A methodology and tool for investigation of artifacts left by the BitTorrent client

3Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

The BitTorrent client application is a popular utility for sharing large files over the Internet. Sometimes, this powerful utility is used to commit cybercrimes, like sharing of illegal material or illegal sharing of legal material. In order to help forensics investigators to fight against these cybercrimes, we carried out an investigation of the artifacts left by the BitTorrent client. We proposed a methodology to locate the artifacts that indicate the BitTorrent client activity performed. Additionally, we designed and implemented a tool that searches for the evidence left by the BitTorrent client application in a local computer running Windows. The tool looks for the four files holding the evidence. The files are as follows: *.torrent, dht.dat, resume.dat, and settings.dat. The tool decodes the files, extracts important information for the forensic investigator and converts it into XML format. The results are combined into a single result file.

Cite

CITATION STYLE

APA

Venčkauskas, A., Jusas, V., Paulikas, K., & Toldinas, J. (2016). A methodology and tool for investigation of artifacts left by the BitTorrent client. Symmetry, 8(6). https://doi.org/10.3390/sym8060040

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free