Show simple item record

dc.contributor.authorPeersman, C
dc.contributor.authorRashid, A
dc.contributor.authorSchulze, C
dc.contributor.authorBrennan, Margaret
dc.contributor.authorFischer, C
dc.date.accessioned2018-11-27T09:58:24Z
dc.date.available2018-11-27T09:58:24Z
dc.date.issued2014-05
dc.identifier.isbn9781479951031
dc.identifier.issn1081-6011
dc.identifier.urihttp://hdl.handle.net/10026.1/12906
dc.description.abstract

The increasing levels of child sex abuse (CSA) media being shared in peer-to-peer (P2P) networks pose a significant challenge for law enforcement agencies. Although a number of P2P monitoring tools to detect offender activity in such networks exist, they typically rely on hash value databases of known CSA media. Such an approach cannot detect new or previously unknown media being shared. Conversely, identifying such new previously unknown media is a priority for law enforcement - they can be indicators of recent or on-going child abuse. Furthermore, originators of such media can be hands-on abusers and their apprehension can safeguard children from further abuse. The sheer volume of activity on P2P networks, however, makes manual detection virtually infeasible. In this paper, we present a novel approach that combines sophisticated filename and media analysis techniques to automatically flag new previously unseen CSA media to investigators. The approach has been implemented into the iCOP toolkit. Our evaluation on real case data shows high degrees of accuracy while hands-on trials with law enforcement officers highlight iCOP's usability and its complementarity to existing investigative workflows.

dc.format.extent124-131
dc.language.isoen
dc.publisherIEEE
dc.subjectPediatric
dc.titleiCOP: Automatically Identifying New Child Abuse Media in P2P Networks
dc.typeconference
dc.typeConference Proceeding
plymouth.date-start2014-05-17
plymouth.date-finish2014-05-18
plymouth.volume2014-January
plymouth.conference-name2014 IEEE Security and Privacy Workshops (SPW)
plymouth.publication-statusPublished
plymouth.journal2014 IEEE Security and Privacy Workshops
dc.identifier.doi10.1109/SPW.2014.27
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Health
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA04 Psychology, Psychiatry and Neuroscience
dcterms.dateAccepted2014-11-20
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1109/SPW.2014.27
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV