Options
Investigating Cybercrimes that Occur on Documented P2P Networks
Author(s)
Date Issued
2013-09-01
Date Available
2023-11-29T17:18:43Z
Abstract
The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybercrime is ever increasing. P2P systems can be used or exploited to aid in the execution of a large number of online criminal activities, e.g., copyright infringement, fraud, malware and virus distribution, botnet creation, and control. P2P technology is perhaps most famous for the unauthorised distribution of copyrighted materials since the late 1990’s, with the popularity of file-sharing programs such as Napster. In 2004, P2P traffic accounted for 80% of all Internet traffic and in 2005, specifically BitTorrent traffic accounted for over 60% of the world’s P2P bandwidth usage. This paper outlines a methodology for investigating a documented P2P network, BitTorrent, using a sample investigation for reference throughout. The sample investigation outlined was conducted on the top 100 most popular BitTorrent swarms over the course of a one week period.
Sponsorship
Irish Research Council
Other Sponsorship
Amazon.com
Type of Material
Book Chapter
Publisher
IGI Global
Language
English
Status of Item
Peer reviewed
Journal
Curran, K. (ed.). Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments
ISBN
9781466620414
This item is made available under a Creative Commons License
File(s)
Loading...
Name
InvestigatingCybercrimesThatOccurOnDocumentedP2PNetworks.pdf
Size
1 MB
Format
Adobe PDF
Checksum (MD5)
d753c74228c636e94f797953e01cfb89
Owning collection