for expressing location information in the domain name system. RFC 1876 January. http://www.rfc-archive.org. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dingledine, R., Mathewson, N., and Syverson, P. 2004. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium (Aug.). 303--320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Goldschlag, D., Reed, M., and Syverson, P. 1996. Hiding routing information. In Information Hiding, First International Workshop, Lecture Notes in Computer Science, vol. 1174. Springer, Berlin, Germany, 137--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Gueye, B., Ziviani, A., Crovella, M., and Fdida, S. 2004. Constraint-based geolocation of Internet hosts. In Proceedings of the Internet Measurement Conference (Oct.). 288--293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Huffman, S. and Reifer, M. 2005. Method for geolocating logical network addresses. United States Patent 6,947,978. Assigned to the United States of America as represented by the Director, National Security Agency. Filed December 29, 2000. Issued September 20, 2005.Google ScholarGoogle Scholar
  9. Information Technology Association of America. 2002. Ecommerce taxation and the limitations of geolocation tools, November. http://www.itaa.org.Google ScholarGoogle Scholar
  10. Jesdanun, A. 2004. World Wide Web Narrowing? Associated Press. CBS News, New York, July 12.Google ScholarGoogle Scholar
  11. Katz-Bassett, E., John, J., Krishnamurthy, A., Wetherall, D., Anderson, T., and Chawathe, Y. 2006. Towards IP geolocation using delay and topology measurements. In Proceedings of the Internet Measurement Conference. (Oct.). 71--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D., and Jones, L. 1996. SOCKS protocol version 5. RFC 1928. March. www.rfc-archive.org. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Moore, D., Periakaruppan, R., Donohoe, J., and Claffy, K. 2000. Where in the world is netgeo.caida.org? In Proceedings of the International Networking Conference (INET, July). Poster.Google ScholarGoogle Scholar
  14. Muir, J. and van Oorschot, P. 2006. Internet geolocation and evasion. Tech. rep. TR-06-05 (April). School of Computer Science, Carleton University, Ottawa, Canada.Google ScholarGoogle Scholar
  15. Padmanabhan, V. and Subramanian, L. 2001. An investigation of geographic mapping techniques for Internet hosts. In Proceedings of SIGCOMM (Aug.). 173--185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Parekh, S., Friedman, R., Tibrewala, N., and Lutch, B. 2004. Systems and methods for determining collecting and using geographic locations of Internet users. United States Patent 6,757,740. Assigned to Digital Envoy, Inc. Filed March 31, 2000. Issued June 29, 2004.Google ScholarGoogle Scholar
  17. Periakaruppan, R. and Nemeth, E. 1999. Gtrace—a graphical traceroute tool. In Proceedings of LISA: 13th Systems Administration Conference (Nov.). 69--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Privoxy. 2008. Home page. http://www.privoxy.org.Google ScholarGoogle Scholar
  19. Reiter, M. and Rubin, A. 1998. Crowds: Anonymity for Web transactions. ACM Trans. Inform. Syst. Sec. 1, 66--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Syverson, P. 2006. Personal communication, January 30.Google ScholarGoogle Scholar
  21. The Tor Project. 2008. Tor: Overview. http://www.torproject.org/overview.html.Google ScholarGoogle Scholar
  22. Tribunal de Grande Instance de Paris. 2000. Yahoo! Inc. v. La Ligue Contre Le Racisme et L'Antisemitisme and L'Union Des Etudients Juifs de France. Interim Court Order. November 20. http://www.cdt.org/speech/international/20001120yahoofrance.pdf.Google ScholarGoogle Scholar
  23. United States District Court. 2003. Barbara Nitke and the National Coalition for Sexual Freedom v. John Ashcroft, Attorney General of the United States of American. Case no. 01 Civ. 11476 (RMB), 2003--2004. (Finkelstein testimony: http://www.sethf.com/nitke/ashcroft.php.) (Laurie testimony: http://www.apache-ssl.org/nitke.pdf.)Google ScholarGoogle Scholar
  24. Wong, B., Stoyanov, I., and Gün Sirer, E. 2007. Octant: A comprehensive framework for the geolocalization of Internet hosts. In Proceedings of the 4th USENIX Symposium on Networked Systems Design&Implementation (NSDI). 313--326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Ziviani, A., Fdida, S., de Rezende, J., and Duarte, O. 2004. Toward a measurement-based geographic location service. In Passive and Active Network Measurement, 5th International Workshop (PAM 2004). Lecture Notes in Computer Science, vol. 3015. Springer, Berlin, Germany. 43--52.Google ScholarGoogle Scholar
  26. Ziviani, A., Fdida, S., de Rezende, J., and Duarte, O. 2005. Improving the accuracy of measurement-based geographic location of Internet hosts. Comput. Netw. ISDN Syst. 47, 503--523. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Internet geolocation: Evasion and counterevasion

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 42, Issue 1
      December 2009
      162 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/1592451
      Issue’s Table of Contents

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 December 2009
      • Accepted: 1 September 2008
      • Revised: 1 June 2008
      • Received: 1 January 2008
      Published in csur Volume 42, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader