IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 457- 464

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Detection of Stolen or Lost Laptop Using MAC and IP Address Sachin S Bahade Student, M.Tech. Dept. of Computer Science and Engineering G. H. Raisoni College of Engineering Nagpur, Maharashtra, India.

[email protected] Lalit Dole Asst. Prof, Dept. of Computer Science and Engineering G. H. Raisoni College of Engineering Nagpur, Maharashtra, India.

[email protected]

Abstract—The number of personal users of laptop, computer, notebooks, palmtop increases day by day. As the importance of these devices increases in human life, their security is also the main task. By human mistake there is lots of these devices lost or someone intentionally theft this laptop. If this laptop is of some VIP person then that person felt lots of loss not only in the form of money but also in the form of valuable important data. If there are any chances of recovering theft laptop then it is well and good for laptop user. it not only save money but also return their most important data. In this paper, the method is proposed with the help of that user can track the location of theft when it is connected to the internet. It also provide the validation of theft and important data retrieval mechanism. Keywords—MAC Address, IP Address, tracking devices, lost devices, Theft detection.

I. INTRODUCTION As the number of computer laptop user increasing day by day, the computer laptop lost or stolen also increasing. Laptop is expensive devices and contains lots of important information. If the laptop of VIP person get stolen, it will be very dangerous for that person because if the emails are auto login then theft can misuse of their email. It is found that according to FBI, 10 laptop among 100 will be stolen within the next year. Only 3 percent will be return. It is extremely tedious job to physically locate the laptop, its almost impossible. So, some

Sachin S Bahade, IJRIT

457

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 457- 464

automatic methods require that not only save time for recover the lost or stolen laptop but also protecting the laptop that being stolen [4]. MAC address is nothing but the media acccess control which is also called as burned in address because this unique number is burned in factory which is assigned to NIC at the time of manufacturer. This MAC address is unique to each laptop which not changes, so this MAC address can be used to identify the device. IP Address is the internet protocol which has two versions IPV4 and IPV6. This IP address is used for the internet connectivity, the internet service provider gives the IPs to the client who has all information stored about the client and depending on the region this IPs are distributed. If we are able to find the IP address to which our stolen laptop is connected then we can track the location of laptop. So this MAC and IP Address is used to detect the ownership of laptop and finding the location of that stolen laptop.

II. INTRODUCTION TO MAC, IP ADDRESS, ARP A. MAC Address The MAC Address, A media access control address (MAC address) is a unique identifier assigned to network interface for communications on the physical network segment. MAC addresses are most often assigned by the manufacturer of a network interface controller (NIC) and are stored in its hardware, such as the card's read-only memory or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address (BIA). It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. This can be contrasted to a programmed address, where the host device issues commands to the NIC to use an arbitrary address[1]. MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC addresses are usually written in one of the following two formats: MM:MM:MM:SS:SS:SS or MM-MM-MM-SS-SS-SS. The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are regulated by an Internet standards body. The second half of a MAC address represents the serial number assigned to the adapter by the manufacturer. In the example, 00:A0:C9:14:C8:29. The prefix 00A0C9 indicates the manufacturer is Intel Corporation and 14C829 indicate products serial number[2]. A. IP Address Every machine on a network has a unique identifier. Just as you would address a letter to send in the mail, computers use the unique identifier to send data to specific computers on a network. Most networks today, including all computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network. In the TCP/IP protocol, the unique identifier for a computer is called its IP address. There are two standards for IP addresses: IP Version 4 (IPv4) and IP Version 6 (IPv6). IPv4 uses 32 binary bits to create a single unique address on the network. An IPv4 address is expressed by four numbers separated by dots. Each number is the decimal (base-10) representation for an eight-digit binary (base-2) number, also called an octet. For example: 216.27.61.137. IPv6 uses 128 binary bits to create a single unique address on the network. An IPv6 address is expressed by eight groups of hexadecimal (base-16) numbers separated by colons, as in 2001:cdba:0000:0000:0000:0000:3257:9652 [3]. There are five classes of IP address, these are shown in figure. The IP address divided into two parts. One is network id which identify in which network you are working and the second is host ID to identify the system on network.

