Skip to main content
Log in

Extracting real IP address used to connect to P2P messenger using ARIT agent

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Current IP based tracking method include host based traceback method, using traceback module installed in all system to locate the hacker’s real location, network packet method, installing traceback module in location where is possible to observe network packet, IP traceback method, tracebacking real location of IP address altered packet. Various other method has been proposed and all are in theoretical stage where ISP overhead is to be endured. Honeypot decoy server and automatic hacker tracing software and various other methods are being developed, but only can operate in certain enviornments, and is redundant in normal conditions. However, using the ARIT Agent discussed on this paper will not only extract the IP address of abnormal connection, but to pinpoint the location of the user. ARIT agent can extract the IP address by following steps. Transfer of user’s IP address collected through information analysis stored in Database and information gathered by Real IP Scan to IP comparison DB table recorded in ISP centre, then information comparison is made in comparison table to locate the IP address. Finally compared information is sent to security cetnre to notify the user’s safety. Using the 2 channel method proposed on this paper combined with the ARIT agent, user’s Real IP address can be certified with the IP address received from channel 1 through independent authentication server. Through independent authentication server, comparing the IP address obtained from channel 1 and 2, if the user’s location and the real location is different, realising the situation can prove valuble in prevention of further crimes. ARIT agent proves great advantage in prevention of phising or farming attack, pretending to be acquanitance to request financial support, or personal infromation, by analysing location information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Kyu Sung Ahn (2010) The proposal of access blocking methods in messenger. Korea Computer Congress 37(1D):91–94

  2. Kum Uk Seo, Messenger structure construction using WCF, Microsoft e-book, 2007

  3. Jung Im Kim, Research using of messenger as an emotional communication tool; with the focus on MSN messenger and Nate On, Tongmyung information technology University Master’s thesis, 2006.

  4. Deok-Young, Kim, (A) study on application of emotion for the web messenger interface: focused on comparison between MSN windows live messenger and NATE ON messenger, Hanyang University Master’s thesis, 2006.

  5. Kim SH, Chung K (2014) 3D simulator for stability analysis of finite slope causing plane activity. Multimedia Tools Applic 68(2):455–463

    Article  Google Scholar 

  6. Jung EY, Kim JH, Chung K, Park DK (2013) Home health gateway based healthcare services through U-health platform. Wirel Pers Commun 73(2):207–218

    Article  Google Scholar 

  7. Kang SK, Chung K, Ryu JK, Rim KW, Lee JH (2013) Bio-interactive healthcare service system using lifelog based context computing. Wirel Pers Commun 73(2):341–351

    Article  Google Scholar 

  8. Anas hardan “Peer to peer (P2P) network” ISYM 540 Current Topics in Information System Management

  9. Kang SK, Chung K, Lee JH (2014) Development of head detection and tracking systems for visual surveillance. Pers Ubiquit Comput 18(3):515–522

    Article  Google Scholar 

  10. Ha OK, Song YS, Chung K, Lee KD, Park D (2014) Relation model describing the effects of introducing RFID in the supply chain: evidence from the food and beverage industry in South Korea. Pers Ubiquit Comput 18(3):553–561

    Article  Google Scholar 

  11. Kim JY, Chung K, Jung JJ (2014) Single tag sharing scheme for multiple-object RFID applications. Multimedia Tools Appl 68(2):465–477

    Article  Google Scholar 

  12. Krupiarz CJ, Heggestad BK Flying CFDP on messenger

  13. Magharei N, Rejaie R. ISP-Friendly P2P Streaming University of Oregon IEEE COMSOC MMTC E-Letter

  14. Choffnes DR, Bustamante FE (2008) Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems,” in ACM SIGCOMM

  15. N. Magharei and R. Rejaie, “Overlay monitoring and repair in swarm-based peer-to-peer streaming,” in ACM NOSSDAV, 2009

  16. Crespo A, Garcia Molina H (2002) Routing indices for peer-to-peer systems. In Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems (ICDCS), July 2002

