Remote computer fingerprinting for cyber crime investigations

3Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper describes a novel tool for remotely "fingerprinting" computers used in criminal activity. The tool employs network scanning and machine identification techniques to acquire a fingerprint of a computer over the Internet. The fingerprint includes identifying information about the operating system, banners, enumerations and services. Once the computer is seized, it is connected to a closed network and scanned again to produce a second fingerprint to check against the original. Two scenarios - one related to investigating pedophiles and the other involving an illegal website - are examined. Legal issues pertaining to the use of computer fingerprinting in criminal investigations are also discussed. © 2004 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Novotny, J., Schulte, D., Manes, G., & Shenoi, S. (2004). Remote computer fingerprinting for cyber crime investigations. In IFIP Advances in Information and Communication Technology (Vol. 142, pp. 3–15). Springer New York LLC. https://doi.org/10.1007/1-4020-8070-0_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free