P2P Investigation PEDRO GALLEGOS. Topics  Overview of P2P  Direct vs Hearsay  Investigation Steps  Analysis Gnutella Protocol  RoundUp.

Slides:



Advertisements
Similar presentations
Making P2P Networks Scalable a paper presentation by Derek Tingle.
Advertisements

The BitTorrent Protocol. What is BitTorrent?  Efficient content distribution system using file swarming. Does not perform all the functions of a typical.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks Karim El Defrawy, Minas Gjoka, Athina Markopoulou UC Irvine.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
Peer to Peer (P2P) Networks and File sharing. By: Ryan Farrell.
File Distribution BitTorrents Mike Bohrer BitTorrents Mike Bohrer.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Basic Computer Networks Configurations (cont.) School of Business Eastern Illinois University © Abdou Illia, Spring 2006 Week 2, Thursday 1/19/2006)
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Presented by Stephen Kozy. Presentation Outline Definition and explanation Comparison and Examples Advantages and Disadvantages Illegal and Legal uses.
Comparing Hybrid Peer-to-Peer Systems Beverly Yang and Hector Garcia-Molina Presented by Marco Barreno November 3, 2003 CS 294-4: Peer-to-peer systems.
A. Frank Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (2) Thanks to Carmit Valit and Olga Gamayunov.
P2P WeeSan Lee
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Peer-2-Peer File Sharing Kenie Moses TECH621Social Internet Spring 2011.
The Current Landscape of P2P File Sharing: Challenges and Future Directions Kevin Bauer Ph.D. candidate University of Colorado.
Forensic and Investigative Accounting
Introduction Widespread unstructured P2P network
Cmpe 494 Peer-to-Peer Computing Anıl Gürsel Didem Unat.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent Internet Technologies and Applications.
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Forensics Investigation of Peer-to- Peer File Sharing Networks Authors: Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine & Clay Shields.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
徐晨桓 李柏穎.  Definition  Introduction  History  Example - Napster  Example - Gnutella 徐晨桓 李柏穎 2/27.
P2P Web Standard IS3734/19/10 Michael Radzin. What is P2P? Peer to Peer Networking (P2P) is a “direct communications initiations session.” Modern uses.
D iocesan B oys’ S chool L 6 ASL C omputer A pplications R eading S cheme B it T orrent C han C hun H o L 6A (1)
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 24, 2011.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 2: Application layer
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Bit Torrent A good or a bad?. Common methods of transferring files in the internet: Client-Server Model Peer-to-Peer Network.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Here you are at your computer, but you don’t have internet connections. Your ISP becomes your link to the internet. In order to get access you need to.
Presentation to France Telecom Ashwin Navin Co-Founder, Chief Operating Officer bittorrent.com.
Mastering Windows Network Forensics and Investigation Chapter 13: Logon and Account Logon Events.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
1 Peer-to-Peer Systems r Application-layer architectures r Case study: BitTorrent r P2P Search and Distributed Hash Table (DHT)
2: Application Layer1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP r.
Part 3: Internet Applications The Basics of Networking, Part 3 chapter 3.
PEER TO PEER (P2P) NETWORK By: Linda Rockson 11/28/06.
B IT T ORRENT T ECHNOLOGY Anthony Pervetich. H ISTORY Bram Cohen Designed the BitTorrent protocol in April 2001 Released July 2, 2001 Concept Late 90’s.
Impact of Incentives in BitTorrent By Jenny Liu and Seth Cooper.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Unit 2 - Hardware Networking. What is a network? A computer network is essentially a connection between two or more computers. This connection can be.
Unit 4, Lesson 10 Comparing Network Types AOIT Principles of Information Technology Copyright © 2007–2011 National Academy Foundation. All rights reserved.
Bit Torrent Nirav A. Vasa. Topics What is BitTorrent? Related Terms How BitTorrent works Steps involved in the working Advantages and Disadvantages.
2-Hop TorrentSmell A distributed tracking algorithm name:Raynor Vliegendhart date:July 10, 2009 event:Tribler Dev Meeting.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
By:miguel iturrade.  A computer network is a group of computers that are connected to each other for the purpose of communication.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
November 19, 2016 Guide:- Mrs. Kale J. S. Presented By:- Hamand Amol Sambhaji. Hamand Amol Sambhaji. Pardeshi Dhananjay Rajendra. Pardeshi Dhananjay Rajendra.
An example of peer-to-peer application
Instructor Materials Chapter 10: Application Layer
BitTorrent Vs Gnutella.
PEER TO PEER BitTorrent.
Do incentives build robustness in BitTorrent?
The University of Adelaide, School of Computer Science
The BitTorrent Protocol
Internet Connection Sharing
PEER-TO-PEER SYSTEMS.
DNSR: Domain Name Suffix-based Routing in Overlay Networks
Client/Server and Peer to Peer
Computer Networks Protocols
#02 Peer to Peer Networking
Presentation transcript:

P2P Investigation PEDRO GALLEGOS

Topics  Overview of P2P  Direct vs Hearsay  Investigation Steps  Analysis Gnutella Protocol  RoundUp

Overview of P2P  P2P stands for Peer-to-Peer  Way to distribute files  Gnutella  Supports queries  Peers inform each other of files  BitTorrent  Uses torrent files  Trackers inform client of peers

Direct VS Hearsay  Direct  When an investigator has a direct connection, that is,a TCP connection to a process on a remote computer, and receives information about that specific computer, that information is direc t  Hearsay  When a process on one remote machine relays information for or about another,different machine.

Investigation Steps  Determine Files of Interest (FOIs)  Use P2P to find candidates  Narrow down the candidates  Attempt to verify possession or distribution

Investigation Steps Cont.  A subpoena to the ISP is obtained  On basis of evidence, obtain search warrant  Perform search

Analysis Gnutella Protocol Overview  Before warrant is obtained, it is important to only gather data that is in public domain through:  Queries  Swarming Information  Browsing Host  File download

RoundUp  RoundUp is a tool for forensically valid investigations of the Gnuetella network

Questions?

Sources:  Forensic Investigation of Peer-to-Peer File Sharing Network. Robert Erdely, Thomas Kerle, Brian Levine, Marc Liberatore and Clay Shields.