Abstract
Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.









Similar content being viewed by others
References
Kyu Sung Ahn (2010) The proposal of access blocking methods in messenger. Korea Computer Congress 37(1D):91–94
Kum Uk Seo, Messenger structure construction using WCF, Microsoft e-book, 2007
Jung Im Kim, Research using of messenger as an emotional communication tool; with the focus on MSN messenger and Nate On, Tongmyung information technology University Master’s thesis, 2006.
Deok-Young, Kim, (A) study on application of emotion for the web messenger interface: focused on comparison between MSN windows live messenger and NATE ON messenger, Hanyang University Master’s thesis, 2006.
Kim SH, Chung K (2014) 3D simulator for stability analysis of finite slope causing plane activity. Multimedia Tools Applic 68(2):455–463
Jung EY, Kim JH, Chung K, Park DK (2013) Home health gateway based healthcare services through U-health platform. Wirel Pers Commun 73(2):207–218
Kang SK, Chung K, Ryu JK, Rim KW, Lee JH (2013) Bio-interactive healthcare service system using lifelog based context computing. Wirel Pers Commun 73(2):341–351
Anas hardan “Peer to peer (P2P) network” ISYM 540 Current Topics in Information System Management
Kang SK, Chung K, Lee JH (2014) Development of head detection and tracking systems for visual surveillance. Pers Ubiquit Comput 18(3):515–522
Ha OK, Song YS, Chung K, Lee KD, Park D (2014) Relation model describing the effects of introducing RFID in the supply chain: evidence from the food and beverage industry in South Korea. Pers Ubiquit Comput 18(3):553–561
Kim JY, Chung K, Jung JJ (2014) Single tag sharing scheme for multiple-object RFID applications. Multimedia Tools Appl 68(2):465–477
Krupiarz CJ, Heggestad BK Flying CFDP on messenger
Magharei N, Rejaie R. ISP-Friendly P2P Streaming University of Oregon IEEE COMSOC MMTC E-Letter
Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems,” in ACM SIGCOMM
N. Magharei and R. Rejaie, “Overlay monitoring and repair in swarm-based peer-to-peer streaming,” in ACM NOSSDAV, 2009
Crespo A, Garcia Molina H (2002) Routing indices for peer-to-peer systems. In Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), July 2002
Crespo A, Garcia-Molina H (2003) Semantic overlay networks for P2P systems. In Proceedings of the 29th VLDB Conference, 2003
Koloniari G, Pitoura E (2005) Peer-to-peer management of XML data: issues and research challenges. SIGMOD Records, June 2005
Towards Collaborative Security and P2P Intrusion Detection Proceedings of the 2005 IEEE, Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 15 17 June 2005
Morse CD, Wang H. The structure of an instant messenger network and its vulnerability to malicious codes, Department of Computer Science, The College of William and Mary Williamsburg, VA 23187
Barak B, Haitner I, Hofheinz D, Ishai Y (2010) Bounded key-dependent message security
Kim Y-H (2008) KMFM realization for real-time P2P messenger IP trace, ICISS
Dean D, Franklin M, Stubblefield A (2002) An algebraic approach to IP traceback. ACM Trans Inf Syst Secur 5:119–137
Krupiarz CJ, Artis DA, Calloway AB, Frangos CM, Heggestad BK, Holland DB, Stratton WC (2004) File-based data processing on MESSENGER, Proc. 5th IAA International Conference on Low Cost Planetary Missions, Acta Astronautica, Journal of the International Academy of Astronautics, SP-542, 435–441, Noordwijk, The Netherlands, September 24–25, 2003 (published in January, 2004)
Anagnostakis KG, Ioannidis S, Miltchev S, Ioannidis J, Greenwald MB, Smith, JM (2002) Efficient packet monitoring for network management. In: Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2002
Real Time Transfer Protocol (RTP), RFC 1889
Pang R, Paxson V (2003) A high-level programming environment for packet trace anonymization and transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003)
Jae Yun Jung (2004) A P2P flow detection alglrithem based on traffic analysis. Soongsil University Graduate School Master’s thesis.
A Model for Opportunistic Network Exploits: The Case of P2P Worms Michael Collins, CERT/NetSA, Carnegie Mellon University.
Active Messenger: Email Filtering and Delivery in a Heterogeneous Network, HCI paper v15, November 29, 2004
Tran MH, Yang Y, SWIM. An Alternative Interface for MSN Messenger, Smart Internet Technology CRC, and CITR-Swinburne University of Technology
Young Jun Yoon, Design of Messenger for Secure Communication between Users, Tongmyung University/Baekseok Univeristy, Journal of the Korea Academia-Industrial cooperation Society, 2010.
Peer-to-Peer Based Resource Discovery in Global Grids: A Tutorial http://www.cs.mu.oz.au, June 10, 2007, July 9, 2009
Balandin S, Serebryakov S “P2P Agent Platform and Virtual P2P Environment for Testing Mobile P2P Agents Networks”
Solomon SC, McNutt RL Jr, Gold RE, Acuña MH, Baker DN, Boynton WV, Chapman CR, Cheng AF, Gloeckler G, Head JW III, Krimigis SM, McClintock WE, Murchie SL, Peale SJ, Phillips RJ, Robinson MS, Slavin JA, Smith DE, Strom RG, Trombka JI, Zuber MT (2001) The MESSENGER mission to mercury: scientific objectives and implementation. Planet Space Sci 49:1445–1465
Schnackenberg D, Djahandari K, Sterne D, Holiday H, Smith R (2001) Cooperative Intrusion Traceback and Response Architecture (CITRA). In: Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (June 2001)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, YH., Sun, J.H. Extracting real IP address used to connect to P2P messenger using ARIT agent. Peer-to-Peer Netw. Appl. 8, 620–630 (2015). https://doi.org/10.1007/s12083-014-0275-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-014-0275-1