Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (9): 1-11.doi: 10.11959/j.issn.2096-109x.2016.00097
• Overview • Next Articles
Fan ZHAO1,2,Xiang-yang LUO1,2(),Fen-lin LIU1,2
Revised:
2016-08-06
Online:
2016-09-15
Published:
2020-03-26
Supported by:
CLC Number:
Fan ZHAO,Xiang-yang LUO,Fen-lin LIU. Research on cyberspace surveying and mapping technology[J]. Chinese Journal of Network and Information Security, 2016, 2(9): 1-11.
"
定位方法 | 实验数据集 | 定位误差/km |
GeoPing | 51个PlanetLab节点,既作探测源也作目标 | 中值:109最大:1 714 |
GeoTrack | 中值:156最大:4 335 | |
Octant | 中值:35最大:277 | |
CBG | 两类节点:西欧RIPE网络中42个主机,美国AMP网络中95个主机。在测试CBG定位效果时,选取同类节点中的一个作为目标,其余为探测源 | 平均:78,182中值:22,95 |
探测源:78个PlanetLab节点 | ||
LBG | 地标集:3 200个美国境内的路由器 | 平均:112 |
目标集:12 800个美国境内的路由器 | ||
TBG | 探测源:北美68个PlaneLab节点目标:①非学术 22个Sprint网络中的节点;②学术 来自美国各大学共128个主机 | 平均:194,253 |
SLG | 探测源:163个公开可用的ping服务器和136个traceroute服务器目标集:88个PlanetLab节点;居民填写的72个<IP,邮政地址>对;3个月的地图查询日志中的<IP,经纬度>对 | 中值:0.69,2.25,2.11最大:5.24,8.1,13.2 |
GBRF | 探测源:自主部署位于北京市、成都市的2个探测源目标集:位于河南省的共1 024个目标IP | 城市级准确率高于92% |
[1] | [EB/OL].. |
[2] | [EB/OL].. |
[3] | PAPAPETROU O , SAMARA G . Ipmicra:toward a distributed and adaptable location aware Web crawler[C]// The 8th East European Conference on Advances in Databases and Information Systems. 2004. |
[4] | CAMBAZOGLU B B , TURK A , KARACA E , et al. SE4SEE:a grid-enabled search engine for south-east Europe[C]// The Interna-tional Conference on Hypermedia and Grid Systems. 2005:223-227. |
[5] | SINGH A , SRIVATSA M , LIU L , et al. Apoidea:a decentralized peer-to-peer architecture for crawling the world wide Web[C]// International Workshop on Distributed Information Re-trieval. 2003:126-142. |
[6] | SPRING N , MAHAJAN R , WETHERALL D . Measuring ISP topologies with rocketfuel[J]. ACM Sigcomm Computer Commu-nication Review, 2002,32 (4):133-145. |
[7] | KATZ-BASSETT E , MADHYASTHA H , ADHIKARI V , et al. Reverse traceroute[C]// The 7th Usenix Symposium on Networked Systems Design and Implementations(NSDI). 2010:219-234. |
[8] | Nmap:a free network mapping and security scanning tool[EB/OL]. . |
[9] | DURUMERIC Z , WUSTROW E , HALDERMAN J A . ZMap:fast internet wide scanning and its security applications[C]// The 22nd Usenix Security Symposium. 2013:605-620. |
[10] | LI J . Network topology discovery based on SNMP[C]// The 9th International Conference on Computational Intelligence and Secu-rity(CIS). 2013:194-199. |
[11] | YIN J B , LI Y M , WANG Q , et al. SNMP-based network topology discovery algorithm and implementation[C]// The International Conference on Fuzzy Systems and Knowledge Discovery(FSKD). 2012:2241-2244. |
[12] | MARCHETTA P , MéRINDOL P , DONNET B , et al. Topology discovery at the router level:a new hybrid tool targeting ISP net-works[J]. Selected Areas in Communications, 2011,29(9):1776-1787. |
[13] | MARCHETTA P , MéRINDOL P , DONNET B , et al. Quantifying and mitigating IGMP filtering in topology discovery[C]// The Confer-ence on Global Communications(GLOBECOM). 2012:1871-1876. |
[14] | MARCHETTA P , PESCAPE A . DRAGO:detecting,quantifying and locating hidden routers in traceroute IP paths[C]// The 32nd IEEE International Conference on Computer Communications(INFOCOM). 2013:3237-3242. |
[15] | GUNES M H , SARAC K . Resolving IP aliases in building traceroute-based Internet maps[J]. IEEE/ACM Transactions on Networking(ToN), 2009,17(6):1738-1751. |
[16] | SHERRY J , KATZ-BASSETT E , PIMENOVA M , et al. Resolving IP aliases with prespecified timestamps[C]// The 10th ACM Sig-comm Conference on Internet Measurement. 2010:172-178. |
[17] | MARCHETTA P , PERSICO V , PESCAPè A , et al. Pythia:yet another active probing technique for alias resolution[C]// The 9th ACM Conference on Emerging Networking Experiments and Technolo-gies. 2013:229-234. |
