Abstract
In these days, a number of illegal file sharers using BitTorrent increase. Sharing copyrighted files without copyright holder’s permission is illegal, so they must be punished. However, it is difficult to find appropriate digital evidences and legal basis to punish them. This paper proposes the methodology about punishing illegal sharer using BitTorrent by suggesting the digital investigation framework. This framework consists of two parts. The first part is acquisition of data on network. In process of network analysis, the methodology to acquire and classify information about peers by analyzing packets is suggested. The second part is acquisition and analysis of data from suspect’s PC. In process of suspects’ PC analysis, the methodology to acquire meaningful evidences by finding traces of file sharing on suspects’ PC is suggested.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
BitTorrent, en.wilipedia.org/wiki/BitTorrent
MGM studios, Inc. v. Grokster, Ltd., 545 U.S.913 (2005)
Lewen, U.M.: Internet File-Sharing: Swedish Pirates Challenge the U.S. 16 Cardozo J. Int’l & Comp. L., 173 (2008)
Schrader, K., Mullins, B., Peterson, G.: Tracking Contraband Files Transmitted Using BitTorrent. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V, IFIP AICT, vol. 306, pp. 159–173. Springer, Heidelberg (2009)
Hatahet, S.: BiTIT: Throttling BitTorrent Illegal Traffic. In: 2010 IEEE Symposium on Computers and Communications, pp. 708–713 (June 2010)
Lallie, H.S.: Windows 7 registry forensic evidence created by three popular BitTorrent clients. Digital Investigation 7(3-4), 127–134 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Park, S., Chung, H., Lee, C., Lee, S. (2012). Methodology for Digital Investigation of Illegal Sharing Using BitTorrent. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_24
Download citation
DOI: https://doi.org/10.1007/978-94-007-5083-8_24
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5082-1
Online ISBN: 978-94-007-5083-8
eBook Packages: EngineeringEngineering (R0)