scholarly journals Retrospective IP Address Geolocation for Geography-Aware Internet Services

Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 4975
Author(s):  
Dan Komosny

The paper deals with the locations of IP addresses that were used in the past. This retrospective geolocation suffers from continuous changes in the Internet space and a limited availability of past IP location databases. I analyse the retrospective geolocation of IPv4 and IPv6 addresses over five years. An approach is also introduced to handle missing past IP geolocation databases. The results show that it is safe to retrospectively locate IP addresses by a couple of years, but there are differences between IPv4 and IPv6. The described parametric model of location lifetime allows us to estimate the time when the address location changed in the past. The retrospective geolocation of IP addresses has a broad range of applications, including social studies, system analyses, and security investigations. Two longitudinal use cases with the applied results are discussed. The first deals with geotargeted online content. The second deals with identity theft prevention in e-commerce.

2015 ◽  
Vol 7 (3) ◽  
pp. 1-23 ◽  
Author(s):  
Benjamin Edelman ◽  
Michael Schwarz

We consider market rules for transferring IP addresses, numeric identifiers required by all computers connected to the Internet. Transfers usefully move resources from lowest- to highest-valuation networks, but transfers tend to cause socially costly growth in the Internet's routing table. We propose a market rule that avoids excessive trading and comes close to achieving social efficiency. We argue that this rule is feasible despite the limited powers of central authorities. We also offer a framework for reasoning about future prices of IP addresses, then explore the role of rentals in sharing information about the value of IP address and assuring allocative efficiency. (JEL D47, D82, D85, L86)


2019 ◽  
Vol 4 (2) ◽  
pp. 137 ◽  
Author(s):  
Nfn Sarip ◽  
Arief Setyanto

The use of the internet today has become a necessity, the most commonly used media to connect to the internet is a Wireless LAN network. For easy access to the network, DHCP service become a standard feature that must exist, because ordinary users no longer need to think about procedures for configuring IP addresses, all of which have been done automatically by the DHCP service. But it turns out that there is a security threat to DHCP service, namely DHCP Starvation attacks that can be exhausting the availability of IP addresses in DHCP service so that the configuration of IP address automatically can no longer be done on the client. Various methods such as authentication, cryptography, and machine learning are used by researchers in preventing DHCP Starvation attacks, but the issue of effectiveness and efficiency still opens up further research opportunities. In this research, packet filtering methods based on DSCP code applied to the Netfilter system are used to do prevention of DHCP Starvation attacks, this method has proven to be very effective in making prevention and more efficient when applied on small scale wireless networks such as at office networks and internet cafe.


Author(s):  
Boris Peltsverger ◽  
Svetlana Peltsverger ◽  
Michael Bartolacci

Multimedia traffic on the Internet has grown dramatically in the past few years. Web sites, such as YouTube and Hulu, offer entertainment and educational multimedia content that previously was only available through broadcast or cable television and on storage media, such as CD-ROMs and videotapes. Latency is a key issue in the delivery of online content, especially with respect to multicasting. The authors’ proposed approach seeks to reduce overall latency for multicast streams.


Author(s):  
Boris Peltsverger ◽  
Svetlana Peltsverger ◽  
Michael Bartolacci

Multimedia traffic on the Internet has grown dramatically in the past few years. Web sites, such as YouTube and Hulu, offer entertainment and educational multimedia content that previously was only available through broadcast or cable television and on storage media, such as CD-ROMs and videotapes. Latency is a key issue in the delivery of online content, especially with respect to multicasting. The authors’ proposed approach seeks to reduce overall latency for multicast streams.


2018 ◽  
Vol 10 (2) ◽  
pp. 74-94 ◽  
Author(s):  
Jonathan McKeague ◽  
Kevin Curran

The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical IP restrictions and thus render some category of fraud prevention useless. Anonymous proxies (AP) which act as intermediate relays which disguise the source IP addresses can play a large role in cybercrime. There is a need to ascertain whether an incoming IP connection is an original source matched IP address, or one being routed through an anonymising proxy. This article concentrates on various methods used by anonymising proxies, the characteristics of the anonymous proxies and the potential mechanisms available to detect if a proxy is in use.


