Tracking contraband files transmitted using BitTorrent

5Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper describes a digital forensic tool that uses an FPGA-based embedded software application to identify and track contraband digital files shared using the BitTorrent protocol. The system inspects each packet on a network for a BitTorrent Handshake message, extracts the “info hash” of the file being shared, compares the hash against a list of known contraband files and, in the event of a match, adds the message to a log file for forensic analysis. Experiments demonstrate that the system is able to successfully capture and process BitTorrent Handshake messages with a probability of at least 99.0% under a network traffic load of 89.6 Mbps on a 100 Mbps network.

Cite

CITATION STYLE

APA

Schrader, K., Mullins, B., Peterson, G., & Mills, R. (2009). Tracking contraband files transmitted using BitTorrent. In IFIP Advances in Information and Communication Technology (Vol. 306, pp. 159–173). Springer New York LLC. https://doi.org/10.1007/978-3-642-04155-6_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free