Paper accepted by Institute of Electrical & Electronic Engineers

I am really excited to announce the publication of my paper on Improving IP Geolocation by the IEEE

This study identifies a method to create fine-grained multilayer maps of the Internet’s structure, which are currently lacking. We begin with an investigation of current techniques for geolocating hosts using passive, active, and hybrid methods. This is followed by a survey of the fundamental problems that IP geolocation techniques must address. The survey points to the obvious difficulties in using Delay-Distance models and suggests that the use of Return Trip Times can lead to highly misleading results.

We therefore develop a new procedure that combines state-of-the-art methods to avoid many of the fundamental problems in Internet topology mapping, whilst creating finer-grained internet maps than those currently available. This procedure is tested on the UK infrastructure by conducting a series of tests using distributed measurement points provided by the RIPE Atlas platform.

Our results show that we can accurately geolocate routers between two endpoints to create a fine-grained map of the internet infrastructure involved in our measurements. Researchers have long recognized the scarcity of ground truth datasets where IP geolocation is a concern. As a byproduct of our new method reported in this paper, we create a validation dataset that maps hundreds of IP addresses to geo-coordinate landmarks or vantage points, which is highly desirable for IP geolocation research.

Finally, we discuss some limitations of this method, and we summarise the next steps toward accurate and complete Internet infrastructure maps.

The Paper can be found at:-

Published in: IEEE Access ( Volume: 11)

Page(s): 59935 – 59953

Date of Publication: 31 May 2023 

Electronic ISSN: 2169-3536

DOI: 10.1109/ACCESS.2023.3281333 Publisher: IEEE

At the National Cyber Security Conference in Newport Wales


Sponsored by the NCSC to Attend the National Cyber Security Center (NCSC) Cyber Conference in Newport Wales.

Chinese hacking group targeting Microsoft Exchange Servers

The campaign has exploited recently discovered flaws in Microsoft Exchange software, stealing email and infecting computer servers with tools that let attackers take control remotely,

“Everyone running these servers needs to act now to patch them. We are concerned that there are a large number of victims,” White House spokeswoman Jennifer Psaki said .

After Microsoft released patches for the vulnerabilities on Tuesday, attacks “dramatically stepped up” on servers not yet updated with security fixes, said Krebs, who cited unnamed sources familiar with the situation

In a blog post on Tuesday, Microsoft executive Tom Burt said the company had released updates to fix the security flaws, which apply to on-premises versions of the software rather than cloud-based versions, and urged customers to apply them

Please ensure your On site Exchange Servers are fully patched or call Cloud9 for help, advice and support.