Repository logo
  • Log In
    New user? Click here to register.Have you forgotten your password?
University College Dublin
    Colleges & Schools
    Statistics
    All of DSpace
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. College of Science
  3. School of Computer Science
  4. Computer Science Research Collection
  5. Network Investigation Methodology for BitTorrent Sync: A Peer-to-Peer Based File Synchronisation Service
 
  • Details
Options

Network Investigation Methodology for BitTorrent Sync: A Peer-to-Peer Based File Synchronisation Service

Author(s)
Scanlon, Mark  
Farina, Jason  
Kechadi, Tahar  
Uri
http://hdl.handle.net/10197/7396
Date Issued
2015-10
Date Available
2017-10-01T01:00:22Z
Abstract
High availability is no longer just a business continuity concern. Users are increasingly dependant on devices that consume and produce data in ever increasing volumes. A popular solution is to have a central repository which each device accesses after centrally managed authentication. This model of use is facilitated by cloud based file synchronisation services such as Dropbox, OneDrive, Google Drive and Apple iCloud. Cloud architecture allows the provisioning of storage space with 'always-on' access. Recent concerns over unauthorised access to third party systems and large scale exposure of private data have made an alternative solution desirable. These events have caused users to assess their own security practices and the level of trust placed in third party storage services. One option is BitTorrent Sync, a cloudless synchronisation utility provides data availability and redundancy. This utility replicates files stored in shares to remote peers with access controlled by keys and permissions. While lacking the economies brought about by scale, complete control over data access has made this a popular solution. The ability to replicate data without oversight introduces risk of abuse by users as well as difficulties for forensic investigators. This paper suggests a methodology for investigation and analysis of the protocol to assist in the control of data flow across security perimeters.
Type of Material
Journal Article
Publisher
Elsevier
Journal
Computers and Security
Volume
54
Start Page
27
End Page
43
Copyright (Published Version)
2015 Elsevier
Subjects

BitTorrent sync

Distributed storage

Peer-to-peer

Network traffic analy...

Remote evidence acqui...

DOI
10.1016/j.cose.2015.05.003
Language
English
Status of Item
Peer reviewed
This item is made available under a Creative Commons License
https://creativecommons.org/licenses/by-nc-nd/3.0/ie/
File(s)
Loading...
Thumbnail Image
Name

NetworkInvestigationMethodologyForBitTorrentSync.pdf

Size

1.54 MB

Format

Adobe PDF

Checksum (MD5)

b4ffeff1a342aa123f1e78951ea4cbd9

Owning collection
Computer Science Research Collection
Mapped collections
Insight Research Collection

Item descriptive metadata is released under a CC-0 (public domain) license: https://creativecommons.org/public-domain/cc0/.
All other content is subject to copyright.

For all queries please contact research.repository@ucd.ie.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement