【24h】

A BRIEF STUDY ON GEOLOCATION AND ITS APPROACHES

机译:浅谈地理位置及其方法

获取原文
获取原文并翻译 | 示例
       

摘要

In the era of technology, Internet and e-mail progressed to be familiar by growing number of people, so does abusage of technology is broadening day by day which causes cybercrime. Although email is totally stable and safe means of communication, but we can say spoofing is basically a type of bomb that threaten the email system. Email spoofing is to misguide the recipient regarding the true start of the message. The attacker may forged the mail via link, through the attached files and hidden images in the header. Email header plays an important role in spoofing. Basically in the following paper we focused on various mapping tools and visualizing techniques to track the start of the attacker to further cease the birth of spoofed email. We also presented the overview of geolocation, different approaches of geolocation like IP2Geo - GeoPing, GeoCluster, CBG, TBG, Octant, Whois etc. These methods try to come up on the precise and close locality of the host.
机译:在技术时代,互联网和电子邮件通过越来越多的人熟悉,滥用技术的滥用是逐天扩大的,这导致网络犯罪。 虽然电子邮件是完全稳定和安全的通信手段,但我们可以说欺骗基本上是一种威胁电子邮件系统的炸弹。 电子邮件欺骗是误导收件人关于消息的真实开始。 攻击者可以通过链接,通过附加的文件和标题中的隐藏图像来伪造邮件。 电子邮件标题在欺骗中起着重要作用。 基本上在下文中,我们专注于各种映射工具和可视化技术,以跟踪攻击者的开始,以进一步停止欺骗电子邮件的诞生。 我们还提出了地理定位,地理定位的不同方法,如IP2Geo - Geoping,Geocluster,CBG,TBG,八章,WHOIS等。这些方法试图提出主机的精确和近在地。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号