Theft Detection of Computers using MAC address by MapReduce Programming Model on a Cluster

Mandaville, Kartik and Suman, Saurabh and Thacker , Varun and Rao, Ashwath B (2012) Theft Detection of Computers using MAC address by MapReduce Programming Model on a Cluster. In: International COnference on recent advances in Computing and software Systems, 25-27, Chennai.

[img] PDF
ashwath.pdf - Published Version
Restricted to Registered users only

Download (594kB) | Request a copy


Users of mobile devices face the problem of guarding the gadgets everytime they are outdoors. Theft of laptops is the 3rd most computer crime after virus and hacking. The really scary part is that according to FBI [3], 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due to accidents. It is a herculean task to manually locate whereabouts of stolen or lost laptops. In this paper, we are proposing an automatic method of detecting stolen or lost handhelds where the processing is carried out in a clustered network. The method is suitable only when the lost or stolen handheld accesses monitored network from any location and perhaps under a new owner. The method involves logging network activity and searching through the logged information. Searching for lost handheld in logged data will take substantial amount of time if processed in a single system. We propose a Map-Reduce based cluster processing for speedy processing of the logged data. The system is developed and will be setup in Manipal University Campus with an efficient identification method for the satisfaction of stolen or lost laptop users and network administrators.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Theft Detection, Mobile Devices, MapReduce, Cluster Computing
Subjects: Engineering > MIT Manipal > Computer Science and Engineering
Depositing User: Dr. Rekha D. Pai
Date Deposited: 15 Mar 2013 09:24
Last Modified: 15 Mar 2013 09:24

Actions (login required)

View Item View Item