Reference Hub4
Forensic Investigation of Peer-to-Peer Networks

Forensic Investigation of Peer-to-Peer Networks

Ricci S.C. Ieong, Pierre K.Y. Lai, K. P. Chow, Michael Y.K. Kwan, Frank Y.W. Law
ISBN13: 9781605668369|ISBN10: 1605668362|EISBN13: 9781605668376
DOI: 10.4018/978-1-60566-836-9.ch015
Cite Chapter Cite Chapter

MLA

Ieong, Ricci S.C., et al. "Forensic Investigation of Peer-to-Peer Networks." Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, edited by Chang-Tsun Li, IGI Global, 2010, pp. 355-378. https://doi.org/10.4018/978-1-60566-836-9.ch015

APA

Ieong, R. S., Lai, P. K., Chow, K. P., Kwan, M. Y., & Law, F. Y. (2010). Forensic Investigation of Peer-to-Peer Networks. In C. Li (Ed.), Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions (pp. 355-378). IGI Global. https://doi.org/10.4018/978-1-60566-836-9.ch015

Chicago

Ieong, Ricci S.C., et al. "Forensic Investigation of Peer-to-Peer Networks." In Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, edited by Chang-Tsun Li, 355-378. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-836-9.ch015

Export Reference

Mendeley
Favorite

Abstract

The community of peer-to-peer (P2P) file-sharing networks has been expanding swiftly since the appearance of the very first P2P application (Napster) in 2001. These networks are famous for their excellent file transfer rates and adversely, the flooding of copyright-infringed digital materials. Recently, a number of documents containing personal data or sensitive information have been shared in an unbridled manner over the Foxy network (a popular P2P network in Chinese regions). These incidents have urged the authors to develop an investigation model for tracing suspicious P2P activities. Unfortunately, hindered by the distributed design and anonymous nature of these networks, P2P investigation can be practically difficult and complicated. In this chapter, the authors briefly review the characteristics of current P2P networks. By observing the behaviors of these networks, they propose some heuristic rules for identifying the first uploader of a shared file. Also, the rules have been demonstrated to be applicable to some simulated cases. The authors believe their findings provide a foundation for future development in P2P file-sharing networks investigation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.