Forensic investigation of peer-to-peer networks

被引:4
作者
Taylor M.
Haggerty J.
Gresty D.
Fergus P.
机构
关键词
D O I
10.1016/S1353-4858(10)70115-X
中图分类号
学科分类号
摘要
Peer-to-peer (P2P) networks allow the searching and downloading of files. As files can be easily and efficiently copied using P2P software by the general public, criminal activity such as music and film piracy that rely on the transfer of large amounts of data are becoming more common. P2P networks are also used for the dissemination and storage of indecent images and malware including computer viruses, worms and spyware, and may be used by criminal gangs and terrorist groups. We examine the forensic investigation of P2P, an activity that currently lacks commonly used guidelines. Peer-to-peer (P2P) networks allow the searching and downloading of files, with their nodes acting as either producers or consumers of data and resources.1,2,3 These environments provide a logical 'mesh' overlaying the physical network. Currently there are numerous P2P programs in general use on the Internet - examples of commonly used P2P systems include Gnutella, eDonkey, Fast Track and Bit Torrent. 4,5,6 © 2010 Elsevier Ltd.
引用
收藏
页码:12 / 15
页数:3
相关论文
共 50 条
[41]   Security applications of peer-to-peer networks [J].
Vlachos, V ;
Androutsellis-Theotokis, S ;
Spinellis, D .
COMPUTER NETWORKS, 2004, 45 (02) :195-205
[42]   Peer-to-Peer Traffic in Operator Networks [J].
Damola, Ayodele ;
Souza, Victor ;
Karlsson, Per ;
Green, Howard .
P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, :177-179
[43]   Random walks in peer-to-peer networks [J].
Gkantsidis, C ;
Mihail, M ;
Saberi, A .
IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, :120-130
[44]   Sustainable Cooperation in Peer-To-Peer Networks [J].
Nasrulin, Bulat ;
Chotkan, Rowdy ;
Pouwelse, Johan .
2023 IEEE 48TH CONFERENCE ON LOCAL COMPUTER NETWORKS, LCN 2023, 2023,
[45]   Music piracy on peer-to-peer networks [J].
Fetscherin, M ;
Zaugg, S .
2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, :431-440
[46]   Searching Flocks in Peer-to-Peer Networks [J].
Pommier, Hugo ;
Romito, Benoit ;
Bourdon, Francois .
ADVANCES ON PRACTICAL APPLICATIONS OF AGENTS AND MULTI-AGENT SYSTEMS, 2011, 88 :103-108
[47]   Competition against peer-to-peer networks [J].
Herings, P. Jean-Jacques ;
Peeters, Ronald ;
Yang, Michael S. .
INFORMATION ECONOMICS AND POLICY, 2010, 22 (04) :315-331
[48]   Critical load of peer-to-peer networks [J].
School of Computer and Communication, Hunan University, Changsha 410082, China .
Huazhong Ligong Daxue Xuebao, 2007, 3 (35-37)
[49]   Peer selection in peer-to-peer networks with semantic topologies [J].
Haase, P ;
Siebes, R ;
van Harmelen, F .
SEMANTICS OF A NETWORKED WORLD: SEMANTICS FOR GRID DATABASES, 2004, 3226 :108-125
[50]   Pricing and Incentives in Peer-to-Peer Networks [J].
Park, Jaeok ;
van der Schaar, Mihaela .
2010 PROCEEDINGS IEEE INFOCOM, 2010,