Abstract
Users of mobile devices face the problem of guarding their gadgets every time they are outdoors. Theft of laptops is the 3rd most frequent computer crime after virus and hacking. The really scary part is that according to FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due to accidents. It is a herculean task to manually locate the whereabouts of stolen or lost laptops. In this paper, we are proposing an automatic method of detecting stolen or lost hand-helds where the processing is carried out in a clustered network. The method is suitable only when the lost or stolen hand-held accesses monitored network from any location and perhaps under a new owner. The method involves logging network activity and searching through the logged information. Searching for lost hand-held in logged data will take substantial amount of time if processed in a single system. We propose a Map-Reduce based cluster processing for speedy processing of the logged data. The system is developed and will be setup in Manipal University Campus with an efficient identification method for the satisfaction of stolen or lost laptop users and network administrators.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012 |
Pages | 250-253 |
Number of pages | 4 |
DOIs | |
Publication status | Published - 25-07-2012 |
Externally published | Yes |
Event | 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012 - Chennai, India Duration: 25-04-2012 → 27-04-2012 |
Conference
Conference | 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012 |
---|---|
Country | India |
City | Chennai |
Period | 25-04-12 → 27-04-12 |
Fingerprint
All Science Journal Classification (ASJC) codes
- Software
Cite this
}
Theft detection of computers using MAC address by map-reduce programming model on a cluster. / Mandaville, Kartik; Suman, Saurabh; Thacker, Varun; Ashwath Rao, B.
Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012. 2012. p. 250-253 6212676.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
TY - GEN
T1 - Theft detection of computers using MAC address by map-reduce programming model on a cluster
AU - Mandaville, Kartik
AU - Suman, Saurabh
AU - Thacker, Varun
AU - Ashwath Rao, B.
PY - 2012/7/25
Y1 - 2012/7/25
N2 - Users of mobile devices face the problem of guarding their gadgets every time they are outdoors. Theft of laptops is the 3rd most frequent computer crime after virus and hacking. The really scary part is that according to FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due to accidents. It is a herculean task to manually locate the whereabouts of stolen or lost laptops. In this paper, we are proposing an automatic method of detecting stolen or lost hand-helds where the processing is carried out in a clustered network. The method is suitable only when the lost or stolen hand-held accesses monitored network from any location and perhaps under a new owner. The method involves logging network activity and searching through the logged information. Searching for lost hand-held in logged data will take substantial amount of time if processed in a single system. We propose a Map-Reduce based cluster processing for speedy processing of the logged data. The system is developed and will be setup in Manipal University Campus with an efficient identification method for the satisfaction of stolen or lost laptop users and network administrators.
AB - Users of mobile devices face the problem of guarding their gadgets every time they are outdoors. Theft of laptops is the 3rd most frequent computer crime after virus and hacking. The really scary part is that according to FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due to accidents. It is a herculean task to manually locate the whereabouts of stolen or lost laptops. In this paper, we are proposing an automatic method of detecting stolen or lost hand-helds where the processing is carried out in a clustered network. The method is suitable only when the lost or stolen hand-held accesses monitored network from any location and perhaps under a new owner. The method involves logging network activity and searching through the logged information. Searching for lost hand-held in logged data will take substantial amount of time if processed in a single system. We propose a Map-Reduce based cluster processing for speedy processing of the logged data. The system is developed and will be setup in Manipal University Campus with an efficient identification method for the satisfaction of stolen or lost laptop users and network administrators.
UR - http://www.scopus.com/inward/record.url?scp=84864055155&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84864055155&partnerID=8YFLogxK
U2 - 10.1109/RACSS.2012.6212676
DO - 10.1109/RACSS.2012.6212676
M3 - Conference contribution
AN - SCOPUS:84864055155
SN - 9781467302548
SP - 250
EP - 253
BT - Proceedings of the 2012 International Conference on Recent Advances in Computing and Software Systems, RACSS 2012
ER -