Extracting real IP address used to connect to P2P messenger using ARIT agent

Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking rea...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Peer-to-peer networking and applications 2015-07, Vol.8 (4), p.620-630
Hauptverfasser: Kim, Yong-Ho, Sun, Jae Hoon
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 630
container_issue 4
container_start_page 620
container_title Peer-to-peer networking and applications
container_volume 8
creator Kim, Yong-Ho
Sun, Jae Hoon
description Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.
doi_str_mv 10.1007/s12083-014-0275-1
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1718922096</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3719724701</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-d4cb5c2c8051c50995137d2aad427965ff80da1c8e9fe358e40c73e0e46f79853</originalsourceid><addsrcrecordid>eNp1kMFKAzEQhoMoWKsP4C3gxcvqJNlskmMpVQsFi9RziNnZ0rLdrcku6NubZUVE8DQ_zPcPw0fINYM7BqDuI-OgRQYsz4ArmbETMmFGFFmRSzj9yTk_Jxcx7gEKJiSfkNXiowvOd7tmSwO6mi7X1JVlwBhpH7GkXUt92zTouyGu-Zoe0g6bLYYEDLXZy3JD3Rab7pKcVa6OePU9p-T1YbGZP2Wr58flfLbKvBB5l5W5f5Oeew2SeQnGSCZUyZ0rc65MIatKQ-mY12gqFFJjDl4JBMyLShktxZTcjnePoX3vMXb2sIse69o12PbRMsW04RxMkdCbP-i-7UOTvrOs0Ca9YLRKFBspH9oYA1b2GHYHFz4tAzv4taNfm_zawa9lqcPHTkzsoOPX5X9LX00Deww</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1689805987</pqid></control><display><type>article</type><title>Extracting real IP address used to connect to P2P messenger using ARIT agent</title><source>Springer Nature - Complete Springer Journals</source><creator>Kim, Yong-Ho ; Sun, Jae Hoon</creator><creatorcontrib>Kim, Yong-Ho ; Sun, Jae Hoon</creatorcontrib><description>Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-014-0275-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Channels ; Communications Engineering ; Computer Communication Networks ; Computer information security ; Cybercrime ; Engineering ; Forensic sciences ; Information Systems and Communication Service ; IP (Internet Protocol) ; Modules ; Networks ; Packets (communication) ; Peer to peer computing ; Servers ; Signal,Image and Speech Processing ; Tables (data)</subject><ispartof>Peer-to-peer networking and applications, 2015-07, Vol.8 (4), p.620-630</ispartof><rights>Springer Science+Business Media New York 2014</rights><rights>Springer Science+Business Media New York 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c334t-d4cb5c2c8051c50995137d2aad427965ff80da1c8e9fe358e40c73e0e46f79853</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-014-0275-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-014-0275-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Kim, Yong-Ho</creatorcontrib><creatorcontrib>Sun, Jae Hoon</creatorcontrib><title>Extracting real IP address used to connect to P2P messenger using ARIT agent</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.</description><subject>Channels</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer information security</subject><subject>Cybercrime</subject><subject>Engineering</subject><subject>Forensic sciences</subject><subject>Information Systems and Communication Service</subject><subject>IP (Internet Protocol)</subject><subject>Modules</subject><subject>Networks</subject><subject>Packets (communication)</subject><subject>Peer to peer computing</subject><subject>Servers</subject><subject>Signal,Image and Speech Processing</subject><subject>Tables (data)</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kMFKAzEQhoMoWKsP4C3gxcvqJNlskmMpVQsFi9RziNnZ0rLdrcku6NubZUVE8DQ_zPcPw0fINYM7BqDuI-OgRQYsz4ArmbETMmFGFFmRSzj9yTk_Jxcx7gEKJiSfkNXiowvOd7tmSwO6mi7X1JVlwBhpH7GkXUt92zTouyGu-Zoe0g6bLYYEDLXZy3JD3Rab7pKcVa6OePU9p-T1YbGZP2Wr58flfLbKvBB5l5W5f5Oeew2SeQnGSCZUyZ0rc65MIatKQ-mY12gqFFJjDl4JBMyLShktxZTcjnePoX3vMXb2sIse69o12PbRMsW04RxMkdCbP-i-7UOTvrOs0Ca9YLRKFBspH9oYA1b2GHYHFz4tAzv4taNfm_zawa9lqcPHTkzsoOPX5X9LX00Deww</recordid><startdate>20150701</startdate><enddate>20150701</enddate><creator>Kim, Yong-Ho</creator><creator>Sun, Jae Hoon</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>7SP</scope></search><sort><creationdate>20150701</creationdate><title>Extracting real IP address used to connect to P2P messenger using ARIT agent</title><author>Kim, Yong-Ho ; Sun, Jae Hoon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-d4cb5c2c8051c50995137d2aad427965ff80da1c8e9fe358e40c73e0e46f79853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Channels</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer information security</topic><topic>Cybercrime</topic><topic>Engineering</topic><topic>Forensic sciences</topic><topic>Information Systems and Communication Service</topic><topic>IP (Internet Protocol)</topic><topic>Modules</topic><topic>Networks</topic><topic>Packets (communication)</topic><topic>Peer to peer computing</topic><topic>Servers</topic><topic>Signal,Image and Speech Processing</topic><topic>Tables (data)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kim, Yong-Ho</creatorcontrib><creatorcontrib>Sun, Jae Hoon</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>Electronics &amp; Communications Abstracts</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kim, Yong-Ho</au><au>Sun, Jae Hoon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Extracting real IP address used to connect to P2P messenger using ARIT agent</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2015-07-01</date><risdate>2015</risdate><volume>8</volume><issue>4</issue><spage>620</spage><epage>630</epage><pages>620-630</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-014-0275-1</doi><tpages>11</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1936-6442
ispartof Peer-to-peer networking and applications, 2015-07, Vol.8 (4), p.620-630
issn 1936-6442
1936-6450
language eng
recordid cdi_proquest_miscellaneous_1718922096
source Springer Nature - Complete Springer Journals
subjects Channels
Communications Engineering
Computer Communication Networks
Computer information security
Cybercrime
Engineering
Forensic sciences
Information Systems and Communication Service
IP (Internet Protocol)
Modules
Networks
Packets (communication)
Peer to peer computing
Servers
Signal,Image and Speech Processing
Tables (data)
title Extracting real IP address used to connect to P2P messenger using ARIT agent
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T08%3A53%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Extracting%20real%20IP%20address%20used%20to%20connect%20to%20P2P%20messenger%20using%20ARIT%20agent&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Kim,%20Yong-Ho&rft.date=2015-07-01&rft.volume=8&rft.issue=4&rft.spage=620&rft.epage=630&rft.pages=620-630&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-014-0275-1&rft_dat=%3Cproquest_cross%3E3719724701%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1689805987&rft_id=info:pmid/&rfr_iscdi=true