IMPLEMENTATION AND IMPROVEMENT OF IRC CHANNELS (COMMUNICATION BETWEEN SERVER TO CLIENT SIDE)

Authors

  • Sukhpreet Kaur Research Scholar Department of Electronics and Communication Engg. Guru Gobind Singh College of Engg. & Technology Guru Kashi University Talwandi Sabo, Bathinda, Punjab, India
  • Er. Harpreet Kaur Assistant Professor Department of Electronics and Communication Engg. Guru Gobind Singh College of Engg. & Technology Guru Kashi University Talwandi Sabo, Bathinda, Punjab, India

Keywords:

IRC, IRC protocol, IRCChannels, Server Side, Client Side

Abstract

IRC (Internet Relay Chat) is a multi-user, multi-channel chatting system. Imagine sitting in front of your computer and "talking" through typed messages with either one person or many other people from all over the Internet, all in real time! Best of all, once you get set up; chatting on IRC is totally free. IRC is one of the most popular and most interactive services on the Internet. IRC is based on a client-server model. You run a client program on your own computer which connects you to a server computer on the Internet. These servers link too many other servers to make up an IRC network, which transport messages from one user (client) to another. In this manner, people from all over the world can talk to each other live and simultaneously. Hence, data security is a major concern which Data security issue could occur while communicating using needs to be considered to secure the information over IRC channels for hackers. This research focuses on the basic detail of IRC protocol, its architecture, environment, and features. The research is more focused on IRC system to improvement of commuication between IRC channels,server to client side.

References

I. M. N. Sakib and C. T. Huang, (2016) “Using Anomaly Detection Based Techniques to Detect HTTP-based Botnet C&C Traffic,” IEEE ICC, Communication and Information Systems Security Symposium

II. M. T. Tolston, V. Finomore, G. J. Funke, V. Mancuso, R. Brown, L. Menke and M. A. Riley, (2017) “Effects of Biasing Information on the Conceptual Structure of Team Communications,” Springer International Publishing Switzerland, Advances in Neuroergonomics and Cognitive Engineering, Advances in Intelligent Systems and Computing 488.

III. M. Laskowski and H. M. Kim, “Rapid Prototyping of a Text Mining Application for Crypto currency Market Intelligence.”

IV. S. K. Bertram, (2016) “Authority and Hierarchy within Anonymous Internet Relay Chat Networks,” JTR, 6 (3).

V. M. Sensoy, (2012) “Internet Relay Chat Networks as Complex Systems.”

VI. D. Larson, (2016) “Distributed denial of service attacks – holding back the flood,” ISSN 1353-4858.

VII. H. S. Kang, H. D. Yang, [2006], “The visual characteristics of avatars in computer-mediated communication: Comparison of Internet Relay Chat and Instant Messenger as of 2003”, Int. J. Human-Computer Studies, 64 (2006) 1173–1183.

VIII. J. C. Paolillo, [2001], “language variation on Internet Relay Chat: A social network approach,”Journal Of Sociolinguistics, Volume 5, Issue 2

May 2001, Pages 180–213.

IX. Livadas, C., Walsh, R., Lapsley, D., & Strayer, W. (2006). Using Machine Learning Techniques to Identify Botnet Traffic. Proceedings. 2006 31st IEEE Conference on Local Computer Networks. doi:10.1109/lcn.2006.322210.

X. V. Benjamin, B. Zhang, J. F. Nunamaker & H. Chen (2016) “Examining Hacker Participation Length in Cybercriminal Internet-Relay Chat Communities,” Journal of Management Information Systems, 33:2, 482-510.

XI. H. S. Kang, H. D. Yang, [2006], “The visual characteristics of avatars in computer-mediatedcommunication: Comparison of Internet Relay Chat and InstantMessenger as of 2003”, Int. J. Human-Computer Studies, 64 (2006) 1173–1183.

XII. Raymond B. Jennings III, Erich M. Nahum, David P. Olshefski, Debanjan Saha, Zon-Yin Shae,and Chris Waters, [2006], “A Study of Internet Instant Messaging andChat Protocols,”IEEE Network, 0890-8044/06.

XIII. J. C. Paolillo, [2001], “language variation on Internet Relay Chat: A social network approach,”Journal Of Sociolinguistics, Volume 5, Issue 2

May 2001, Pages 180–213.

XIV. W. WANG, B. FANG, Z. ZHANG, C. LI, [2009], “A Novel Approach to Detect IRC-based Botnets,”International Conference on Networks Security, Wireless Communications and Trusted Computing, DOI 10.1109/NSWCTC.2009

XV. P. S. Lokhande & B. B. Meshram (2014). Botnet: Understanding Behavior, Life Cycle Events & Actions, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014 ISSN: 2277 128X.

XVI. Robert Ecker (Linz). Creation of Internet Relay Chat Nicknames and Their Usage in English Chatroom Discourse, Linguistik online, 50, 6/11.

XVII. Sinha, T., & Rajasingh, I. (2014). Investigating substructures in goal-oriented online communities: Case study of Ubuntu IRC. 2014 IEEE International Advance Computing Conference (IACC). doi:10.1109/iadcc.2014.6779445.

XVIII. Uthus, D. C., & Aha, D. W. (2013). The Ubuntu Chat Corpus for Multiparticipant Chat Analysis. Artificial Intelligence, 199-200, 106-121. doi:10.1016/j.artint.2013.02.004.

XIX. Shihab, E., Zhen Ming Jiang, & Hassan, A. E. (2009). On the use of Internet Relay Chat (IRC) meetings by developers of the GNOME GTK+ project. 2009 6th IEEE International Working Conference on Mining Software Repositories. doi:10.1109/msr.2009.5069488.

XX. Rintel, E. S., Mulholland, J., & Pittam, J. (2006). First Things First: Internet Relay Chat Openings. Journal of Computer-Mediated Communication, 6(3), 0-0. doi:10.1111/j.1083-6101.2001.tb00125.x.

Additional Files

Published

15-05-2017

How to Cite

Sukhpreet Kaur, & Er. Harpreet Kaur. (2017). IMPLEMENTATION AND IMPROVEMENT OF IRC CHANNELS (COMMUNICATION BETWEEN SERVER TO CLIENT SIDE). International Education and Research Journal (IERJ), 3(5). Retrieved from https://ierj.in/journal/index.php/ierj/article/view/994