Abstract
Recently, the cyber terror is becoming more complicated, intelligent, and causing more damage. To react more effectively to the future cyber terrors, it will be necessary to anticipate new cyber terror techniques and devise the preventive measures for the possible vulnerabilities of the system before the hackers actually disable the system. This paper verified that the attacking technology on the new vulnerability can paralyze internet service of windows system and smart phone using Android OS. Finally, the routing packets are discarded before they reach the destination and the connection to the destination host cannot be established.
Similar content being viewed by others
References
2012 Copyright Protection Report (2012). Korea Copyright Protection Center
Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. In 13th USENIX Security Symposium.
Easypotal. https://sites.google.com/site/essyt-or/home
Fathi, H., Shin, S., Kobara, K., & Imai, H. (2010). Purpose-restricted anonymous mobile communications using anonymous signatures in online credential systems. Wireless Personal Communications, 54(1), 225–236.
Gao, L., Ma, M., Shu, Y., & Wei, Y. (2013). A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems. Wireless Personal Communications, 68(4), 1943–1959.
Kafle, V. P. (2011). Masugi inoue “ID/locator split-based mobility scheme for heterogeneous new generation network”. Wireless Personal Communications, 61(4), 753–764.
Lee, J. H. (2011). A study on the countermeasure of cyber attacks using anonymous network. Korea Information Assurance Society.
NMC Consulting Group (2011). Netmanias technical paper: Principle of bittorrent protocol. NMC Consulting Group, 2011.05.
Prasad, R. (2006). Piracy over peer-to-peer based on personal network wireless personal communications. Wireless Personal Communications, 37(3–4), 221–231.
Syverson, P. (2011). A peel of onion. In ACSAC ’11.
Syverson, P. Theory and design of low-latency anonymity systems (Lecture 2). U.S. Naval Research Laboratory.
Tor Network Status. http://torstatus.blutmag-ie.de/.
Wiki Theory. BitTorrent Protocol Specification v1.0. http://wiki.theory.org/BitTorrentSpecification
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lim, Y.H., Lee, D.H., Park, W.H. et al. Detection and Traceback of Illegal Users based on Anonymous Network in BitTorrent Environment. Wireless Pers Commun 73, 319–328 (2013). https://doi.org/10.1007/s11277-013-1240-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-013-1240-7