IRC on your dime? What you really need to know about Internet relay chat
The purpose of this paper is to describe recent trends CIAC has encountered while working with sites that have been compromised. Frequently, the intruders set up and run Internet Relay Chat (IRC) to exchange information and to show off their success at having compromised a site. Invariably, this protocol consumes bandwidth, uses CPU cycles and is a source of embarrassment for the site. This paper focuses on these negative aspects of IRC and concedes that one can cite numerous examples where IRC is used in a positive manner.
- Research Organization:
- Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
- Sponsoring Organization:
- USDOE, Washington, DC (United States)
- DOE Contract Number:
- W-7405-ENG-48
- OSTI ID:
- 302851
- Report Number(s):
- UCRL-ID-130898; ON: DE98057874; BR: WM1025000
- Resource Relation:
- Other Information: PBD: 22 May 1998
- Country of Publication:
- United States
- Language:
- English
Similar Records
Everything you might want to know about the Internet but are afraid to ask!. A new users resource
P2P-based botnets: structural analysis, monitoring, and mitigation
Secure IRC Server
Technical Report
·
Wed Sep 01 00:00:00 EDT 1993
·
OSTI ID:302851
P2P-based botnets: structural analysis, monitoring, and mitigation
Conference
·
Tue Jan 01 00:00:00 EST 2008
·
OSTI ID:302851
+1 more
Secure IRC Server
Software
·
Mon Aug 25 00:00:00 EDT 2003
·
OSTI ID:302851