2010
DOI: 10.4018/978-1-60566-836-9.ch015
|View full text |Cite
|
Sign up to set email alerts
|

Forensic Investigation of Peer-to-Peer Networks

Abstract: The community of peer-to-peer (P2P) file-sharing networks has been expanding swiftly since the appearance of the very first P2P application (Napster) in 2001. These networks are famous for their excellent file transfer rates and adversely, the flooding of copyright-infringed digital materials. Recently, a number of documents containing personal data or sensitive information have been shared in an unbridled manner over the Foxy network (a popular P2P network in Chinese regions). These incidents have urged the a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
6
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 10 publications
1
6
0
Order By: Relevance
“…As reported elsewhere [5,6], our experiments confirmed that the number of query packets increase shortly before and after the appearance of the first seeder. Increases in the number of queries with SHA-1 values generated from multiple IP addresses were also observed.…”
Section: Identification Challengessupporting
confidence: 91%
See 3 more Smart Citations
“…As reported elsewhere [5,6], our experiments confirmed that the number of query packets increase shortly before and after the appearance of the first seeder. Increases in the number of queries with SHA-1 values generated from multiple IP addresses were also observed.…”
Section: Identification Challengessupporting
confidence: 91%
“…A single seeder in a Foxy network can be identified, but verifying that the seeder is one of the initial seeders is not a simple task. In our previous research [6], we showed that a seeder can be identified as one of the first few seeders if the sharing of the resource falls within the slowrising period of the seeder curve. However, confirming whether or not the period of interest falls within the slow-rising period is also difficult.…”
Section: Seeder Identification Rulesmentioning
confidence: 95%
See 2 more Smart Citations
“…In any file-sharing environment, there are five stages before a downloader obtains a file: preparation, initiation, publication, waiting and downloading [10]. The publication, waiting and downloading stages are the only stages where an investigator can collect digital evidence remotely on the Internet, i.e., before examining the suspect machine.…”
Section: Hypothesized Foxy Network Behaviormentioning
confidence: 99%