{"title":"P2P协议的取证调查框架","authors":"T. Manesh, M. Sha, K. Vivekanandan","doi":"10.1109/ICCICCT.2014.6992966","DOIUrl":null,"url":null,"abstract":"Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"26 1","pages":"256-264"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Forensic investigation framework for P2P protocol\",\"authors\":\"T. Manesh, M. Sha, K. Vivekanandan\",\"doi\":\"10.1109/ICCICCT.2014.6992966\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.\",\"PeriodicalId\":6615,\"journal\":{\"name\":\"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)\",\"volume\":\"26 1\",\"pages\":\"256-264\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCICCT.2014.6992966\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCICCT.2014.6992966","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
在过去的十年里,随着互联网用户数量的急剧增加,在线分享数字同意书已经变得很普遍。有许多在线共享资源提供了巨大的存储空间。这些设施促使互联网用户上传和下载盗版软件、电影和其他类似的侵犯版权的数字资产。P2P协议在这些在线共享网站和资源的背后起着作用。该网络小组现在在全国各地非常活跃,追踪和欺诈性共享文件。因此,作为网络取证调查的一部分,有必要建立一种有效的机制来查找正在从特定机器上传或下载的实际内容。通常,P2P网站和服务在企业和教育机构被封锁,以避免共享不必要的数字资产,并增加互联网带宽。该技术基于网络取证技术,可对P2P Bit Torrent协议进行内容级观察,并生成恶意用户之间的原始恶意内容或会话,为其在法庭上的起诉提供依据。
Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.