Show simple item record

dc.contributor.authorPeersman, C
dc.contributor.authorSchulze, C
dc.contributor.authorRashid, A
dc.contributor.authorBrennan, Margaret
dc.contributor.authorFischer, C
dc.date.accessioned2018-10-31T15:28:29Z
dc.date.available2018-10-31T15:28:29Z
dc.date.issued2016-09
dc.identifier.issn1742-2876
dc.identifier.other0
dc.identifier.urihttp://hdl.handle.net/10026.1/12700
dc.descriptionpublisher: Elsevier articletitle: iCOP: Live forensics to reveal previously unknown criminal media on P2P networks journaltitle: Digital Investigation articlelink: http://dx.doi.org/10.1016/j.diin.2016.07.002 content_type: article copyright: © 2016 The Authors. Published by Elsevier Ltd.
dc.description.abstract

The increasing levels of criminal media being shared in peer-to-peer (P2P) networks pose a significant challenge to law enforcement agencies. One of the main priorities for P2P investigators is to identify cases where a user is actively engaged in the production of child sexual abuse (CSA) media – they can be indicators of recent or on-going child abuse. Although a number of P2P monitoring tools exist to detect paedophile activity in such networks, they typically rely on hash value databases of known CSA media. As a result, these tools are not able to adequately triage the thousands of results they retrieve, nor can they identify new child abuse media that are being released on to a network. In this paper, we present a new intelligent forensics approach that incorporates the advantages of artificial intelligence and machine learning theory to automatically flag new/previously unseen CSA media to investigators. Additionally, the research was extensively discussed with law enforcement cybercrime specialists from different European countries and Interpol. The approach has been implemented into the iCOP toolkit, a software package that is designed to perform live forensic analysis on a P2P network environment. In addition, the system offers secondary features, such as showing on-line sharers of known CSA files and the ability to see other files shared by the same GUID or other IP addresses used by the same P2P client. Finally, our evaluation on real CSA case data shows high degrees of accuracy, while hands-on trials with law enforcement officers demonstrate the toolkit's complementarity to extant investigative workflows.

dc.format.extent50-64
dc.languageen
dc.language.isoen
dc.publisherElsevier
dc.subjectViolence Research
dc.subjectPediatric
dc.subjectChild Abuse and Neglect Research
dc.subject16 Peace, Justice and Strong Institutions
dc.titleiCOP: Live forensics to reveal previously unknown criminal media on P2P networks
dc.typejournal-article
dc.typeJournal Article
plymouth.volume18
plymouth.publication-statusPublished
plymouth.journalDigital Investigation
dc.identifier.doi10.1016/j.diin.2016.07.002
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Health
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA04 Psychology, Psychiatry and Neuroscience
dcterms.dateAccepted2016-07-13
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1016/j.diin.2016.07.002
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2016-09
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV