Back to Search Start Over

Node-Based Probing and Monitoring to Investigate Use of Peer-to-Peer Technologies for Distribution of Contraband Material

Authors :
Michael Losavio
George E. Higgins
Deborah Keeling
Adel Elmaghraby
Olfa Nasraoui
Source :
SADFE
Publication Year :
2008
Publisher :
IEEE, 2008.

Abstract

We consider the requirements for node-based probing and monitoring for network forensic investigation of the use of peer-to-peer technologies for distribution of contraband material. The architecture of peer-to-peer (P2P) data exchanges must be examined for opportunities to capture data on the transfer of contraband data with a focus on node structures in P2P exchanges. This examination is of technical, social and legal aspects of P2P use leading to the design and testing offorensically-sound investigative tools and protocols. Computational research must examine: 1. Undercover Node-based Probing and Monitoring to Build an Approximate Model of Network Activity 2. Flagging Contraband Content (keyword, hashes, other patterns) 3. Evaluation against different recipient querying, distribution and routing cases 4. Using the Evaluation results to fine-tune the node positioning strategy Legal and social research is needed to examine the U.S. and transnational legal constraints on the use of particular tools and the presence of possible behavioral signatures.

Details

Database :
OpenAIRE
Journal :
2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering
Accession number :
edsair.doi...........86441a7f74cdd842a8c40d4b3fa9ee86
Full Text :
https://doi.org/10.1109/sadfe.2008.16