Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Recently, the cyber terror is becoming more complicated, intelligent, and causing more damage. To react more effectively to the future cyber terrors, it will be necessary to anticipate new cyber terror techniques and devise the preventive measures for the possible vulnerabilities of the system before the hackers actually disable the system. This paper verified that the attacking technology on the new vulnerability can paralyze internet service of windows system and smart phone using Android OS. Finally, the routing packets are discarded before they reach the destination and the connection to the destination host cannot be established.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. 2012 Copyright Protection Report (2012). Korea Copyright Protection Center

  2. Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. In 13th USENIX Security Symposium.

  3. Easypotal. https://sites.google.com/site/essyt-or/home

  4. Fathi, H., Shin, S., Kobara, K., & Imai, H. (2010). Purpose-restricted anonymous mobile communications using anonymous signatures in online credential systems. Wireless Personal Communications, 54(1), 225–236.

    Article  Google Scholar 

  5. Gao, L., Ma, M., Shu, Y., & Wei, Y. (2013). A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems. Wireless Personal Communications, 68(4), 1943–1959.

    Article  Google Scholar 

  6. Kafle, V. P. (2011). Masugi inoue “ID/locator split-based mobility scheme for heterogeneous new generation network”. Wireless Personal Communications, 61(4), 753–764.

    Article  Google Scholar 

  7. Lee, J. H. (2011). A study on the countermeasure of cyber attacks using anonymous network. Korea Information Assurance Society.

  8. NMC Consulting Group (2011). Netmanias technical paper: Principle of bittorrent protocol. NMC Consulting Group, 2011.05.

  9. Prasad, R. (2006). Piracy over peer-to-peer based on personal network wireless personal communications. Wireless Personal Communications, 37(3–4), 221–231.

    Article  Google Scholar 

  10. Syverson, P. (2011). A peel of onion. In ACSAC ’11.

  11. Syverson, P. Theory and design of low-latency anonymity systems (Lecture 2). U.S. Naval Research Laboratory.

  12. Tor Network Status. http://torstatus.blutmag-ie.de/.

  13. Tor. https://www.torproject.org

  14. Wiki Theory. BitTorrent Protocol Specification v1.0. http://wiki.theory.org/BitTorrentSpecification

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Won Hyung Park.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lim, Y.H., Lee, D.H., Park, W.H. et al. Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment. Wireless Pers Commun 73, 319–328 (2013). https://doi.org/10.1007/s11277-013-1240-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1240-7

Keywords

Navigation