Sachin S Bahade, IJRIT

458

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 457- 464

IP address can be either dynamic or static. A static address is one that you configure yourself by editing your computer's network settings. Dynamic addresses are the most common. They're assigned by the Dynamic Host Configuration Protocol (DHCP), a service running on the network. DHCP typically runs on network hardware such as routers or dedicated DHCP servers. Dynamic IP addresses are issued using a leasing system, meaning that the IP address is only active for a limited time. If the lease expires, the computer will automatically request a new lease. A. ARP Protocol Address Resolution Protocol (ARP) is one of the major protocol in the TCP/IP suit and the purpose of Address Resolution Protocol (ARP) is to resolve an IPv4 address (32 bit Logical Address) to the physical address (48 bit MAC Address). Network Applications at the Application Layer use IPv4 Address to communicate with another device. But at the Datalink layer, the addressing is MAC address (48 bit Physical Address), and this address is burned into the network card permanently. The purpose of Address Resolution Protocol (ARP) is to find out the MAC address of a device in your Local Area Network (LAN), for the corresponding IPv4 address, which network application is trying to communicate. When a source device want to communicate with another device, source device checks its Address Resolution Protocol (ARP) cache to find it already has a resolved MAC Address of the destination device. If it is there, it will use that MAC Address for communication. If ARP resolution is not there in local cache, the source machine will generate an Address Resolution Protocol (ARP) request message, it puts its own data link layer address as the Sender Hardware Address and its own IPv4 Address as the Sender Protocol Address. It fills the destination IPv4 Address as the Target Protocol Address. The Target Hardware Address will be left blank, since the machine is trying to find that. The source broadcast the Address Resolution Protocol (ARP) request message to the local network. The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address (IPv4 Address of the machine to which the source is trying to communicate) with its own Protocol Address (IPv4 Address). Those who do not match will drop the packet without any action. When the targeted device checks the Target Protocol Address, it will find a match and will generate an Address Resolution Protocol (ARP) reply message. It takes the Sender Hardware

Sachin S Bahade, IJRIT

459

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 457- 464

Address and the Sender Protocol Address fields from the Address Resolution Protocol (ARP) request message and uses these values for the Targeted Hardware Address and Targeted Protocol Address of the reply message. The destination device will update its Address Resolution Protocol (ARP) cache, since it need to contact the sender machine soon. Destination device send the Address Resolution Protocol (ARP) reply message and it will NOT be a broadcast, but a unicast. The source machine will process the Address Resolution Protocol (ARP) reply from destination, it store the Sender Hardware Address as the layer 2 address of the destination. The source machine will update its Address Resolution Protocol (ARP) cache with the Sender Hardware Address and Sender Protocol Address it received from the Address Resolution Protocol (ARP) reply message [5].

III.METHOD The method created for laptop location tracking based on MAC and IP address contain the four modules. These are window application, web application, Image Capture and Data up loader. First window application running automatically through window service when laptop starts. Web application is used for the laptop owner for managing the necessary information like update the status of laptop that laptop is stolen or not, laptops MAC address, adapter address ettc. Web application is used to manage all the laptop detail where all the information used to find laptop store here. whenever steal laptop connect to internet details about laptop location, image of theft send on this web application which is host on web and automatic recover the important data that we specified earlier. The details of this modules are: A.Web Application This web application made to enter the necessary information which is used to manage the laptop information and stolen information. In this application user first login and add necessary information like MAC address, adapter address etc. After registration if your laptop is stolen then mark IsStolen checkbox.

