Forensic investigation of peer-to-peer networks

被引:4
作者
Taylor M.
Haggerty J.
Gresty D.
Fergus P.
机构
关键词
D O I
10.1016/S1353-4858(10)70115-X
中图分类号
学科分类号
摘要
Peer-to-peer (P2P) networks allow the searching and downloading of files. As files can be easily and efficiently copied using P2P software by the general public, criminal activity such as music and film piracy that rely on the transfer of large amounts of data are becoming more common. P2P networks are also used for the dissemination and storage of indecent images and malware including computer viruses, worms and spyware, and may be used by criminal gangs and terrorist groups. We examine the forensic investigation of P2P, an activity that currently lacks commonly used guidelines. Peer-to-peer (P2P) networks allow the searching and downloading of files, with their nodes acting as either producers or consumers of data and resources.1,2,3 These environments provide a logical 'mesh' overlaying the physical network. Currently there are numerous P2P programs in general use on the Internet - examples of commonly used P2P systems include Gnutella, eDonkey, Fast Track and Bit Torrent. 4,5,6 © 2010 Elsevier Ltd.
引用
收藏
页码:12 / 15
页数:3
相关论文
共 50 条
  • [21] The Case for Validating ADDIE Model as a Digital Forensic Model for Peer-to-Peer Network Investigation
    Musa, Ahmad Sanda
    Awan, Irfan-Ullah
    Zahrah, Fatima
    INFORMATION SYSTEMS FRONTIERS, 2022, 26 (6) : 2305 - 2321
  • [22] Dissemination scenarios in peer-to-peer networks
    Zerfiridis, KG
    Karatza, HD
    36TH ANNUAL SIMULATION SYMPOSIUM, PROCEEDINGS, 2003, : 309 - 316
  • [23] Peer-to-peer interconnection of home networks
    Harvey, Arthur
    Lin, Ying-Ieh
    Maurer, Patrick
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 901 - 905
  • [24] Cascade RSVM in Peer-to-Peer Networks
    Ang, Hock Hee
    Gopalkrishnan, Vivekanand
    Hoi, Steven C. H.
    Ng, Wee Keong
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PART I, PROCEEDINGS, 2008, 5211 : 55 - 70
  • [25] Free Riding in Peer-to-Peer Networks
    Karakaya, Murat
    Korpeoglu, Ibrahim
    Ulusoy, Oezguer
    IEEE INTERNET COMPUTING, 2009, 13 (02) : 92 - 98
  • [26] Structure of peer-to-peer social networks
    Pervasive ICT Research Center, British Telecom, Ipswich IP5 2TX, United Kingdom
    不详
    不详
    Phys. Rev. E Stat. Nonlinear Soft Matter Phys., 2006, 3 (1-7):
  • [27] Trustworthiness in peer-to-peer overlay networks
    Nakajima, Yoshio
    Watanabe, Kenichi
    Hayashibara, Naohiro
    Enokido, Tomoya
    Takizawa, Makoto
    Deen, S. Misbah
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 86 - +
  • [28] Substitutable by peer-to-peer accommodation networks?
    Hajibaba, Homa
    Dolnicar, Sara
    ANNALS OF TOURISM RESEARCH, 2017, 66 : 185 - 188
  • [29] Indoor positioning in peer-to-peer networks
    Brussee, Rogier
    Darau, Mirela
    Dworczynska, Marta
    Fan, Yabin
    Koeleman, Paulien
    Kowalczyk, Piotr
    Samson, Jaron
    Schlomer, Nico
    Swist, Tomasz
    van Wijk, Sandra
    2010 5TH ESA WORKSHOP ON SATELLITE NAVIGATION TECHNOLOGIES AND EUROPEAN WORKSHOP ON GNSS SIGNALS AND SIGNAL PROCESSING (NAVITEC), 2010,
  • [30] Security applications of peer-to-peer networks
    Vlachos, V
    Androutsellis-Theotokis, S
    Spinellis, D
    COMPUTER NETWORKS, 2004, 45 (02) : 195 - 205