-
Essay / Cybercrime Tracking Essay - 630
Cybercrime Tracking ReportNowadays internet is a boon and everyone uses it right from schooling. We are able to connect one part of the world to another through the Internet. But there are few dark sides to using the Internet. Taking into account terrorists, they are able to harvest data via the Internet and Wi-Fi devices, making it more difficult to track them. Cyberterrorism is one of the major crimes in this world. But there is always a way to tackle the bad guys. We have a way to find them, it's called the wifi positioning tool. Previously we could track location based on IP address and Mac which could only fetch a wifi point but couldn't give us the hotspot of a particular device. This positioning tool can take us to a point from which a particular user accesses data on the Internet. We also call it the Marauder's Digital Map. Here we design a single antenna based system which verifies the traffic probe regarding the communication between different users in an undercover connected area. To increase the coverage area and traffic collection, we can increase the antenna gain and amplifiers through noise reduction techniques. There are procedures, experiments and also theorems to implement the correct way to follow forensic devices. As in this experiment, the detection limit is about 1 km radius and the forensic location accuracy has an error limited to 10 meters, which poses a serious threat to location privacy. There are various experiments conducted based on accuracy, traffic analysis, coverage area. , forensic localization and transmission distance. And yes, I believe it can be adopted. As the availability of resources to implement this can be easily organized and assembled... middle of document ...... examples taking into account such as modeling and countermeasures based on Internet threat monitors. But in the future, new traffic could be implemented by attackers, for which we will have to change methods and updates for users and their software. I agree that this research can be adopted using appropriate methods, being aware of the attacks and their measures. This should be implemented to get rid of future attacks against localized users with weak protection. QUOTES:1, http://www.pafree.net/media/TB-046.pdf2, http://www.wigle .net3, http://proxy.ulib.csuohio.edu:2076/stamp/stamp.jsp?tp=&arnumber=54533474, http://proxy.ulib.csuohio.edu:2076/stamp/stamp.jsp?tp =&arnumber=57409135, http://www.ajocict.net/uploads/V6N3P6-2013_AJOCICT_-_Prasad_et_al_-_Discriminating_DDoS_Attack_traffic_from_Flash_Crowds_on_Internet_Threat_Monitors_Using_Entropy_variations_.pdf