Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

The dark side of I2P, a forensic analysis case study

Bazli, B, Wilson, M and Hurst, W (2017) The dark side of I2P, a forensic analysis case study. Systems Science and Control Engineering, 5 (1). pp. 278-286. ISSN 2164-2583

[img]
Preview
Text
The Dark side of I2P Forensic Analysis Case Study.pdf - Accepted Version
Available under License Creative Commons Attribution.

Download (442kB) | Preview

Abstract

© 2017 The Author(s). File sharing applications, which operate as a form of Peer-to-Peer (P2P) network, are popular amongst users and developers due to their heterogeneity, decentralized approach and rudimentary deployment features. However, they are also used for illegal online activities and often are infested with malicious content such as viruses and contraband material. This brings new challenges to forensic investigations in detecting, retrieving and examining the P2P applications. Within the domain of P2P applications, the Invisible Internet Project (IP2) is used to allow applications to communicate anonymously. As such, this work discusses its use by network node operators and known attacks against privacy or availability of I2P routers. Specifically, we investigate the characteristics of I2P networks in order to outline the security flaws and the issues in detecting artefacts within the I2P. Furthermore, we present a discussion on new methods to detect the presence of I2P using forensic tools and reconstruct specific I2P activities using artefacts left over by network software.

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science & Mathematics
Publisher: Taylor & Francis Open
Date Deposited: 26 Jul 2018 09:55
Last Modified: 04 Sep 2021 02:33
DOI or ID number: 10.1080/21642583.2017.1331770
URI: https://researchonline.ljmu.ac.uk/id/eprint/9026
View Item View Item