Measurement and Analysis of Child Pornography Trafficking on Gnutella and eMule

Peer-to-peer networks are the most popular mechanism for the criminal acquisition and distribution of child pornography (CP). In this paper, we examine observations of peers sharing known CP on the Gnutella and eMule networks, which were collected by law enforcement using forensic tools that we developed. We characterize a year’s worth of network activity and evaluate different strategies for prioritizing investigators’ limited resources. First, we focus on strategies for reducing the number of CP files available on the network by removing a minimal number of peers. We present a metric for peer removal that is more effective than simply selecting peers with the largest libraries or the most days online. We show that any successful strategy must target offenders from all countries. Second, we characterize the aggressiveness of six peer subgroups, including: peers using Tor, peers that bridge multiple p2p networks, and the top 10% of peers contributing to file availability. We find that these subgroups are more aggressive in their trafficking, having more known CP and more uptime, than the average peer. Finally, while in theory Tor presents a challenge to investigators, we observe that in practice offenders use Tor inconsistently. Over 90% of regular Tor users send traffic from a non-Tor IP at least once after first using Tor.

[1]  Fabián E. Bustamante,et al.  On blind mice and the elephant: understanding the network impact of a large distributed system , 2011, SIGCOMM.

[2]  He Liu,et al.  Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.

[3]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[4]  Clémence Magnien,et al.  Quantifying paedophile queries in a large P2P system , 2011, 2011 Proceedings IEEE INFOCOM.

[5]  梁 啓超,et al.  庸言 = The justice , 2022 .

[6]  Kai Hwang,et al.  Collusive Piracy Prevention in P2P Content Delivery Networks , 2009, IEEE Transactions on Computers.

[7]  Pablo Rodriguez,et al.  I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system , 2007, IMC '07.

[8]  Di Wu,et al.  Unraveling the BitTorrent Ecosystem , 2011, IEEE Transactions on Parallel and Distributed Systems.

[9]  Stephen Gibson,et al.  Peer-to-peer: is deviant behavior the norm on P2P file-sharing networks? , 2006, IEEE Distributed Systems Online.

[10]  Vern Paxson,et al.  Measuring Pay-per-Install: The Commoditization of Malware Distribution , 2011, USENIX Security Symposium.

[11]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[12]  J. Wolak,et al.  Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study. , 2005 .

[13]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[14]  Chad M. S. Steel Child pornography in peer-to-peer networks. , 2009, Child abuse & neglect.

[15]  Brian Neil Levine,et al.  Strengthening forensic investigations of child pornography on P2P networks , 2010, Co-NEXT '10.

[16]  Jacky C. Chu,et al.  Availability and locality measurements of peer-to-peer file systems , 2002, SPIE ITCom.

[17]  Stefan Savage,et al.  Dirty Jobs: The Role of Freelance Labor in Web Service Abuse , 2011, USENIX Security Symposium.

[18]  Chris Kanich,et al.  Show Me the Money: Characterizing Spam-advertised Revenue , 2011, USENIX Security Symposium.

[19]  Orin S. Kerr Computer crime law , 2006 .

[20]  Brian Neil Levine,et al.  Effective Digital Forensics Research Is Investigator-Centric , 2011, HotSec.

[21]  Arun Venkataramani,et al.  Do incentives build robustness in bit torrent , 2007 .

[22]  Jeremy Prichard,et al.  Internet subcultures and pathways to the use of child pornography , 2011, Comput. Law Secur. Rev..

[23]  Yuval Shavitt,et al.  Detecting Pedophile Activity in BitTorrent Networks , 2012, PAM.

[24]  Nicolas Christin,et al.  Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.

[25]  Paul Rayson,et al.  Supporting Law Enforcement in Digital Communities through Natural Language Analysis , 2008, IWCF.

[26]  Bin Li,et al.  Content Availability and Bundling in Swarming Systems , 2013, IEEE/ACM Trans. Netw..

[27]  Stefan Savage,et al.  An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.

[28]  Walid Dabbous,et al.  Compromising Tor Anonymity Exploiting P2P Information Leakage , 2010, ArXiv.

[29]  Staal A. Vinterbo,et al.  A note on the hardness of the k-ambiguity problem , 2002 .

[30]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.