Fig: Web Application If laptop is stolen then mark this ckeckbox. Whenever the theft connect laptop to the internet, it retrieve the MAC address and IP address and send to this web application and also send the image of the theft who operate on that laptop and send on this web application. This is shown on below figure.

Sachin S Bahade, IJRIT

460

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 457- 464

B.Window Application This is window application which is installed on the laptop and run automatically through window service. When the laptop start at the first this window application run with window service automatically. To retrieve the MAC address at stolen laptop GetMacAddress() and GetIPAddress() function is call. this is the functions of Network classes where the hardwares MAC address and IP address of internet to which laptop connect retrieve and send it to the web aaplication. For the image capturing, one of the algorithm user. the steps of theft is that. 1. 2. 3. 4. 5. 6. 7. 8.

Initialize the component. Check the status of laptop on web. Initialize the image capture_query small frame() function. wait delay for capturing time Save image into file demo.png read all bits of image file and convert to binary format. Send this image to web application. delete the previous demo.png for next image.

The below figure show the image of theft.

Fig: Window Application with image of theft C. Data Replication All the data of laptop is important but some of them are very important like bank account detail, some secret information etc that may be encoded or not it up to the user. If laptop is stoled and user want that secure data backup, so this data replication is most useful. first data which need to be replicate specify and after stolen if you make your status stolen then that specified data replicate on your skydrive account. The snapshot given is as below.

Sachin S Bahade, IJRIT

461

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 457- 464

One of the Sync algorithm is used to follow the procedure of upload the file with skydives for replication these are below. 1. 2.

3. 4. 5. 6. 7.

Initialize files and path Load files, a. If path exist then decrypt the path. b. Read all lines of path to files. Upload the files Create a client for drive Create clients credentials, client id, secret password, file extension. Create web folder info For each path in file a. For each file in directory b. If file in not null and have supported extension c. Then upload file

E.Result & Discussing In the result, we get the MAC address of the laptop which is stolen and also get the IP address from which this laptop is connected to the laptop. In the below figure, we get the MAC address 00268918344D show the identification of laptop has unique address and IP Address 103.8.45.5, the address from where laptop access the internet which also show the location of laptop as given in below figure. With this MAC and IP address it give the image of theft who sat in front of owners laptop as shown in below.

Fig: IP and MAC address with Image of theft

Sachin S Bahade, IJRIT

462

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 457- 464

Fig: Geological location of stolen laptop.

Fig: Geolocation of IP using the data replication, we retrieve the important information and replicate that data and upload on the skydrive automatically. The upload automatically as shown in below fig.

Fig: Data upload on skydrive

This location is nothing but the location of ISP which have all the information of client to which they provide the public IP. With the help of law inforcement force we can catch the theft find out exact location of laptop and retrieve the laptop.

Sachin S Bahade, IJRIT

463

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 457- 464

IV. CONCLUSION This paper described about the laptop location tracking. With the help of MAC and IP address automatic method that proposed can track the location of laptop and with the help of law enforcement force we can find the exact location of laptop and theft. A laptop theft image also get by user and can retrieve important information that specified by the user and automatically upload on skydrive.

REFERENCES [1] [2] [3] [4]

