Investigating Cybercrimes that Occur on Documented P2P Networks

Investigating Cybercrimes that Occur on Documented P2P Networks

Mark Scanlon, Alan Hannaway, Mohand-Tahar Kechadi
Copyright: © 2011 |Volume: 3 |Issue: 2 |Pages: 8
ISSN: 1941-6237|EISSN: 1941-6245|EISBN13: 9781613505502|DOI: 10.4018/jaci.2011040104
Cite Article Cite Article

MLA

Scanlon, Mark, et al. "Investigating Cybercrimes that Occur on Documented P2P Networks." IJACI vol.3, no.2 2011: pp.56-63. http://doi.org/10.4018/jaci.2011040104

APA

Scanlon, M., Hannaway, A., & Kechadi, M. (2011). Investigating Cybercrimes that Occur on Documented P2P Networks. International Journal of Ambient Computing and Intelligence (IJACI), 3(2), 56-63. http://doi.org/10.4018/jaci.2011040104

Chicago

Scanlon, Mark, Alan Hannaway, and Mohand-Tahar Kechadi. "Investigating Cybercrimes that Occur on Documented P2P Networks," International Journal of Ambient Computing and Intelligence (IJACI) 3, no.2: 56-63. http://doi.org/10.4018/jaci.2011040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybercrime is ever increasing. P2P systems can be used or exploited to aid in the execution of a large number of online criminal activities, e.g., copyright infringement, fraud, malware and virus distribution, botnet creation, and control. P2P technology is perhaps most famous for the unauthorised distribution of copyrighted materials since the late 1990’s, with the popularity of file-sharing programs such as Napster. In 2004, P2P traffic accounted for 80% of all Internet traffic and in 2005, specifically BitTorrent traffic accounted for over 60% of the world’s P2P bandwidth usage. This paper outlines a methodology for investigating a documented P2P network, BitTorrent, using a sample investigation for reference throughout. The sample investigation outlined was conducted on the top 100 most popular BitTorrent swarms over the course of a one week period.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.