Forensic investigation of peer-to-peer networks

被引:4
|
作者
Taylor M.
Haggerty J.
Gresty D.
Fergus P.
机构
关键词
D O I
10.1016/S1353-4858(10)70115-X
中图分类号
学科分类号
摘要
Peer-to-peer (P2P) networks allow the searching and downloading of files. As files can be easily and efficiently copied using P2P software by the general public, criminal activity such as music and film piracy that rely on the transfer of large amounts of data are becoming more common. P2P networks are also used for the dissemination and storage of indecent images and malware including computer viruses, worms and spyware, and may be used by criminal gangs and terrorist groups. We examine the forensic investigation of P2P, an activity that currently lacks commonly used guidelines. Peer-to-peer (P2P) networks allow the searching and downloading of files, with their nodes acting as either producers or consumers of data and resources.1,2,3 These environments provide a logical 'mesh' overlaying the physical network. Currently there are numerous P2P programs in general use on the Internet - examples of commonly used P2P systems include Gnutella, eDonkey, Fast Track and Bit Torrent. 4,5,6 © 2010 Elsevier Ltd.
引用
收藏
页码:12 / 15
页数:3
相关论文
共 50 条
  • [11] Peer-to-Peer Accommodation Networks
    Pappas, Nikolaos
    TOURISM MANAGEMENT, 2019, 74 : 425 - 425
  • [12] Reputation in peer-to-peer networks
    Hu, THT
    Wongrujira, K
    Sereviratne, A
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 1411 - 1415
  • [13] JXTA & peer-to-peer networks
    Li, S
    DR DOBBS JOURNAL, 2003, 28 (06): : 30 - +
  • [14] Peer Discovery in peer-to-peer anonymity networks
    Lu, Tianbo
    Fang, Binxing
    Cheng, Xueqi
    Sun, Yuzhong
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, 2006, : 131 - 136
  • [15] The Case for Validating ADDIE Model as a Digital Forensic Model for Peer-to-Peer Network Investigation
    Musa, Ahmad Sanda
    Awan, Irfan-Ullah
    Zahrah, Fatima
    INFORMATION SYSTEMS FRONTIERS, 2022, 26 (6) : 2305 - 2321
  • [16] An investigation of the intention to share media files over peer-to-peer networks
    Blake, Roger H.
    Kyper, Eric S.
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2013, 32 (04) : 410 - 422
  • [17] Child pornography in peer-to-peer networks
    Steel, Chad M. S.
    CHILD ABUSE & NEGLECT, 2009, 33 (08) : 560 - 568
  • [18] Resource pricing in peer-to-peer networks
    Eger, Kolja
    Killat, Ulrich
    IEEE COMMUNICATIONS LETTERS, 2007, 11 (01) : 82 - 84
  • [19] Proportional replication in peer-to-peer networks
    Tewari, Saurabh
    Kleinrock, Leonard
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 556 - 567
  • [20] Search in unstructured peer-to-peer networks
    Jia, ZQ
    Tang, XH
    You, JY
    Li, ML
    WEB INFORMATION SYSTEMS - WISE 2004, PROCEEDINGS, 2004, 3306 : 694 - 705