http://en.wikipedia.org/wiki/MAC_address http://compnetworking.about.com/od/networkprotocolsip/l/aa062202a.htm. http://computer.howstuffworks.com/internet/basics/question549.htm S.-S. Lin, I.-C. Yeh, C.-H. Lin, and T.-Y. Lee, “Theft Detection of Computers using MAC address by Map-Reduce Programming Model on a Cluster,” IEEE conference, 2012. [5] http://www.omnisecu.com/tcpip/address-resolution-protocol-arp.php. [6] Christian Roy, “An Alternative Approach to Identifying Stolen Network Clients Using DHCP., school of computer science, Christian RoycGill university, http://scholar.google.co.in/scholar [7] Patric Droz, “DISCOVERING STOLEN OR LOST NETWORK-ATTACHABLE COMPUTER system,” patent no. US006950946B1 27 sept 2007,http://scholar.google.co.in/scholar.. [8] Luke E. Girard, Santa Clara, CA (US), “PROTECTION OF LAPTOP COMPUTERS FROM THEFT IN THE STREAM OF COMMERCE,”http://scholar.google.co.in/scholar. [9] Wehrenberg, Palo Alto, CA “ACCELERATION-BASED THEFT DETECTION SYSTEM FOR PORTABLE ELECTRONIC DEVICES,http://scholar.google.co.in/scholar. [10] marc,eric, lavy., “ENABLING SURVEILLANCE OF NETWORK CONNECTED DEVICE,” http://scholar.google.co.in/scholar. [11] Kenneth Vernon Westin, Portland, “MOBILE DEVICE OR COMPUTER THEFT Classification,http://scholar.google.co.in/scholar. [12] METHOD AND APPARATUS FOR AUTOMATIC RECOVERY OF A STOLEN 0B ECT,,....Narayan L- Gehlot, sayrev,http://scholar.google.co.in/scholar. [13] SYSTEM AND METHOD FOR TRACKING LAPTOP COMPUTERS.....Robert K. Johnson, Detroit, MI (US),http://scholar.google.co.in/scholar. [14] Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties ,http://scholar.google.co.in/scholar. [15] MOBILE DEVICE OR COMPUTER THEFT RECOVERY SYSTEM AND METHOD.......Kenneth Vernon Westin, Portland,http://scholar.google.co.in/scholar. [16] SYSTEM AND METHOD FOR LOCATING MOBILE DEVICES THROUGH A DIRECTCONNECTION PROTOCOL.......Janakiraman Gopalan, Cupertino, CA.,http://scholar.google.co.in/scholar. [17] METHOD AND APPARATUS FOR LOCATION-BASED RECOVERY OF STOLEN MOBILE DEVICES......David A. Sandage,http://scholar.google.co.in/scholar. [18] MOBILE DEVICE TRACKING AND LOCATION AWARENESS .....TOIIll Blinnikka,http://scholar.google.co.in/scholar. [19] Trajce Dimkov, Wolter Pieters, Pieter Hartel, “Laptop Theft: A Case Study on the Effectiveness of”,CCS’10, October 4–8, 2010, Chicago, Illinois, USA,ACM 978-1-4503-02449/10/10.

Sachin S Bahade, IJRIT

464

Detection of Stolen or Lost Laptop Using MAC and IP ...

Abstract—The number of personal users of laptop, computer, notebooks, palmtop increases day by day. As the importance of these devices increases in human ...

864KB Sizes 4 Downloads 199 Views

Recommend Documents

Detection of Stolen or Lost Laptop Using MAC and IP ...
of that user can track the location of theft when it is connected to the internet. It also provide the validation of theft and important data retrieval mechanism. Keywords—MAC Address, IP Address, tracking devices, lost devices, Theft detection. I.

Hitlist Worm Detection using Source IP Address History - University of ...
The University of Melbourne, Australia. {jkcchan, caleckie, tpeng}@csse.unimelb.edu.au. Abstract—Internet worms are a growing menace due to their increasing sophistication and speed of propagation. Although there have been many different detection

Hitlist Worm Detection using Source IP Address History
addresses between regular users and scanning hosts to distinguish ... fic patterns and consider these as worm signatures [10] [15] ... To the best of our knowledge, our ..... of service attacks: Characterization and implications for cdns and web.

Detection of Runway and Obstacles using Electro-optical and ieee.pdf ...
Jan 23, 2014 - Detection of Runway and Obstacles using Electro-optical and ieee.pdf. Detection of Runway and Obstacles using Electro-optical and ieee.pdf.

2009_TRR_Draft_Video-Based Vehicle Detection and Tracking Using ...
2009_TRR_Draft_Video-Based Vehicle Detection and Tracking Using Spatiotemporal Maps.pdf. 2009_TRR_Draft_Video-Based Vehicle Detection and Tracking ...

