Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 4/2015

01-07-2015

Extracting real IP address used to connect to P2P messenger using ARIT agent

Authors: Yong-Ho Kim, Jae Hoon Sun

Published in: Peer-to-Peer Networking and Applications | Issue 4/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kyu Sung Ahn (2010) The proposal of access blocking methods in messenger. Korea Computer Congress 37(1D):91–94 Kyu Sung Ahn (2010) The proposal of access blocking methods in messenger. Korea Computer Congress 37(1D):91–94
2.
go back to reference Kum Uk Seo, Messenger structure construction using WCF, Microsoft e-book, 2007 Kum Uk Seo, Messenger structure construction using WCF, Microsoft e-book, 2007
3.
go back to reference Jung Im Kim, Research using of messenger as an emotional communication tool; with the focus on MSN messenger and Nate On, Tongmyung information technology University Master’s thesis, 2006. Jung Im Kim, Research using of messenger as an emotional communication tool; with the focus on MSN messenger and Nate On, Tongmyung information technology University Master’s thesis, 2006.
4.
go back to reference Deok-Young, Kim, (A) study on application of emotion for the web messenger interface: focused on comparison between MSN windows live messenger and NATE ON messenger, Hanyang University Master’s thesis, 2006. Deok-Young, Kim, (A) study on application of emotion for the web messenger interface: focused on comparison between MSN windows live messenger and NATE ON messenger, Hanyang University Master’s thesis, 2006.
5.
go back to reference Kim SH, Chung K (2014) 3D simulator for stability analysis of finite slope causing plane activity. Multimedia Tools Applic 68(2):455–463CrossRef Kim SH, Chung K (2014) 3D simulator for stability analysis of finite slope causing plane activity. Multimedia Tools Applic 68(2):455–463CrossRef
6.
go back to reference Jung EY, Kim JH, Chung K, Park DK (2013) Home health gateway based healthcare services through U-health platform. Wirel Pers Commun 73(2):207–218CrossRef Jung EY, Kim JH, Chung K, Park DK (2013) Home health gateway based healthcare services through U-health platform. Wirel Pers Commun 73(2):207–218CrossRef
7.
go back to reference Kang SK, Chung K, Ryu JK, Rim KW, Lee JH (2013) Bio-interactive healthcare service system using lifelog based context computing. Wirel Pers Commun 73(2):341–351CrossRef Kang SK, Chung K, Ryu JK, Rim KW, Lee JH (2013) Bio-interactive healthcare service system using lifelog based context computing. Wirel Pers Commun 73(2):341–351CrossRef
8.
go back to reference Anas hardan “Peer to peer (P2P) network” ISYM 540 Current Topics in Information System Management Anas hardan “Peer to peer (P2P) network” ISYM 540 Current Topics in Information System Management
9.
go back to reference Kang SK, Chung K, Lee JH (2014) Development of head detection and tracking systems for visual surveillance. Pers Ubiquit Comput 18(3):515–522CrossRef Kang SK, Chung K, Lee JH (2014) Development of head detection and tracking systems for visual surveillance. Pers Ubiquit Comput 18(3):515–522CrossRef
10.
go back to reference Ha OK, Song YS, Chung K, Lee KD, Park D (2014) Relation model describing the effects of introducing RFID in the supply chain: evidence from the food and beverage industry in South Korea. Pers Ubiquit Comput 18(3):553–561CrossRef Ha OK, Song YS, Chung K, Lee KD, Park D (2014) Relation model describing the effects of introducing RFID in the supply chain: evidence from the food and beverage industry in South Korea. Pers Ubiquit Comput 18(3):553–561CrossRef
11.
go back to reference Kim JY, Chung K, Jung JJ (2014) Single tag sharing scheme for multiple-object RFID applications. Multimedia Tools Appl 68(2):465–477CrossRef Kim JY, Chung K, Jung JJ (2014) Single tag sharing scheme for multiple-object RFID applications. Multimedia Tools Appl 68(2):465–477CrossRef
12.
go back to reference Krupiarz CJ, Heggestad BK Flying CFDP on messenger Krupiarz CJ, Heggestad BK Flying CFDP on messenger
