skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: IRC on your dime? What you really need to know about Internet relay chat

Abstract

The purpose of this paper is to describe recent trends CIAC has encountered while working with sites that have been compromised. Frequently, the intruders set up and run Internet Relay Chat (IRC) to exchange information and to show off their success at having compromised a site. Invariably, this protocol consumes bandwidth, uses CPU cycles and is a source of embarrassment for the site. This paper focuses on these negative aspects of IRC and concedes that one can cite numerous examples where IRC is used in a positive manner.

Authors:
;
Publication Date:
Research Org.:
Lawrence Livermore National Lab., CA (United States)
Sponsoring Org.:
USDOE, Washington, DC (United States)
OSTI Identifier:
302851
Report Number(s):
UCRL-ID-130898
ON: DE98057874; BR: WM1025000
DOE Contract Number:  
W-7405-ENG-48
Resource Type:
Technical Report
Resource Relation:
Other Information: PBD: 22 May 1998
Country of Publication:
United States
Language:
English
Subject:
99 MATHEMATICS, COMPUTERS, INFORMATION SCIENCE, MANAGEMENT, LAW, MISCELLANEOUS; INFORMATION RETRIEVAL; INTERNET; INFORMATION SYSTEMS; COMPUTER NETWORKS; DATA BASE MANAGEMENT

Citation Formats

ERayome, J., and Romig, S., LLNL. IRC on your dime? What you really need to know about Internet relay chat. United States: N. p., 1998. Web. doi:10.2172/302851.
ERayome, J., & Romig, S., LLNL. IRC on your dime? What you really need to know about Internet relay chat. United States. doi:10.2172/302851.
ERayome, J., and Romig, S., LLNL. Fri . "IRC on your dime? What you really need to know about Internet relay chat". United States. doi:10.2172/302851. https://www.osti.gov/servlets/purl/302851.
@article{osti_302851,
title = {IRC on your dime? What you really need to know about Internet relay chat},
author = {ERayome, J. and Romig, S., LLNL},
abstractNote = {The purpose of this paper is to describe recent trends CIAC has encountered while working with sites that have been compromised. Frequently, the intruders set up and run Internet Relay Chat (IRC) to exchange information and to show off their success at having compromised a site. Invariably, this protocol consumes bandwidth, uses CPU cycles and is a source of embarrassment for the site. This paper focuses on these negative aspects of IRC and concedes that one can cite numerous examples where IRC is used in a positive manner.},
doi = {10.2172/302851},
journal = {},
number = ,
volume = ,
place = {United States},
year = {1998},
month = {5}
}