Forensic investigation framework for P2P protocol

T. Manesh, M. Sha, K. Vivekanandan
{"title":"Forensic investigation framework for P2P protocol","authors":"T. Manesh, M. Sha, K. Vivekanandan","doi":"10.1109/ICCICCT.2014.6992966","DOIUrl":null,"url":null,"abstract":"Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"26 1","pages":"256-264"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCICCT.2014.6992966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
P2P协议的取证调查框架
在过去的十年里,随着互联网用户数量的急剧增加,在线分享数字同意书已经变得很普遍。有许多在线共享资源提供了巨大的存储空间。这些设施促使互联网用户上传和下载盗版软件、电影和其他类似的侵犯版权的数字资产。P2P协议在这些在线共享网站和资源的背后起着作用。该网络小组现在在全国各地非常活跃,追踪和欺诈性共享文件。因此,作为网络取证调查的一部分,有必要建立一种有效的机制来查找正在从特定机器上传或下载的实际内容。通常,P2P网站和服务在企业和教育机构被封锁,以避免共享不必要的数字资产,并增加互联网带宽。该技术基于网络取证技术,可对P2P Bit Torrent协议进行内容级观察,并生成恶意用户之间的原始恶意内容或会话,为其在法庭上的起诉提供依据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Adept spectral filter for fading nonisotropic channel model Received signal strength index estimation using Kalman Filter for fuzzy based transmission power control in wireless sensor networks An efficient scalar multiplication algorithm for ECC in WSNs An electrochemical DNA-Prussian blue-carbon paste biosensor for the detection of ascorbic acid in pharmaceuticals Implementing One Time Password based security mechanism for securing personal health records in cloud
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1