Affiliation:
1. Kaunas University of Technology, Computer Department, Kaunas, Lithuania
Abstract
The BitTorrent Sync client application is the most progressive development in
the BitTorrent family. Nevertheless, it can be used for the activities that
draw the attention of the forensics invetigators. The BitTorrent Sync client
application employs quite largely the encryption for sending data packages.
The initiation of the activity is carried out in the plain text only.
Therefore, we proposed the methodology that enables to capture the initiation
step and to inform the forensics investigator, which then takes the reactive
actions. The experiment was carried in two modes: 1) simulating of the use of
the BitTorrent Sync application; 2) monitoring of real traffic on the
Internet. During the monitoring, it is possible to calculate the public
lookup SHA1 hash of the shared file. The comparison of the calculated hash
with the list of publicly available hashes allows determination whether
sharing of the file is legal or illegal. The presented methodology can be
applied to any BitTorrent protocol.
Publisher
National Library of Serbia
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献