Forensic investigation of peer-to-peer networks

被引:4
|
作者
Taylor M.
Haggerty J.
Gresty D.
Fergus P.
机构
关键词
D O I
10.1016/S1353-4858(10)70115-X
中图分类号
学科分类号
摘要
Peer-to-peer (P2P) networks allow the searching and downloading of files. As files can be easily and efficiently copied using P2P software by the general public, criminal activity such as music and film piracy that rely on the transfer of large amounts of data are becoming more common. P2P networks are also used for the dissemination and storage of indecent images and malware including computer viruses, worms and spyware, and may be used by criminal gangs and terrorist groups. We examine the forensic investigation of P2P, an activity that currently lacks commonly used guidelines. Peer-to-peer (P2P) networks allow the searching and downloading of files, with their nodes acting as either producers or consumers of data and resources.1,2,3 These environments provide a logical 'mesh' overlaying the physical network. Currently there are numerous P2P programs in general use on the Internet - examples of commonly used P2P systems include Gnutella, eDonkey, Fast Track and Bit Torrent. 4,5,6 © 2010 Elsevier Ltd.
引用
收藏
页码:12 / 15
页数:3
相关论文
共 50 条
  • [1] Forensic investigation of peer-to-peer file sharing networks
    Liberatore, Marc
    Erdely, Robert
    Kerle, Thomas
    Levine, Brian Neil
    Shields, Clay
    [J]. DIGITAL INVESTIGATION, 2010, 7 : S95 - S103
  • [2] Peer-to-Peer Networks
    Lin Yu1
    2. Peking University
    [J]. ZTE Communications, 2006, (01) : 53 - 57
  • [3] Peer-to-peer networks
    Fox, G
    [J]. COMPUTING IN SCIENCE & ENGINEERING, 2001, 3 (03) : 75 - 77
  • [4] COOPERATION IN PEER-TO-PEER NETWORKS
    Gradowski, Tomasz
    Mrowinski, Maciej J.
    Kosinski, Robert A.
    [J]. ACTA PHYSICA POLONICA B, 2010, 41 (05): : 1143 - 1149
  • [5] Peer-to-Peer Networks 2
    Lin Yu 1
    2. Peking University
    [J]. ZTE Communications, 2006, (02) : 61 - 64
  • [6] Butterflies and peer-to-peer networks
    Datar, M
    [J]. ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 310 - 322
  • [7] Searching in peer-to-peer networks
    Klampanos, Iraklis A.
    Jose, Joemon M.
    [J]. COMPUTER SCIENCE REVIEW, 2012, 6 (04) : 161 - 183
  • [8] Tracerouting peer-to-peer networks
    Liu, WL
    Boutaba, R
    [J]. Monitoring Internet Traffic and Services, 2005, : 101 - 114
  • [9] Simulating Peer-to-Peer Networks
    Dhurandher, Sanjay K.
    Misra, Sudip
    Obaidat, Mohammad S.
    Singh, Inderpreet
    Agarwal, Raghu
    Bhambhani, Bhuvnesh
    [J]. 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 336 - +
  • [10] Peer-to-Peer Accommodation Networks
    Pappas, Nikolaos
    [J]. TOURISM MANAGEMENT, 2019, 74 : 425 - 425