Skip to main content
Top
Published in: Wireless Personal Communications 2/2013

01-11-2013

Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment

Authors: Young Hwan Lim, Dong Hwi Lee, Won Hyung Park, Kwang Ho Kook

Published in: Wireless Personal Communications | Issue 2/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Recently, the cyber terror is becoming more complicated, intelligent, and causing more damage. To react more effectively to the future cyber terrors, it will be necessary to anticipate new cyber terror techniques and devise the preventive measures for the possible vulnerabilities of the system before the hackers actually disable the system. This paper verified that the attacking technology on the new vulnerability can paralyze internet service of windows system and smart phone using Android OS. Finally, the routing packets are discarded before they reach the destination and the connection to the destination host cannot be established.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference 2012 Copyright Protection Report (2012). Korea Copyright Protection Center 2012 Copyright Protection Report (2012). Korea Copyright Protection Center
2.
go back to reference Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. In 13th USENIX Security Symposium. Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. In 13th USENIX Security Symposium.
4.
go back to reference Fathi, H., Shin, S., Kobara, K., & Imai, H. (2010). Purpose-restricted anonymous mobile communications using anonymous signatures in online credential systems. Wireless Personal Communications, 54(1), 225–236.CrossRef Fathi, H., Shin, S., Kobara, K., & Imai, H. (2010). Purpose-restricted anonymous mobile communications using anonymous signatures in online credential systems. Wireless Personal Communications, 54(1), 225–236.CrossRef
5.
go back to reference Gao, L., Ma, M., Shu, Y., & Wei, Y. (2013). A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems. Wireless Personal Communications, 68(4), 1943–1959.CrossRef Gao, L., Ma, M., Shu, Y., & Wei, Y. (2013). A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems. Wireless Personal Communications, 68(4), 1943–1959.CrossRef
6.
go back to reference Kafle, V. P. (2011). Masugi inoue “ID/locator split-based mobility scheme for heterogeneous new generation network”. Wireless Personal Communications, 61(4), 753–764.CrossRef Kafle, V. P. (2011). Masugi inoue “ID/locator split-based mobility scheme for heterogeneous new generation network”. Wireless Personal Communications, 61(4), 753–764.CrossRef
7.
go back to reference Lee, J. H. (2011). A study on the countermeasure of cyber attacks using anonymous network. Korea Information Assurance Society. Lee, J. H. (2011). A study on the countermeasure of cyber attacks using anonymous network. Korea Information Assurance Society.
8.
go back to reference NMC Consulting Group (2011). Netmanias technical paper: Principle of bittorrent protocol. NMC Consulting Group, 2011.05. NMC Consulting Group (2011). Netmanias technical paper: Principle of bittorrent protocol. NMC Consulting Group, 2011.05.
9.
go back to reference Prasad, R. (2006). Piracy over peer-to-peer based on personal network wireless personal communications. Wireless Personal Communications, 37(3–4), 221–231.CrossRef Prasad, R. (2006). Piracy over peer-to-peer based on personal network wireless personal communications. Wireless Personal Communications, 37(3–4), 221–231.CrossRef
10.
go back to reference Syverson, P. (2011). A peel of onion. In ACSAC ’11. Syverson, P. (2011). A peel of onion. In ACSAC ’11.
11.
go back to reference Syverson, P. Theory and design of low-latency anonymity systems (Lecture 2). U.S. Naval Research Laboratory. Syverson, P. Theory and design of low-latency anonymity systems (Lecture 2). U.S. Naval Research Laboratory.
Metadata
Title
Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment
Authors
Young Hwan Lim
Dong Hwi Lee
Won Hyung Park
Kwang Ho Kook
Publication date
01-11-2013
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2013
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1240-7

Other articles of this Issue 2/2013

Wireless Personal Communications 2/2013 Go to the issue