Detection of Russian Fires Using MOPITT and MODIS ...
roles in atmospheric chemistry, cloud microphysics, and radiation balance in the ... written permission of the publisher: Trans Tech Publications Ltd, Switzerland, ...

Identification and Detection of Phishing Emails Using Natural ...
See all ›. 22 References. See all ›. 1 Figure. Download citation. Share. Facebook .... owned Internet Security company lists the recent phishing attacks. [22].

Detection of Russian Fires Using MOPITT and MODIS ...
2Advanced Environmental Monitoring Research Center (ADEMRC), Dept. of ... 3Atmospheric Radiation Laboratory/ Ozone Observatory Global Environment ...

Pair of lice lost or parasites regained
Mar 7, 2007 - Email: David L Reed* - [email protected]; Jessica E Light ..... and we have instead relied upon ad-hoc phylogenetic tests to determine ...

Automated Detection of Engagement using Video-Based Estimation of ...
Abstract—We explored how computer vision techniques can be used to detect ... supervised learning for detection of concurrent and retrospective self-reported engagement. ...... [49] P. Ekman and W. V. Friesen, Facial Action Coding System: A ... [On

A Self-Adaptive Detection System for MAC Misbehavior ...
reasons can significantly degrade the performance of mobile ad- hoc networks. Currently, detection systems for handling selfish misbehavior has been proposed ...

Automated Detection of Engagement using Video-Based Estimation of ...
Abstract—We explored how computer vision techniques can be used to detect engagement while ... supervised learning for detection of concurrent and retrospective self-reported engagement. ...... [Online]. Available: http://msdn.microsoft.com/en-us/l

Network Security using IP Traceback Techniques - IJRIT
The original aim of the Internet was to provide an open and scalable network among ... Blocking the availability of an Internet service may imply large financial.

Network Security using IP Traceback Techniques - IJRIT
And the toughest problem of Network Security is to trace the ... annual Computer Security Institute (CSI) computer crime and security survey reported that ...

Face Detection and Tracking Using Live Video Acquisition - MATLAB ...
Face Detection and Tracking Using Live Video Acquisition - MATLAB & Simulink Example.pdf. Face Detection and Tracking Using Live Video Acquisition ...

Using instantaneous frequency and aperiodicity detection to estimate ...
Jul 22, 2016 - and F0 modulation are not included in the definition of aperiod- icity. What is left after ..... It may serve as an useful infrastructure for speech re-.

large scale anomaly detection and clustering using random walks
Sep 12, 2012 - years. And I would like to express my hearty gratitude to my wife, Le Tran, for her love, patience, and ... 1. Robust Outlier Detection Using Commute Time and Eigenspace Embedding. Nguyen Lu ..... used metric in computer science. Howev

Human eye sclera detection and tracking using a ...
Keywords: Human eye detection; Eye sclera motion tracking; Time-adaptive SOM; TASOM; .... rectly interact with the eye tracking system when it is in oper- ation ...

Cloth Simulation and Collision Detection using ...
achieved a significant performance gain over the existing method. Since the size of ... Element Modeling and Control of Flexible Fabric Parts. IEEE. Computer ...

A Framework for Malware Detection Using Ensemble Clustering and ...
Static Analysis module, that provides static information, such as files, antivirus reports, PE structure, file entropy, Packer Signature, and strings. 2. Dynamic Analysis module, which extracts the program behavior, by using a DLL, that will be added

Credit Card Fraud Detection Using Neural Network
some of the techniques used for creating false and counterfeit cards. ..... The illustration merges ... Neural network is a latest technique that is being used in.

detection of urban zones in satellite images using ...
Keywords - Classification, object detection, remote sensing, ..... ural scene categories,” IEEE Computer Society Conference on Computer. Vision and Pattern ...