FORWEB: file fingerprinting for automated network forensics investigations
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Packet forwarding with source verification
Computer Networks: The International Journal of Computer and Telecommunications Networking
Application-Layer Traffic Analysis of a Peer-to-Peer System
IEEE Internet Computing
On the session lifetime distribution of Gnutella
International Journal of Parallel, Emergent and Distributed Systems
Computer Standards & Interfaces
Improving peer-to-peer search performance through intelligent social search
Expert Systems with Applications: An International Journal
PRIME: peer-to-peer receiver-driven mesh-based streaming
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
Peer-to-peer (P2P) networks allow the searching and downloading of files. As files can be easily and efficiently copied using P2P software by the general public, criminal activity such as music and film piracy that rely on the transfer of large amounts of data are becoming more common. P2P networks are also used for the dissemination and storage of indecent images and malware including computer viruses, worms and spyware, and may be used by criminal gangs and terrorist groups. We examine the forensic investigation of P2P, an activity that currently lacks commonly used guidelines. Peer-to-peer (P2P) networks allow the searching and downloading of files, with their nodes acting as either producers or consumers of data and resources.^1^,^2^,^3 These environments provide a logical 'mesh' overlaying the physical network. Currently there are numerous P2P programs in general use on the Internet - examples of commonly used P2P systems include Gnutella, eDonkey, Fast Track and Bit Torrent.^4^,^5^,^6