Cybercrime Tracking Essay

630 Words2 Pages

Report on Cybercrime Tracking

These days internet is a boon and everybody is using it right from schooling. We are able to connect one part of the world to another using internet. But there are few dark sides by the usage of internet. Taking terrorists under consideration, they are able to retrieve data through internet and wifi devices by which it gets harder to trace them out. Cyber terrorism is one of the major crimes in this world.
But there is always a way to tackle the wrong doers. We have a way to find them its called wifi positioning tool. Previously we were able to track the location based on ip and mac address that can only retrieve a wifi spot but cannot give us the access point of a particular device. This positioning tool can take us to a point from where particular user is accessing data over the internet. We also call it as a digital marauder’s map.
Here we design single-antenna based system which checks the traffic probe regarding the communication between different users in a connected area under coverage. To increase the coverage area and traffic collection, we can increase the antenna gain and amplifiers with noise reduction techniques. There are some procedures, experiments and also theorems in implementing the right way of tracking the forensic devices. As in this experiment the limit of detection is around 1km of radius and the accuracy of forensic localization has a error limited to 10 meters which is a serious threat to location privacy.
There are variety of experiments conducted based on accuracy, probing traffic, coverage area, forensic localization and transmission distance. And yes, I believe that it can be adopted. As the availability of resources to implement this can be easily arranged and assembled...

... middle of paper ...

...xamples taking under consideration like modeling and countermeasures based on internet threat monitors. But still in future there may be new traffic implementation by the attackers for which we need to change the methods and updates for users and their software.
I agree that this research can be adopted by using proper methods, being aware of attacks and its measures. This should be implemented to get rid of future attacks on localized users with low protection.

CITATIONS:
1, http://www.pafree.net/media/TB-046.pdf
2, http://www.wigle.net
3, http://proxy.ulib.csuohio.edu:2076/stamp/stamp.jsp?tp=&arnumber=5453347
4, http://proxy.ulib.csuohio.edu:2076/stamp/stamp.jsp?tp=&arnumber=5740913
5, http://www.ajocict.net/uploads/V6N3P6-2013_AJOCICT_-_Prasad_et_al_-_Discriminating_DDoS_Attack_traffic_from_Flash_Crowds_on_Internet_Threat_Monitors_Using_Entropy_variations_.pdf

More about Cybercrime Tracking Essay

Open Document