A REVIEW OF FEATURES AND PERFORMANCE OF IRC (AIM & MESSENGER) AND GROUP SUPPORT SYSTEM

Authors

  • Sukhpreet Kaur Research Scholar Department Of Electronics and Communication Engg. Guru Gobind Singh College of Engg. & Technology Guru Kashi University Talwandi Sabo, Bathinda, Punjab, India
  • Er. Harpreet Kaur Assistant Professor Department Of Electronics and Communication Engg. Guru Gobind Singh College of Engg. & Technology Guru Kashi University Talwandi Sabo, Bathinda, Punjab, India

Keywords:

IRC

Abstract

IRC (Internet Relay Chat) is a protocol used by people to communicate or deliver messages through networks. IRC offers services to users for real-time text messages through chat groups defined as virtual communities including people with same interests and hobbies. The communication provided by IRC is known as ‘Computer-Mediated Communication’ where people gathered at one place for conversations. IRC protocol enables its users or clients to connect to IRC servers providing areal-time interface for communicating with people at remote locations throughout the world. However, communication through IRC channels is not secure sometimes. Data security issue could occur while communicating using IRC protocol. Hence, data security is a major concern which needs to be considered to secure the information over IRC channels for hackers. This research focuses on the basic detail of IRC protocol, its architecture, environment, and features. The research is more focused on IRC system to improve its performance by implementing IRC application using new methodology and techniques.

References

I. M. N. Sakib and C. T. Huang, (2016) “Using Anomaly Detection Based Techniques to Detect HTTP-based Botnet C&C Traffic,” IEEE ICC, Communication and Information Systems Security Symposium

II. M. T. Tolston, V. Finomore, G. J. Funke, V. Mancuso, R. Brown, L. Menke and M. A. Riley, (2017) “Effects of Biasing Information on the Conceptual Structure of Team Communications,” Springer International Publishing Switzerland, Advances in Neuroergonomics and Cognitive Engineering, Advances in Intelligent Systems and Computing 488.

III. M. Laskowski and H. M. Kim, “Rapid Prototyping of a Text Mining Application for Crypto currency Market Intelligence.”

IV. S. K. Bertram, (2016) “Authority and Hierarchy within Anonymous Internet Relay Chat Networks,” JTR, 6 (3).

V. M. Sensoy, (2012) “Internet Relay Chat Networks as Complex Systems.”

VI. D. Larson, (2016) “Distributed denial of service attacks – holding back the flood,” ISSN 1353-4858.

VII. H. S. Kang, H. D. Yang, [2006], “The visual characteristics of avatars in computer-mediated communication: Comparison of Internet Relay Chat and Instant Messenger as of 2003”, Int. J. Human-Computer Studies, 64 (2006) 1173–1183.

VIII. J. C. Paolillo, [2001], “language variation on Internet Relay Chat: A social network approach,”Journal Of Sociolinguistics, Volume 5, Issue 2

May 2001, Pages 180–213.

IX. Livadas, C., Walsh, R., Lapsley, D., & Strayer, W. (2006). Using Machine Learning Techniques to Identify Botnet Traffic. Proceedings. 2006 31st IEEE Conference on Local Computer Networks. doi:10.1109/lcn.2006.322210.

X. V. Benjamin, B. Zhang, J. F. Nunamaker & H. Chen (2016) “Examining Hacker Participation Length in Cybercriminal Internet-Relay Chat Communities,” Journal of Management Information Systems, 33:2, 482-510. H. S. Kang, H. D. Yang, [2006], “The visual characteristics of avatars in computer-mediatedcommunication: Comparison of Internet Relay Chat and InstantMessenger as of 2003”, Int. J. Human-Computer Studies, 64 (2006) 1173–1183.

XI. Raymond B. Jennings III, Erich M. Nahum, David P. Olshefski, Debanjan Saha, Zon-Yin Shae,and Chris Waters, [2006], “A Study of Internet Instant Messaging andChat Protocols,”IEEE Network, 0890-8044/06.

XII. J. C. Paolillo, [2001], “language variation on Internet Relay Chat: A social network approach,”Journal Of Sociolinguistics, Volume 5, Issue 2

May 2001, Pages 180–213.

XIII. W. WANG, B. FANG, Z. ZHANG, C. LI, [2009], “A Novel Approach to Detect IRC-based Botnets,”International Conference on Networks Security, Wireless Communications and Trusted Computing, DOI 10.1109/NSWCTC.2009

XIV. P. S. Lokhande & B. B. Meshram (2014). Botnet: Understanding Behavior, Life Cycle Events & Actions, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014 ISSN: 2277 128X.

XV. Robert Ecker (Linz). Creation of Internet Relay Chat Nicknames and Their Usage in English Chatroom Discourse, Linguistik online, 50, 6/11.

XVI. Sinha, T., & Rajasingh, I. (2014). Investigating substructures in goal-oriented online communities: Case study of Ubuntu IRC. 2014 IEEE International Advance Computing Conference (IACC). doi:10.1109/iadcc.2014.6779445.

XVII. Uthus, D. C., & Aha, D. W. (2013). The Ubuntu Chat Corpus for Multiparticipant Chat Analysis. Artificial Intelligence, 199-200, 106-121. doi:10.1016/j.artint.2013.02.004.

Additional Files

Published

15-05-2017

How to Cite

Sukhpreet Kaur, & Er. Harpreet Kaur. (2017). A REVIEW OF FEATURES AND PERFORMANCE OF IRC (AIM & MESSENGER) AND GROUP SUPPORT SYSTEM. International Education and Research Journal (IERJ), 3(5). Retrieved from http://ierj.in/journal/index.php/ierj/article/view/993