Forensic Investigation of Peer-to-Peer Networks

The community of peer-to-peer (P2P) file-sharing networks has been expanding swiftly since the appearance of the very first P2P application (Napster) in 2001. These networks are famous for their excellent file transfer rates and adversely, the flooding of copyright-infringed digital materials. Recently, a number of documents containing personal data or sensitive information have been shared in an unbridled manner over the Foxy network (a popular P2P network in Chinese regions). These incidents have urged the authors to develop an investigation model for tracing suspicious P2P activities. Unfortunately, hindered DOI: 10.4018/978-1-60566-836-9.ch015

[1]  Olfa Nasraoui,et al.  Node-Based Probing and Monitoring to Investigate Use of Peer-to-Peer Technologies for Distribution of Contraband Material , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.

[2]  William H. Sanders,et al.  Modeling Peer-to-Peer Botnets , 2008, 2008 Fifth International Conference on Quantitative Evaluation of Systems.

[3]  J. Lloret,et al.  Public Domain P2P File-Sharing Networks Measurements and Modeling , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).

[4]  Takeshi Shinohara,et al.  Model analysis of digital copyright piracy on P2P networks , 2004, 2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops..

[5]  K.P. Chow,et al.  BTM - An Automated Rule-based BT Monitoring System for Piracy Detection , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[6]  Evangelos P. Markatos,et al.  Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[7]  Bin Fan,et al.  Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems , 2006, 2006 IEEE International Conference on Communications.

[8]  K. Lee,et al.  Monitoring Challenges and Approaches for P2P File-Sharing Systems , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).

[9]  Ian T. Foster,et al.  Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.

[10]  Marc Fetscherin,et al.  Music piracy on peer-to-peer networks , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[11]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[12]  R. Susitaival,et al.  Analyzing the file availability and download time in a P2P file sharing system , 2007, 2007 Next Generation Internet Networks.