13.
go back to reference Magharei N, Rejaie R. ISP-Friendly P2P Streaming University of Oregon IEEE COMSOC MMTC E-Letter Magharei N, Rejaie R. ISP-Friendly P2P Streaming University of Oregon IEEE COMSOC MMTC E-Letter
14.
go back to reference Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems,” in ACM SIGCOMM Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems,” in ACM SIGCOMM
15.
go back to reference N. Magharei and R. Rejaie, “Overlay monitoring and repair in swarm-based peer-to-peer streaming,” in ACM NOSSDAV, 2009 N. Magharei and R. Rejaie, “Overlay monitoring and repair in swarm-based peer-to-peer streaming,” in ACM NOSSDAV, 2009
16.
go back to reference Crespo A, Garcia Molina H (2002) Routing indices for peer-to-peer systems. In Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), July 2002 Crespo A, Garcia Molina H (2002) Routing indices for peer-to-peer systems. In Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), July 2002
17.
go back to reference Crespo A, Garcia-Molina H (2003) Semantic overlay networks for P2P systems. In Proceedings of the 29th VLDB Conference, 2003 Crespo A, Garcia-Molina H (2003) Semantic overlay networks for P2P systems. In Proceedings of the 29th VLDB Conference, 2003
18.
go back to reference Koloniari G, Pitoura E (2005) Peer-to-peer management of XML data: issues and research challenges. SIGMOD Records, June 2005 Koloniari G, Pitoura E (2005) Peer-to-peer management of XML data: issues and research challenges. SIGMOD Records, June 2005
19.
go back to reference Towards Collaborative Security and P2P Intrusion Detection Proceedings of the 2005 IEEE, Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 15 17 June 2005 Towards Collaborative Security and P2P Intrusion Detection Proceedings of the 2005 IEEE, Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 15 17 June 2005
20.
go back to reference Morse CD, Wang H. The structure of an instant messenger network and its vulnerability to malicious codes, Department of Computer Science, The College of William and Mary Williamsburg, VA 23187 Morse CD, Wang H. The structure of an instant messenger network and its vulnerability to malicious codes, Department of Computer Science, The College of William and Mary Williamsburg, VA 23187
21.
go back to reference Barak B, Haitner I, Hofheinz D, Ishai Y (2010) Bounded key-dependent message security Barak B, Haitner I, Hofheinz D, Ishai Y (2010) Bounded key-dependent message security
22.
go back to reference Kim Y-H (2008) KMFM realization for real-time P2P messenger IP trace, ICISS Kim Y-H (2008) KMFM realization for real-time P2P messenger IP trace, ICISS
23.
go back to reference Dean D, Franklin M, Stubblefield A (2002) An algebraic approach to IP traceback. ACM Trans Inf Syst Secur 5:119–137CrossRef Dean D, Franklin M, Stubblefield A (2002) An algebraic approach to IP traceback. ACM Trans Inf Syst Secur 5:119–137CrossRef
24.
go back to reference Krupiarz CJ, Artis DA, Calloway AB, Frangos CM, Heggestad BK, Holland DB, Stratton WC (2004) File-based data processing on MESSENGER, Proc. 5th IAA International Conference on Low Cost Planetary Missions, Acta Astronautica, Journal of the International Academy of Astronautics, SP-542, 435–441, Noordwijk, The Netherlands, September 24–25, 2003 (published in January, 2004) Krupiarz CJ, Artis DA, Calloway AB, Frangos CM, Heggestad BK, Holland DB, Stratton WC (2004) File-based data processing on MESSENGER, Proc. 5th IAA International Conference on Low Cost Planetary Missions, Acta Astronautica, Journal of the International Academy of Astronautics, SP-542, 435–441, Noordwijk, The Netherlands, September 24–25, 2003 (published in January, 2004)
25.
go back to reference Anagnostakis KG, Ioannidis S, Miltchev S, Ioannidis J, Greenwald MB, Smith, JM (2002) Efficient packet monitoring for network management. In: Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2002 Anagnostakis KG, Ioannidis S, Miltchev S, Ioannidis J, Greenwald MB, Smith, JM (2002) Efficient packet monitoring for network management. In: Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2002
