Forensic investigation of peer-to-peer networks

被引:4
作者
Taylor M.
Haggerty J.
Gresty D.
Fergus P.
机构
关键词
D O I
10.1016/S1353-4858(10)70115-X
中图分类号
学科分类号
摘要
Peer-to-peer (P2P) networks allow the searching and downloading of files. As files can be easily and efficiently copied using P2P software by the general public, criminal activity such as music and film piracy that rely on the transfer of large amounts of data are becoming more common. P2P networks are also used for the dissemination and storage of indecent images and malware including computer viruses, worms and spyware, and may be used by criminal gangs and terrorist groups. We examine the forensic investigation of P2P, an activity that currently lacks commonly used guidelines. Peer-to-peer (P2P) networks allow the searching and downloading of files, with their nodes acting as either producers or consumers of data and resources.1,2,3 These environments provide a logical 'mesh' overlaying the physical network. Currently there are numerous P2P programs in general use on the Internet - examples of commonly used P2P systems include Gnutella, eDonkey, Fast Track and Bit Torrent. 4,5,6 © 2010 Elsevier Ltd.
引用
收藏
页码:12 / 15
页数:3
相关论文
共 50 条
[31]   Dynamics of heterogeneous peer-to-peer networks [J].
Paganini, Fernando ;
Ferragut, Andres ;
Zubeldia, Martin .
2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, :3293-3298
[32]   Construct campus peer-to-peer networks [J].
Deng, ZQ ;
Dai, GZ ;
Mu, DJ ;
Liu, ZC .
CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 :88-93
[33]   Free Riding in Peer-to-Peer Networks [J].
Karakaya, Murat ;
Korpeoglu, Ibrahim ;
Ulusoy, Oezguer .
IEEE INTERNET COMPUTING, 2009, 13 (02) :92-98
[34]   Cascade RSVM in Peer-to-Peer Networks [J].
Ang, Hock Hee ;
Gopalkrishnan, Vivekanand ;
Hoi, Steven C. H. ;
Ng, Wee Keong .
MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, PART I, PROCEEDINGS, 2008, 5211 :55-70
[35]   Substitutable by peer-to-peer accommodation networks? [J].
Hajibaba, Homa ;
Dolnicar, Sara .
ANNALS OF TOURISM RESEARCH, 2017, 66 :185-188
[36]   Structure of peer-to-peer social networks [J].
Pervasive ICT Research Center, British Telecom, Ipswich IP5 2TX, United Kingdom ;
不详 ;
不详 .
Phys. Rev. E Stat. Nonlinear Soft Matter Phys., 2006, 3 (1-7)
[37]   Peer-to-peer interconnection of home networks [J].
Harvey, Arthur ;
Lin, Ying-Ieh ;
Maurer, Patrick .
2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, :901-905
[38]   Indoor positioning in peer-to-peer networks [J].
Brussee, Rogier ;
Darau, Mirela ;
Dworczynska, Marta ;
Fan, Yabin ;
Koeleman, Paulien ;
Kowalczyk, Piotr ;
Samson, Jaron ;
Schlomer, Nico ;
Swist, Tomasz ;
van Wijk, Sandra .
2010 5TH ESA WORKSHOP ON SATELLITE NAVIGATION TECHNOLOGIES AND EUROPEAN WORKSHOP ON GNSS SIGNALS AND SIGNAL PROCESSING (NAVITEC), 2010,
[39]   Trustworthiness in peer-to-peer overlay networks [J].
Nakajima, Yoshio ;
Watanabe, Kenichi ;
Hayashibara, Naohiro ;
Enokido, Tomoya ;
Takizawa, Makoto ;
Deen, S. Misbah .
IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, :86-+
[40]   Sustainable Cooperation in Peer-To-Peer Networks [J].
Nasrulin, Bulat ;
Chotkan, Rowdy ;
Pouwelse, Johan .
2023 IEEE 48TH CONFERENCE ON LOCAL COMPUTER NETWORKS, LCN 2023, 2023,