Extracting real IP address used to connect to P2P messenger using ARIT agent
Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking rea...
Gespeichert in:
Veröffentlicht in: | Peer-to-peer networking and applications 2015-07, Vol.8 (4), p.620-630 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 630 |
---|---|
container_issue | 4 |
container_start_page | 620 |
container_title | Peer-to-peer networking and applications |
container_volume | 8 |
creator | Kim, Yong-Ho Sun, Jae Hoon |
description | Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information. |
doi_str_mv | 10.1007/s12083-014-0275-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1718922096</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3719724701</sourcerecordid><originalsourceid>FETCH-LOGICAL-c334t-d4cb5c2c8051c50995137d2aad427965ff80da1c8e9fe358e40c73e0e46f79853</originalsourceid><addsrcrecordid>eNp1kMFKAzEQhoMoWKsP4C3gxcvqJNlskmMpVQsFi9RziNnZ0rLdrcku6NubZUVE8DQ_zPcPw0fINYM7BqDuI-OgRQYsz4ArmbETMmFGFFmRSzj9yTk_Jxcx7gEKJiSfkNXiowvOd7tmSwO6mi7X1JVlwBhpH7GkXUt92zTouyGu-Zoe0g6bLYYEDLXZy3JD3Rab7pKcVa6OePU9p-T1YbGZP2Wr58flfLbKvBB5l5W5f5Oeew2SeQnGSCZUyZ0rc65MIatKQ-mY12gqFFJjDl4JBMyLShktxZTcjnePoX3vMXb2sIse69o12PbRMsW04RxMkdCbP-i-7UOTvrOs0Ca9YLRKFBspH9oYA1b2GHYHFz4tAzv4taNfm_zawa9lqcPHTkzsoOPX5X9LX00Deww</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1689805987</pqid></control><display><type>article</type><title>Extracting real IP address used to connect to P2P messenger using ARIT agent</title><source>Springer Nature - Complete Springer Journals</source><creator>Kim, Yong-Ho ; Sun, Jae Hoon</creator><creatorcontrib>Kim, Yong-Ho ; Sun, Jae Hoon</creatorcontrib><description>Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-014-0275-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Channels ; Communications Engineering ; Computer Communication Networks ; Computer information security ; Cybercrime ; Engineering ; Forensic sciences ; Information Systems and Communication Service ; IP (Internet Protocol) ; Modules ; Networks ; Packets (communication) ; Peer to peer computing ; Servers ; Signal,Image and Speech Processing ; Tables (data)</subject><ispartof>Peer-to-peer networking and applications, 2015-07, Vol.8 (4), p.620-630</ispartof><rights>Springer Science+Business Media New York 2014</rights><rights>Springer Science+Business Media New York 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c334t-d4cb5c2c8051c50995137d2aad427965ff80da1c8e9fe358e40c73e0e46f79853</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-014-0275-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-014-0275-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Kim, Yong-Ho</creatorcontrib><creatorcontrib>Sun, Jae Hoon</creatorcontrib><title>Extracting real IP address used to connect to P2P messenger using ARIT agent</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.</description><subject>Channels</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer information security</subject><subject>Cybercrime</subject><subject>Engineering</subject><subject>Forensic sciences</subject><subject>Information Systems and Communication Service</subject><subject>IP (Internet Protocol)</subject><subject>Modules</subject><subject>Networks</subject><subject>Packets (communication)</subject><subject>Peer to peer computing</subject><subject>Servers</subject><subject>Signal,Image and Speech Processing</subject><subject>Tables (data)</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kMFKAzEQhoMoWKsP4C3gxcvqJNlskmMpVQsFi9RziNnZ0rLdrcku6NubZUVE8DQ_zPcPw0fINYM7BqDuI-OgRQYsz4ArmbETMmFGFFmRSzj9yTk_Jxcx7gEKJiSfkNXiowvOd7tmSwO6mi7X1JVlwBhpH7GkXUt92zTouyGu-Zoe0g6bLYYEDLXZy3JD3Rab7pKcVa6OePU9p-T1YbGZP2Wr58flfLbKvBB5l5W5f5Oeew2SeQnGSCZUyZ0rc65MIatKQ-mY12gqFFJjDl4JBMyLShktxZTcjnePoX3vMXb2sIse69o12PbRMsW04RxMkdCbP-i-7UOTvrOs0Ca9YLRKFBspH9oYA1b2GHYHFz4tAzv4taNfm_zawa9lqcPHTkzsoOPX5X9LX00Deww</recordid><startdate>20150701</startdate><enddate>20150701</enddate><creator>Kim, Yong-Ho</creator><creator>Sun, Jae Hoon</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>88I</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M2O</scope><scope>M2P</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>7SP</scope></search><sort><creationdate>20150701</creationdate><title>Extracting real IP address used to connect to P2P messenger using ARIT agent</title><author>Kim, Yong-Ho ; Sun, Jae Hoon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c334t-d4cb5c2c8051c50995137d2aad427965ff80da1c8e9fe358e40c73e0e46f79853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Channels</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer information security</topic><topic>Cybercrime</topic><topic>Engineering</topic><topic>Forensic sciences</topic><topic>Information Systems and Communication Service</topic><topic>IP (Internet Protocol)</topic><topic>Modules</topic><topic>Networks</topic><topic>Packets (communication)</topic><topic>Peer to peer computing</topic><topic>Servers</topic><topic>Signal,Image and Speech Processing</topic><topic>Tables (data)</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kim, Yong-Ho</creatorcontrib><creatorcontrib>Sun, Jae Hoon</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Science Database (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>Electronics & Communications Abstracts</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kim, Yong-Ho</au><au>Sun, Jae Hoon</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Extracting real IP address used to connect to P2P messenger using ARIT agent</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2015-07-01</date><risdate>2015</risdate><volume>8</volume><issue>4</issue><spage>620</spage><epage>630</epage><pages>620-630</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-014-0275-1</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1936-6442 |
ispartof | Peer-to-peer networking and applications, 2015-07, Vol.8 (4), p.620-630 |
issn | 1936-6442 1936-6450 |
language | eng |
recordid | cdi_proquest_miscellaneous_1718922096 |
source | Springer Nature - Complete Springer Journals |
subjects | Channels Communications Engineering Computer Communication Networks Computer information security Cybercrime Engineering Forensic sciences Information Systems and Communication Service IP (Internet Protocol) Modules Networks Packets (communication) Peer to peer computing Servers Signal,Image and Speech Processing Tables (data) |
title | Extracting real IP address used to connect to P2P messenger using ARIT agent |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T08%3A53%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Extracting%20real%20IP%20address%20used%20to%20connect%20to%20P2P%20messenger%20using%20ARIT%20agent&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Kim,%20Yong-Ho&rft.date=2015-07-01&rft.volume=8&rft.issue=4&rft.spage=620&rft.epage=630&rft.pages=620-630&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-014-0275-1&rft_dat=%3Cproquest_cross%3E3719724701%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1689805987&rft_id=info:pmid/&rfr_iscdi=true |