[18] | SPRING N , MAHAJAN R , WETHERALL D , et al. Measuring ISP topologies with rocketfuel[J]. IEEE/ACM Transactions on Net-working, 2004,12(1):2-16. |
[19] | MADHYASTHA H V , ISDAL T , PIATEK M , et al. iPlane:an information plane for distributed services[C]// The 7th Symposium on Operating Systems Design and Implementation. 2006:367-380. |
[20] | FELDMAN D , SHAVITT Y . Automatic large scale generation of internet pop level maps[C]// The Conference on Global Communi-cations(GLOBECOM). 2008:1-6. |
[21] | SHAVITT Y , ZILBERMAN N . Geographical internet pop level maps[C]// The International Conference on Traffic Monitoring &Analysis. 2012:121-124. |
[22] | SHAVITT Y , ZILBERMAN N . Improving IP geolocation by crawling the Internet PoP level graph[C]// The Conference on IFIP Networking. 2013:1-9. |
[23] | KOHNO T , BROIDO A , CLAFFY K C . Remote physical device fingerprinting[J]. IEEE Transactions on Dependable and Secure Computing, 2005,2(2):93-108. |
[24] | FINK R . A statistical approach to remote physical device finger-printing[C]// The Conference on Military Communications. 2007:1-7. |
[25] | DANISMAN T , ALPKOCAK A . Feeler:emotion classification of text using vector space model[C]// The AISB Convention on Com-munication,Interaction and Social Intelligence. 2008:53-59. |
[26] | TANG B , WU Y , JIANG M , et al. Recognizing and encoding dis-corder concepts in clinical text using machine learning and vector space model[C]// Working Notes for CLEF 2013 Conference. 2013:23-26. |
[27] | ALSALLAL M , IQBAL R , AMIN S , et al. Intrinsic plagiarism detection using latent semantic indexing and stylometry[C]// The 6th International Conference on Developments in eSystems Engi-neering(DeSE). 2013:145-150. |
[28] | YEH J F , TAN Y S , LEE C H . Topic detection and tracking for conversational content by using conceptual dynamic latent dirichlet allocation[J]. Neurocomputing, 2016. |
[29] | CHEN Y , AMIRI H , LI Z , et al. Emerging topic detection for organizations from microblogs[C]// The 36th International ACM Sigir Conference on Research and Development in Information Retrieval. 2013:43-52. |
[30] | HINTON G E , SALAKHUTDINOV R R . Reducing the dimen-sionality of data with neural networks[J]. Science, 2006,313(5786):504-507. |
[31] | ZHU G , LUO X , LIU F , et al. An algorithm of city-level landmark mining based on Internet forum[C]// The 18th International Confer-ence on Network-Based Information Systems(NBiS). 2015:294-301. |
[32] | WANG Y , BURGENER D , FLORES M , et al. Towards street-level client-independent IP geolocation[C]// The 8th Conference on Net-worked Systems Design and Implementation(NSDI). 2011:27-27. |
[33] | GUO C , LIU Y , SHEN W , et al. Mining the web and the Internet for accurate IP address geolocations[C]// The 28th IEEE Conference on Computer Communications(INFOCOM). 2009:2841-2845. |
[34] | [EB/OL].. |
[35] | [EB/OL].. |
[36] | [EB/OL].. |
[37] | [EB/OL].. |
[38] | 陈鹏 . 网络实体地理定位 IP Mapping 系统设计与实现[D]. 长沙: 国防科学技术大学, 2008. |
CHEN P . Design and implementation of network entity geo- loca-tion IP Mapping system[D]. Changsha: National University of De-fense Technology, 2008. | |
[39] | 李威 . 基于 IP 地址的网络实体地理位置定位技术研究与实现[D]. 北京: 北京交通大学, 2008. |
LI W . Research and implementation of the network entities location positioning technology based on the IP address[D]. Beijing: Beijing Jiaotong University, 2008. | |
[40] | LIU H , ZHANG Y , ZHOU Y , et al. Mining checkins from loca-tion-sharing services for client-independent IP geolocation[C]// The 33th IEEE Conference on Computer Communications(INFOCOM). 2014:619-627. |
[41] | PADMANABHAN V N , SUBRAMANIAN L . An investigation of geographic mapping techniques for internet hosts[J]. ACM Sig-comm Computer Communication Review, 2001,31(4):173-185. |
[42] | GUEYE B , ZIVIANI A , CROVELLA M , et al. Constraint-based geolocation of internet hosts[J]. IEEE/ACM Transactions on Net-working, 2006,14(6):1219-1232. |