Resonance ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 191-210
Author(s):  
Joshua Hudelson

Over the past decade, ASMR (Autonomous Sensory Meridian Response) has emerged from whisper-quiet corners of the Internet to become a bullhorn of speculation on the human sensorium. Many consider its sonically induced “tingling” to be an entirely novel, and potentially revolutionary, form of human corporeality—one surprisingly effective in combating the maladies of a digitally networked life: insomnia, anxiety, panic attacks, and depression. Complicating these claims, this article argues that ASMR is also neoliberal repackaging of what Marx called the reproduction of labor power. Units of these restorative “tingles” are exchanged for micro-units of attention, which YouTube converts to actual currency based on per-1,000-view equations. True to the claims of Silvia Federici and Leopoldina Fortunati, this reproductive labor remains largely the domain of women. From sweet-voiced receptionists to fawning sales clerks (both of whom are regularly role-played by ASMRtists), sonic labor has long been a force in greasing the gears of capital. That it plays a role in production is a matter that ASMRtists are often at pains to obscure. The second half of this article performs a close reading of what might be considered the very first ASMR film: Chantal Akerman’s Jeanne Dielman, 23 quai du Commerce, 1080 Bruxelles. Through this film, the exploitative dimensions of ASMR can be contrasted with its potential for creating protected spaces of financial independence and nonnormative corporeal practices.


Author(s):  
Lindsey C Bohl

This paper examines a few of the numerous factors that may have led to increased youth turnout in 2008 Election. First, theories of voter behavior and turnout are related to courting the youth vote. Several variables that are perceived to affect youth turnout such as party polarization, perceived candidate difference, voter registration, effective campaigning and mobilization, and use of the Internet, are examined. Over the past 40 years, presidential elections have failed to engage the majority of young citizens (ages 18-29) to the point that they became inclined to participate. This trend began to reverse starting in 2000 Election and the youth turnout reached its peak in 2008. While both short and long-term factors played a significant role in recent elections, high turnout among youth voters in 2008 can be largely attributed to the Obama candidacy and campaign, which mobilized young citizens in unprecedented ways.


2021 ◽  
Vol 155 ◽  
pp. 107174 ◽  
Author(s):  
Jianxin Wang ◽  
Ming K. Lim ◽  
Chao Wang ◽  
Ming-Lang Tseng

Author(s):  
Ruofan Liao ◽  
Paravee Maneejuk ◽  
Songsak Sriboonchitta

In the past, in many areas, the best prediction models were linear and nonlinear parametric models. In the last decade, in many application areas, deep learning has shown to lead to more accurate predictions than the parametric models. Deep learning-based predictions are reasonably accurate, but not perfect. How can we achieve better accuracy? To achieve this objective, we propose to combine neural networks with parametric model: namely, to train neural networks not on the original data, but on the differences between the actual data and the predictions of the parametric model. On the example of predicting currency exchange rate, we show that this idea indeed leads to more accurate predictions.


2021 ◽  
Vol 64 (1) ◽  
pp. 23-40
Author(s):  
Katrien Pype

AbstractIn the 2016 Abiola Lecture, Mbembe argued that “the plasticity of digital forms speaks powerfully to the plasticity of African precolonial cultures and to ancient ways of working with representation and mediation, of folding reality.” In her commentary, Pype tries to understand what “speaking powerfully to” can mean. She first situates the Abiola Lecture within a wide range of exciting and ongoing scholarship that attempts to understand social transformations on the continent since the ubiquitous uptake of the mobile phone, and its most recent incarnation, the smartphone. She then analyzes the aesthetics of artistic projects by Alexandre Kyungu, Yves Sambu, and Hilaire Kuyangiko Balu, where wooden doors, tattoos, beads, saliva, and nails correlate with the Internet, pixels, and keys of keyboards and remote controls. Finally, Pype asks to whom the congruence between the aesthetics of a “precolonial” Congo and the digital speaks. In a society where “the past” is quickly demonized, though expats and the commercial and political elite pay thousands of dollars for the discussed art works, Pype argues that this congruence might be one more manifestation of capitalism’s cannibalization of a stereotypical image of “Africa.”


Sign in / Sign up

Export Citation Format

Share Document