Forensic investigation framework for P2P protocol

T. Manesh, M. Mohammed Sha, K. Vivekanandan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Online sharing of digital assents have now become common in the internet by its increased number of users over a decade drastically. There are many online sharing resources which offer huge storage. These facilities tend the internet users to upload and download pirated softwares, movies and other similar digital assets which violates all copyrights. The P2P protocol is working behind such online sharing websites and resources. The cyber cell is very active now in various parts of the country to trace and fraudulent sharing of files when reported. So it is necessary to have an efficient mechanism to find the actual content which is being uploaded or downloaded from a particular machine as part of network forensic investigation. Usually P2P websites and services are blocked in enterprises and educational institutions to avoid sharing of unwanted digital assets and also to increase internet bandwidth. The proposed novel technique is based on network forensics which can be used for content level observation of P2P Bit Torrent protocol and regenerate original malicious content or session between malicious users for their prosecution in the court.

Original languageEnglish
Title of host publication2014 International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages256-264
Number of pages9
ISBN (Electronic)9781479941902
DOIs
StatePublished - 18 Dec 2014
Event2014 International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT 2014 - KanyaKumari District, Tamil Nadu, India
Duration: 10 Jul 201411 Jul 2014

Publication series

Name2014 International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT 2014

Conference

Conference2014 International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT 2014
Country/TerritoryIndia
CityKanyaKumari District, Tamil Nadu
Period10/07/1411/07/14

Keywords

  • Network Forensics
  • P2P network
  • P2P Traffic Analysis
  • Packet Reordering
  • PCAP File
  • Torrent File

Fingerprint

Dive into the research topics of 'Forensic investigation framework for P2P protocol'. Together they form a unique fingerprint.

Cite this