QuiGon: The First Tool Against Clone Attack on Internet Relay Chat

Author(s):  
Thibaut Henin ◽  
Corinne Huguennet
Keyword(s):  
2010 ◽  
Vol 36 (3) ◽  
pp. 389-409 ◽  
Author(s):  
Micha Elsner ◽  
Eugene Charniak

When multiple conversations occur simultaneously, a listener must decide which conversation each utterance is part of in order to interpret and respond to it appropriately. We refer to this task as disentanglement. We present a corpus of Internet Relay Chat dialogue in which the various conversations have been manually disentangled, and evaluate annotator reliability. We propose a graph-based clustering model for disentanglement, using lexical, timing, and discourse-based features. The model's predicted disentanglements are highly correlated with manual annotations. We conclude by discussing two extensions to the model, specificity tuning and conversation start detection, both of which are promising but do not currently yield practical improvements.


2012 ◽  
pp. 889-897
Author(s):  
James M. Hudson ◽  
Paul L. Witt
Keyword(s):  

2012 ◽  
pp. 148-156
Author(s):  
Shawn Loewen ◽  
Jiawen Wang

The development of new technologies has had an impact on human behavior and communication from time immemorial. With the growing rate of technological advancement during the past 100 years, the changes have occurred even more rapidly. In an effort to understand the effects of one medium on human behavior and communication, this article explores and synthesizes research that has been conducted over the past 30 years, in what has come to be known as the chatroom. The chatroom, in the form of Internet Relay Chat (IRC), was developed in the late 1980s, and has been growing in popularity ever since. Chatrooms are Web-based platforms that allow synchronous, written communication between two or more interested participants in a forum that is potentially open to other interested participants.


Author(s):  
Devan Rosen

Virtual communities that allow many users to interact in a virtual world, often called multi-user virtual worlds (MUVWs), allow users to explore and navigate the virtual world as well as interact with other users. The communicative interaction within these virtual worlds is often text-based using Internet relay chat (IRC) and related systems. IRC has posed a difficulty for researchers looking to evaluate the interaction by analyzing and interpreting the communication since data is stored in the form of chatlogs. The current chapter explicates methodological procedures for the measurement and visualization of chat-based communicative interaction in MUVWs as social networks. A case study on an educational MUVW, the SciCentr programs sponsored by Cornell University, is used to elaborate methods and related findings.


The past few years have witnessed the threats caused by the evolving of botnets. It has been found that the nefarious network consisting of contagious systems called as bots are operated by the botmaster. These botnets have been used for malicious activities. This prevailing threat on the internet has led to spam, Distributed Denial of Service (DDoS) attacks, phishing emails, and other cyber-attacks. The detection of such networks is very important keeping the protocols and features they work upon. The paper talks about the various detection techniques that can be adapted to evade the attacks of bots. The huge amount of traffic created by bots can be studied and distinguished respectively to understand the protocols used by the botmaster; which are further used to detect botnets based on the signature and anomaly patterns. The attacks being done from different locations have made it difficult for a botnet to be caught. It has been mentioned that a few networks provide the bots with a nickname using which the detection can be done. The method has been described thoroughly by also specifying how the bot-names of the same network are similar. Nowadays, the number of botnets has increased with a fewer number of trained bots. These network work upon the protocols like Command and Control (C&C), Internet Relay Chat (IRC), HyperText Transfer Protocol (HTTP) and Peer to Peer(P2P). The detection of such networks is being done classifying the traffic and analyzing the spam e-mails alongside the respected IP address. Even the traps of honeynet are developed which motivate the botmaster to take action and get caught. Such honeynet techniques along with the required steps and the necessary precautions are also mentioned in the paper.


Sign in / Sign up

Export Citation Format

Share Document