[43] | DONG Z , PERERA R D W , CHANDRAMOULI R , et al. Network measurement based modeling and optimization for IP geoloca-tion[J]. Computer Networks, 2012,56(1):85-98. |
[44] | LAKI S , MáTRAY P , HáGA P , et al. A model based approach for improving router geolocation[J]. Computer Networks, 2010,54(9):1490-1501. |
[45] | ARIF M J , KARUNASEKERA S , KULKARNI S , et al. GeoWeight:Internet host geolocation based on a probability model for latency measurements[C]// The 33rd Australasian Conference on Computer Science. 2010:89-98. |
[46] | ERIKSSON B , BARFORD P , SOMMERSY J , et al. A learn-ing-based approach for IP geolocation[C]// The 11th International Conference on Passive and Active Measurement. 2010:171-180. |
[47] | MAZIKU , HELLEN , SHETTY , et al. Enhancing the classification accuracy of IP geolocation[C]// The Conference on Military Com-munications. 2012:1-6. |
[48] | ARIF M J , KARUNASEKERA S , KULKARNI S , et al. Internet host geolocation using maximum likelihood estimation tech-nique[C]// The 24th IEEE International Conference on Advanced Information Networking and Applications. 2010:422-429. |
[49] | LAKI S , MáTRAY P , HáGA P , et al. Spotter:a model based active geolocation service[C]// The 30th IEEE Conference on Computer Communications(INFOCOM). 2011:3173-3181. |
[50] | ZHU G , LUO X , LIU F , et al. City-level geolocation algorithm of network entities based on landmark clustering[C]// The 18th Inter-national Conference on Advanced Communication Technology(ICACT). 2016:306-309. |
[51] | KATZ-BASSETT E , JOHN J P , KRISHNAMURTHY A , et al. Towards IP geolocation using delay and topology measure-ments[C]// The 6th ACM Sigcomm Conference on Internet Meas-urement. 2006:71-84. |
[52] | WONG B , STOYANOV I , SIRER E G , et al. Octant:a comprehensive framework for the geolocalization of Internet hosts[C]// The 4th Usenix Symposium on Networked Systems Design & Implementa-tion. 2007:313-326. |
[53] | ZHAO F , SONG Y , LIU F , et al. City-level geolocationbased on routing feature[C]// The 29th International Conference on Advanced Information Networking and Applications. 2015:414-419. |
[54] | CHEN J , LIU F , WANG T , et al. Towards region-level IP geoloca-tion based on the path feature[C]// The 17th International Confer-ence on Advanced Communication Technology(ICACT). 2015:468-471. |
[55] | RAE A , MURDOCK V , POPESCU A , et al. Mining the web for points of interest[C]// The 35th International ACM Sigir Conference on Research and Development in Information Retrieval. 2012:711-720. |
[1] | Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA. New hash function based on C-MD structure and chaotic neural network [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 1-15. |
[2] | Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU. Image double fragile watermarking algorithm based on block neighborhood [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 38-48. |
[3] | Liuqian SUN, Yuliang WEI, Bailing WANG. Novel similarity calculation method of multisource ontology based on graph convolution network [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 149-155. |
[4] | Zhiyong SUN,Xinsheng JI,Wei YOU,Quan YUAN. Research on backup and remapping of network slice based on security classification [J]. Chinese Journal of Network and Information Security, 2018, 4(11): 49-57. |
[5] | Ying-jun LI,Hong-li ZHANG,Xing WANG. Temporal relation recognition method based on news event fragments [J]. Chinese Journal of Network and Information Security, 2017, 3(6): 33-41. |
[6] | Jian-qiong HE,You-liang TIAN,Kai ZHOU. Provably secure social network privacy-preserving scheme [J]. Chinese Journal of Network and Information Security, 2016, 2(8): 62-67. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|