Skip to main content

QuiGon: The First Tool Against Clone Attack on Internet Relay Chat

  • Conference paper
  • 263 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 30))

Abstract

Clone attacks are a way to perform DDOS attack on Internet Relay Chat networks. There is no tool which prevents an IRC network against such attacks despite some handcrafted methods which are not so efficient. Here, we present qui-gon, the first tool which defeat clones attacks. It uses a temporal oracle which detect attacks by measuring the connection rate; and another oracle which distinguish clones using probabilistic automata. These oracles learn the characteristic of the network in order to fit better to the network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Mirkovic, P. Reiher: A Taxonomy of DDoS Attacks and Defense Mechanisms, ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, 2004

    Google Scholar 

  2. C. Douligeris, A. Mitrokotsa: DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art, Computer Networks, vol 44, no 5, 2003

    Google Scholar 

  3. H. Alaganandam, P. Mittal, A. Singh, C. Fleizach: Cybercriminal Activity, 2005

    Google Scholar 

  4. J. Oikarinen, D. Reed: Internet Relay Chat Protocol, IETF, RFC n1459, 1993

    Google Scholar 

  5. B. McCarty: Botnets: Big and Bigger, IEEE Security and Privacy, vol. 1, n0. 4, 2003

    Google Scholar 

  6. D. Geer: Malicious bots threaten network security, IEEE Computer Society, vol. 38, n0. 1, 2005

    Google Scholar 

  7. D. R. Karrels: Internet Relay Chat Service Framework : GNUWorld, 2003

    Google Scholar 

  8. N. W. Van Dyke, H. Lieberman, P. Maes: Butterfly: a conversationfinding agent for Internet Relay Chat, 4th International Conference on Intelligent User Interfaces, 1998

    Google Scholar 

  9. Dr. R. S. Wallace: The Elements of AIML Style, A.L.I.C.E. Artificial Intelligence Foundation, Inc., 2003

    Google Scholar 

  10. J. Canavan: The evolution of malicious IRC Bots, Virus Bulletin Conference, 2005

    Google Scholar 

  11. D. Bernstein: Syn cookies - http://cr.yp.to/syncookies.html, Last acessed: July 2007

  12. H. Bechar-Israeli: From Bonehead to cLoNehEAd: Nicknames, Play and Identity on Internet Relay Chat, Journal of Computer-Mediated Communication, vol 1, no 2, 1996

    Google Scholar 

  13. E. M. Reid: Electropolis : Communication and Community on Internet Relay Chat, 1991

    Google Scholar 

  14. http://packetstormsecurity.org/DoS/pru.c, Example of clone attack tool, Last accessed: July 2007

  15. P. Dupont: Noisy Sequence Classification with smoothed Markov Chains, 8me confrence francophone sur l’apprentissage automatique, 2006

    Google Scholar 

  16. T. Henin: Reprsentation par jeu du chaos de squences d’ADN, ENS Cachan, University Rennes 1, 2007

    Google Scholar 

  17. F. Thollard, A. Clark: Apprentissage d’automates probabilistes dterministes, Confrence d’Apprentissage, 2004

    Google Scholar 

  18. J. Callut, P. Dupont: Inducing Hidden Markov Models to Model Long-Term Dependencies, Artificial Intelligence, European Conference on Machine Learning, 2005

    Google Scholar 

  19. V. Laurikari: Efficient Submatch Addressing for Regular Expressions, Helsinki University of Technology, 2001

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thibaut Henin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this paper

Cite this paper

Henin, T., Huguennet, C. (2009). QuiGon: The First Tool Against Clone Attack on Internet Relay Chat. In: Siris, V., Anagnostakis, K., Ioannidis, S., Trimintzios, P. (eds) Proceedings of the 3rd European Conference on Computer Network Defense. Lecture Notes in Electrical Engineering, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-85555-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-85555-4_8

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-85554-7

  • Online ISBN: 978-0-387-85555-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics