{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:49:30Z","timestamp":1770536970691,"version":"3.49.0"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T00:00:00Z","timestamp":1259625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2009,12]]},"abstract":"<jats:p>Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications such as reducing credit card fraud. This raises questions about the veracity of claims of accurate and reliable geolocation. We provide a survey of Internet geolocation technologies with an emphasis on adversarial contexts; that is, we consider how this technology performs against a knowledgeable adversary whose goal is to evade geolocation. We do so by examining first the limitations of existing techniques, and then, from this base, determining how best to evade existing geolocation techniques. We also consider two further geolocation techniques which may be of use even against adversarial targets: (1) the extraction of client IP addresses using functionality introduced in the 1.5 Java API, and (2) the collection of round-trip times using HTTP refreshes. These techniques illustrate that the seemingly straightforward technique of evading geolocation by relaying traffic through a proxy server (or network of proxy servers) is not as straightforward as many end-users might expect. We give a demonstration of this for users of the popular Tor anonymizing network.<\/jats:p>","DOI":"10.1145\/1592451.1592455","type":"journal-article","created":{"date-parts":[[2009,12,15]],"date-time":"2009-12-15T12:55:54Z","timestamp":1260881754000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["Internet geolocation"],"prefix":"10.1145","volume":"42","author":[{"given":"James A.","family":"Muir","sequence":"first","affiliation":[{"name":"Cloakware, ON, Canada"}]},{"given":"Paul C. Van","family":"Oorschot","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2009,12,14]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"684","article-title":"Method and apparatus for estimating a geographic location of a networked entity","volume":"6","author":"Anderson M.","year":"2004","journal-title":"United States Patent"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 4th USENIX Symposium on Networked Systems Design&amp;Implementation (NSDI). 173--186","author":"Casado M."},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Cooper I. Melve I. and Tomlinson G. 2001. Internet Web replication and caching taxonomy. RFC 3040 January. http:\/\/www.rfc-archive.org.   Cooper I. Melve I. and Tomlinson G. 2001. Internet Web replication and caching taxonomy. RFC 3040 January. http:\/\/www.rfc-archive.org.","DOI":"10.17487\/rfc3040"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Davis C. Vixie P. Goodwin T. and Dickinson I. 1996. A means for expressing location information in the domain name system. RFC 1876 January. http:\/\/www.rfc-archive.org.   Davis C. Vixie P. Goodwin T. and Dickinson I. 1996. A means for expressing location information in the domain name system. RFC 1876 January. http:\/\/www.rfc-archive.org.","DOI":"10.17487\/rfc1876"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 13th USENIX Security Symposium (Aug.). 303--320","author":"Dingledine R."},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Goldschlag D. Reed M. and \n      \n      \n      Syverson P\n      \n  \n  . \n  1996\n  . Hiding routing information. In Information Hiding First International Workshop Lecture Notes in Computer Science vol. \n  1174\n  . \n  Springer Berlin Germany 137--150.   Goldschlag D. Reed M. and Syverson P. 1996. Hiding routing information. In Information Hiding First International Workshop Lecture Notes in Computer Science vol. 1174. Springer Berlin Germany 137--150.","DOI":"10.1007\/3-540-61996-8_37"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028828"},{"key":"e_1_2_1_8_1","first-page":"947","article-title":"Method for geolocating logical network addresses","volume":"6","author":"Huffman S.","year":"2005","journal-title":"United States Patent"},{"key":"e_1_2_1_9_1","unstructured":"Information Technology Association of America. 2002. Ecommerce taxation and the limitations of geolocation tools November. http:\/\/www.itaa.org.  Information Technology Association of America. 2002. Ecommerce taxation and the limitations of geolocation tools November. http:\/\/www.itaa.org."},{"key":"e_1_2_1_10_1","unstructured":"Jesdanun A. 2004. World Wide Web Narrowing&quest; Associated Press. CBS News New York July 12.  Jesdanun A. 2004. World Wide Web Narrowing&quest; Associated Press. CBS News New York July 12."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177090"},{"key":"e_1_2_1_12_1","volume-title":"RFC","author":"Leech M.","year":"1928"},{"key":"e_1_2_1_13_1","unstructured":"Moore D. Periakaruppan R. Donohoe J. and Claffy K. 2000. Where in the world is netgeo.caida.org&quest; In Proceedings of the International Networking Conference (INET July). Poster.  Moore D. Periakaruppan R. Donohoe J. and Claffy K. 2000. Where in the world is netgeo.caida.org&quest; In Proceedings of the International Networking Conference (INET July). Poster."},{"key":"e_1_2_1_14_1","unstructured":"Muir J. and van Oorschot P. 2006. Internet geolocation and evasion. Tech. rep. TR-06-05 (April). School of Computer Science Carleton University Ottawa Canada.  Muir J. and van Oorschot P. 2006. Internet geolocation and evasion. Tech. rep. TR-06-05 (April). School of Computer Science Carleton University Ottawa Canada."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383073"},{"key":"e_1_2_1_16_1","first-page":"757","article-title":"Systems and methods for determining collecting and using geographic locations of Internet users","volume":"6","author":"Parekh S.","year":"2004","journal-title":"United States Patent"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of LISA: 13th Systems Administration Conference (Nov.). 69--78","author":"Periakaruppan R."},{"key":"e_1_2_1_18_1","unstructured":"Privoxy. 2008. Home page. http:\/\/www.privoxy.org.  Privoxy. 2008. Home page. http:\/\/www.privoxy.org."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_2_1_20_1","unstructured":"Syverson P. 2006. Personal communication January 30.  Syverson P. 2006. Personal communication January 30."},{"key":"e_1_2_1_21_1","volume-title":"Tor: Overview","author":"The Tor Project","year":"2008"},{"key":"e_1_2_1_22_1","unstructured":"Tribunal de Grande Instance de Paris. 2000. Yahoo&excl; Inc. v. La Ligue Contre Le Racisme et L'Antisemitisme and L'Union Des Etudients Juifs de France. Interim Court Order. November 20. http:\/\/www.cdt.org\/speech\/international\/20001120yahoofrance.pdf.  Tribunal de Grande Instance de Paris. 2000. Yahoo&excl; Inc. v. La Ligue Contre Le Racisme et L'Antisemitisme and L'Union Des Etudients Juifs de France. Interim Court Order. November 20. http:\/\/www.cdt.org\/speech\/international\/20001120yahoofrance.pdf."},{"key":"e_1_2_1_23_1","unstructured":"United States District Court. 2003. Barbara Nitke and the National Coalition for Sexual Freedom v. John Ashcroft Attorney General of the United States of American. Case no. 01 Civ. 11476 (RMB) 2003--2004. (Finkelstein testimony: http:\/\/www.sethf.com\/nitke\/ashcroft.php.) (Laurie testimony: http:\/\/www.apache-ssl.org\/nitke.pdf.)  United States District Court. 2003. Barbara Nitke and the National Coalition for Sexual Freedom v. John Ashcroft Attorney General of the United States of American. Case no. 01 Civ. 11476 (RMB) 2003--2004. (Finkelstein testimony: http:\/\/www.sethf.com\/nitke\/ashcroft.php.) (Laurie testimony: http:\/\/www.apache-ssl.org\/nitke.pdf.)"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 4th USENIX Symposium on Networked Systems Design&amp;Implementation (NSDI). 313--326","author":"Wong B.","year":"2007"},{"key":"e_1_2_1_25_1","volume-title":"5th International Workshop (PAM","volume":"3015","author":"Ziviani A.","year":"2004"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.08.013"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1592451.1592455","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1592451.1592455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:48Z","timestamp":1750249068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1592451.1592455"}},"subtitle":["Evasion and counterevasion"],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["10.1145\/1592451.1592455"],"URL":"https:\/\/doi.org\/10.1145\/1592451.1592455","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12]]},"assertion":[{"value":"2008-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-12-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}