Theft detection of computers using MAC address by map-reduce programming model on a cluster

Kartik Mandaville, Saurabh Suman, Varun Thacker, B. Ashwath Rao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Users of mobile devices face the problem of guarding their gadgets every time they are outdoors. Theft of laptops is the 3rd most frequent computer crime after virus and hacking. The really scary part is that according to FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due to accidents. It is a herculean task to manually locate the whereabouts of stolen or lost laptops. In this paper, we are proposing an automatic method of detecting stolen or lost hand-helds where the processing is carried out in a clustered network. The method is suitable only when the lost or stolen hand-held accesses monitored network from any location and perhaps under a new owner. The method involves logging network activity and searching through the logged information. Searching for lost hand-held in logged data will take substantial amount of time if processed in a single system. We propose a Map-Reduce based cluster processing for speedy processing of the logged data. The system is developed and will be setup in Manipal University Campus with an efficient identification method for the satisfaction of stolen or lost laptop users and network administrators.

Original languageEnglish
Title of host publicationProceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012
Pages250-253
Number of pages4
DOIs
Publication statusPublished - 25-07-2012
Externally publishedYes
Event2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012 - Chennai, India
Duration: 25-04-201227-04-2012

Conference

Conference2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012
CountryIndia
CityChennai
Period25-04-1227-04-12

Fingerprint

Computer programming
Computer crime
Mobile devices
Processing
Computer viruses
Accidents

All Science Journal Classification (ASJC) codes

  • Software

Cite this

Mandaville, K., Suman, S., Thacker, V., & Ashwath Rao, B. (2012). Theft detection of computers using MAC address by map-reduce programming model on a cluster. In Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012 (pp. 250-253). [6212676] https://doi.org/10.1109/RACSS.2012.6212676
Mandaville, Kartik ; Suman, Saurabh ; Thacker, Varun ; Ashwath Rao, B. / Theft detection of computers using MAC address by map-reduce programming model on a cluster. Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012. 2012. pp. 250-253
@inproceedings{ffa1db70dab64ecd9b532c19dc01badb,
title = "Theft detection of computers using MAC address by map-reduce programming model on a cluster",
abstract = "Users of mobile devices face the problem of guarding their gadgets every time they are outdoors. Theft of laptops is the 3rd most frequent computer crime after virus and hacking. The really scary part is that according to FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due to accidents. It is a herculean task to manually locate the whereabouts of stolen or lost laptops. In this paper, we are proposing an automatic method of detecting stolen or lost hand-helds where the processing is carried out in a clustered network. The method is suitable only when the lost or stolen hand-held accesses monitored network from any location and perhaps under a new owner. The method involves logging network activity and searching through the logged information. Searching for lost hand-held in logged data will take substantial amount of time if processed in a single system. We propose a Map-Reduce based cluster processing for speedy processing of the logged data. The system is developed and will be setup in Manipal University Campus with an efficient identification method for the satisfaction of stolen or lost laptop users and network administrators.",
author = "Kartik Mandaville and Saurabh Suman and Varun Thacker and {Ashwath Rao}, B.",
year = "2012",
month = "7",
day = "25",
doi = "10.1109/RACSS.2012.6212676",
language = "English",
isbn = "9781467302548",
pages = "250--253",
booktitle = "Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012",

}

Mandaville, K, Suman, S, Thacker, V & Ashwath Rao, B 2012, Theft detection of computers using MAC address by map-reduce programming model on a cluster. in Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012., 6212676, pp. 250-253, 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012, Chennai, India, 25-04-12. https://doi.org/10.1109/RACSS.2012.6212676

Theft detection of computers using MAC address by map-reduce programming model on a cluster. / Mandaville, Kartik; Suman, Saurabh; Thacker, Varun; Ashwath Rao, B.

Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012. 2012. p. 250-253 6212676.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Theft detection of computers using MAC address by map-reduce programming model on a cluster

AU - Mandaville, Kartik

AU - Suman, Saurabh

AU - Thacker, Varun

AU - Ashwath Rao, B.

PY - 2012/7/25

Y1 - 2012/7/25

N2 - Users of mobile devices face the problem of guarding their gadgets every time they are outdoors. Theft of laptops is the 3rd most frequent computer crime after virus and hacking. The really scary part is that according to FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due to accidents. It is a herculean task to manually locate the whereabouts of stolen or lost laptops. In this paper, we are proposing an automatic method of detecting stolen or lost hand-helds where the processing is carried out in a clustered network. The method is suitable only when the lost or stolen hand-held accesses monitored network from any location and perhaps under a new owner. The method involves logging network activity and searching through the logged information. Searching for lost hand-held in logged data will take substantial amount of time if processed in a single system. We propose a Map-Reduce based cluster processing for speedy processing of the logged data. The system is developed and will be setup in Manipal University Campus with an efficient identification method for the satisfaction of stolen or lost laptop users and network administrators.

AB - Users of mobile devices face the problem of guarding their gadgets every time they are outdoors. Theft of laptops is the 3rd most frequent computer crime after virus and hacking. The really scary part is that according to FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due to accidents. It is a herculean task to manually locate the whereabouts of stolen or lost laptops. In this paper, we are proposing an automatic method of detecting stolen or lost hand-helds where the processing is carried out in a clustered network. The method is suitable only when the lost or stolen hand-held accesses monitored network from any location and perhaps under a new owner. The method involves logging network activity and searching through the logged information. Searching for lost hand-held in logged data will take substantial amount of time if processed in a single system. We propose a Map-Reduce based cluster processing for speedy processing of the logged data. The system is developed and will be setup in Manipal University Campus with an efficient identification method for the satisfaction of stolen or lost laptop users and network administrators.

UR - http://www.scopus.com/inward/record.url?scp=84864055155&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84864055155&partnerID=8YFLogxK

U2 - 10.1109/RACSS.2012.6212676

DO - 10.1109/RACSS.2012.6212676

M3 - Conference contribution

AN - SCOPUS:84864055155

SN - 9781467302548

SP - 250

EP - 253

BT - Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012

ER -

Mandaville K, Suman S, Thacker V, Ashwath Rao B. Theft detection of computers using MAC address by map-reduce programming model on a cluster. In Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012. 2012. p. 250-253. 6212676 https://doi.org/10.1109/RACSS.2012.6212676