26.
go back to reference Real Time Transfer Protocol (RTP), RFC 1889 Real Time Transfer Protocol (RTP), RFC 1889
27.
go back to reference Pang R, Paxson V (2003) A high-level programming environment for packet trace anonymization and transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003) Pang R, Paxson V (2003) A high-level programming environment for packet trace anonymization and transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003)
28.
go back to reference Jae Yun Jung (2004) A P2P flow detection alglrithem based on traffic analysis. Soongsil University Graduate School Master’s thesis. Jae Yun Jung (2004) A P2P flow detection alglrithem based on traffic analysis. Soongsil University Graduate School Master’s thesis.
29.
go back to reference A Model for Opportunistic Network Exploits: The Case of P2P Worms Michael Collins, CERT/NetSA, Carnegie Mellon University. A Model for Opportunistic Network Exploits: The Case of P2P Worms Michael Collins, CERT/NetSA, Carnegie Mellon University.
30.
go back to reference Active Messenger: Email Filtering and Delivery in a Heterogeneous Network, HCI paper v15, November 29, 2004 Active Messenger: Email Filtering and Delivery in a Heterogeneous Network, HCI paper v15, November 29, 2004
31.
go back to reference Tran MH, Yang Y, SWIM. An Alternative Interface for MSN Messenger, Smart Internet Technology CRC, and CITR-Swinburne University of Technology Tran MH, Yang Y, SWIM. An Alternative Interface for MSN Messenger, Smart Internet Technology CRC, and CITR-Swinburne University of Technology
32.
go back to reference Young Jun Yoon, Design of Messenger for Secure Communication between Users, Tongmyung University/Baekseok Univeristy, Journal of the Korea Academia-Industrial cooperation Society, 2010. Young Jun Yoon, Design of Messenger for Secure Communication between Users, Tongmyung University/Baekseok Univeristy, Journal of the Korea Academia-Industrial cooperation Society, 2010.
34.
go back to reference Balandin S, Serebryakov S “P2P Agent Platform and Virtual P2P Environment for Testing Mobile P2P Agents Networks” Balandin S, Serebryakov S “P2P Agent Platform and Virtual P2P Environment for Testing Mobile P2P Agents Networks”
35.
go back to reference Solomon SC, McNutt RL Jr, Gold RE, Acuña MH, Baker DN, Boynton WV, Chapman CR, Cheng AF, Gloeckler G, Head JW III, Krimigis SM, McClintock WE, Murchie SL, Peale SJ, Phillips RJ, Robinson MS, Slavin JA, Smith DE, Strom RG, Trombka JI, Zuber MT (2001) The MESSENGER mission to mercury: scientific objectives and implementation. Planet Space Sci 49:1445–1465CrossRef Solomon SC, McNutt RL Jr, Gold RE, Acuña MH, Baker DN, Boynton WV, Chapman CR, Cheng AF, Gloeckler G, Head JW III, Krimigis SM, McClintock WE, Murchie SL, Peale SJ, Phillips RJ, Robinson MS, Slavin JA, Smith DE, Strom RG, Trombka JI, Zuber MT (2001) The MESSENGER mission to mercury: scientific objectives and implementation. Planet Space Sci 49:1445–1465CrossRef
36.
go back to reference Schnackenberg D, Djahandari K, Sterne D, Holiday H, Smith R (2001) Cooperative Intrusion Traceback and Response Architecture (CITRA). In: Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (June 2001) Schnackenberg D, Djahandari K, Sterne D, Holiday H, Smith R (2001) Cooperative Intrusion Traceback and Response Architecture (CITRA). In: Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (June 2001)
Metadata
Title
Extracting real IP address used to connect to P2P messenger using ARIT agent
Authors
Yong-Ho Kim
Jae Hoon Sun
Publication date
01-07-2015
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 4/2015
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-014-0275-1

Other articles of this Issue 4/2015

Peer-to-Peer Networking and Applications 4/2015 Go to the issue

Premium Partner