  17. Crespo A, Garcia-Molina H (2003) Semantic overlay networks for P2P systems. In Proceedings of the 29th VLDB Conference, 2003

  18. Koloniari G, Pitoura E (2005) Peer-to-peer management of XML data: issues and research challenges. SIGMOD Records, June 2005

  19. Towards Collaborative Security and P2P Intrusion Detection Proceedings of the 2005 IEEE, Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 15 17 June 2005

  20. Morse CD, Wang H. The structure of an instant messenger network and its vulnerability to malicious codes, Department of Computer Science, The College of William and Mary Williamsburg, VA 23187

  21. Barak B, Haitner I, Hofheinz D, Ishai Y (2010) Bounded key-dependent message security

  22. Kim Y-H (2008) KMFM realization for real-time P2P messenger IP trace, ICISS

  23. Dean D, Franklin M, Stubblefield A (2002) An algebraic approach to IP traceback. ACM Trans Inf Syst Secur 5:119–137

    Article  Google Scholar 

  24. Krupiarz CJ, Artis DA, Calloway AB, Frangos CM, Heggestad BK, Holland DB, Stratton WC (2004) File-based data processing on MESSENGER, Proc. 5th IAA International Conference on Low Cost Planetary Missions, Acta Astronautica, Journal of the International Academy of Astronautics, SP-542, 435–441, Noordwijk, The Netherlands, September 24–25, 2003 (published in January, 2004)

  25. Anagnostakis KG, Ioannidis S, Miltchev S, Ioannidis J, Greenwald MB, Smith, JM (2002) Efficient packet monitoring for network management. In: Proceedings of the 8th IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2002

  26. Real Time Transfer Protocol (RTP), RFC 1889

  27. Pang R, Paxson V (2003) A high-level programming environment for packet trace anonymization and transformation. In: Proceedings of the ACM SIGCOMM Conference (August 2003)

  28. Jae Yun Jung (2004) A P2P flow detection alglrithem based on traffic analysis. Soongsil University Graduate School Master’s thesis.

  29. A Model for Opportunistic Network Exploits: The Case of P2P Worms Michael Collins, CERT/NetSA, Carnegie Mellon University.

  30. Active Messenger: Email Filtering and Delivery in a Heterogeneous Network, HCI paper v15, November 29, 2004

  31. Tran MH, Yang Y, SWIM. An Alternative Interface for MSN Messenger, Smart Internet Technology CRC, and CITR-Swinburne University of Technology

  32. Young Jun Yoon, Design of Messenger for Secure Communication between Users, Tongmyung University/Baekseok Univeristy, Journal of the Korea Academia-Industrial cooperation Society, 2010.

  33. Peer-to-Peer Based Resource Discovery in Global Grids: A Tutorial http://www.cs.mu.oz.au, June 10, 2007, July 9, 2009

  34. Balandin S, Serebryakov S “P2P Agent Platform and Virtual P2P Environment for Testing Mobile P2P Agents Networks”

  35. Solomon SC, McNutt RL Jr, Gold RE, Acuña MH, Baker DN, Boynton WV, Chapman CR, Cheng AF, Gloeckler G, Head JW III, Krimigis SM, McClintock WE, Murchie SL, Peale SJ, Phillips RJ, Robinson MS, Slavin JA, Smith DE, Strom RG, Trombka JI, Zuber MT (2001) The MESSENGER mission to mercury: scientific objectives and implementation. Planet Space Sci 49:1445–1465

    Article  Google Scholar 

  36. Schnackenberg D, Djahandari K, Sterne D, Holiday H, Smith R (2001) Cooperative Intrusion Traceback and Response Architecture (CITRA). In: Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (June 2001)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jae Hoon Sun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, YH., Sun, J.H. Extracting real IP address used to connect to P2P messenger using ARIT agent. Peer-to-Peer Netw. Appl. 8, 620–630 (2015). https://doi.org/10.1007/s12083-014-0275-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-014-0275-1

Keywords

Navigation