The Case for Validating ADDIE Model as a Digital Forensic Model for Peer-to-Peer Network Investigation

نویسندگان

چکیده

Abstract Rapid technological advancement can substantially impact the processes of digital forensic investigation and present a myriad challenges to investigator. With these challenges, it is necessary have standard framework as foundation any investigation. State-of-the-art models assume that safe move from one stage next. It guides investigators with required steps procedures. This brings great stride validate non-specific be used in most paper considers new technique for detecting active peers participate peer-to-peer (P2P) network. As part our study, we crawled µTorrent P2P client over ten days different instances while logging all participating peers. We then employed techniques analyse popular users generate evidence within them high accuracy. evaluated approach against Analysis, Design, Development, Implementation, Evaluation (ADDIE) model achieve credible presented this paper. Finally, validation case ADDIE using United States Daubert Test Kingdom’s Forensic Science Regulator Guidance – 218 (FSR-G-218) 201 (FSR-G-201) formulate model.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forensic Investigation of Peer-to-Peer Networks

The community of peer-to-peer (P2P) file-sharing networks has been expanding swiftly since the appearance of the very first P2P application (Napster) in 2001. These networks are famous for their excellent file transfer rates and adversely, the flooding of copyright-infringed digital materials. Recently, a number of documents containing personal data or sensitive information have been shared in ...

متن کامل

A Model for Foxy Peer-to-Peer Network Investigations

In recent years, peer-to-peer (P2P) applications have become the dominant form of Internet traffic. Foxy, a Chinese community focused filesharing tool, is increasingly being used to disseminate private data and sensitive documents in Hong Kong. Unfortunately, its scattered design and a highly distributed network make it difficult to locate a file originator. This paper proposes an investigative...

متن کامل

investigating the feasibility of a proposed model for geometric design of deployable arch structures

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

TAC: A Topology-Aware Chord-based Peer-to-Peer Network

Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Systems Frontiers

سال: 2022

ISSN: ['1572-9419', '1387-3326']

DOI: https://doi.org/10.1007/s10796-022-10360-8