Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service
نویسندگان
چکیده
High availability is no longer just a business continuity concern. Users are increasingly dependant on devices that consume and produce data in ever increasing volumes. A popular solution is to have a central repository which each device accesses after centrally managed authentication. This model of use is facilitated by cloud based file synchronisation services such as Dropbox, OneDrive, Google Drive and Apple iCloud. Cloud architecture allows the provisioning of storage space with “always-on” access. Recent concerns over unauthorised access to third party systems and large scale exposure of private data have made an alternative solution desirable. These events have caused users to assess their own security practices and the level of trust placed in third party storage services. One option is BitTorrent Sync, a cloudless synchronisation utility provides data availability and redundancy. This utility replicates files stored in shares to remote peers with access controlled by keys and permissions. While lacking the economies brought about by scale, complete control over data access has made this a popular solution. The ability to replicate data without oversight introduces risk of abuse by users as well as difficulties for forensic investigators. This paper suggests a methodology for investigation and analysis of the protocol to assist in the control of data flow across security perimeters.
منابع مشابه
BitTorrent Sync: First Impressions and Digital Forensic Implications
With professional and home Internet users becoming increasingly concerned with data protection and privacy, the privacy afforded by popular cloud file synchronisation services, such as Dropbox, OneDrive and Google Drive, is coming under scrutiny in the press. A number of these services have recently been reported as sharing information with governmental security agencies without warrants. BitTo...
متن کاملOn Assessing Measurement Accuracy in BitTorrent Peer-to-Peer File-Sharing Networks
The BitTorrent peer-to-peer file-sharing network is currently one of the dominant Internet applications. Understanding the characteristics of BitTorrent through real-world measurements is key to improve the quality of service for tens of millions of BitTorrent users, but the complexity and scale of BitTorrent make a single, complete measurement impractical. Thus, an increasing number of real me...
متن کاملOptimization Questions in BitTorrent Communities
A BitTorrent community is a peer-to-peer (P2P) computer network. All users have restricted upload and download bandwidths, and they have different seed libraries, while various objectives could emerge in the network. The behavior of the peers is determined by the BitTorrent protocol which was designed originally for file exchange. However, other applications are also possible as BitTorrent Assi...
متن کاملFriend Recommending Peer To Peer File Sharing And Synchronization Application
P2P architecture is the next-generation network paradigm to replace the traditional client-server architecture. Typical P2P systems are characterized by the decentralized control, scalability and robustness. Centrally managed storage services, such as Dropbox, are popular for synchronizing data between several devices. P2P-based approaches that run fully decentralized, such as BitTorrentSync, a...
متن کاملP2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks
In this paper, we demonstrate that the BitTorrent protocol family is vulnerable to distributed reflective denialof-service (DRDoS) attacks. Specifically, we show that an attacker can exploit BitTorrent protocols (Micro Transport Protocol (uTP) [32], Distributed Hash Table (DHT) [30], Message Stream Encryption (MSE) [8]) and BitTorrent Sync (BTSync) [6] to reflect and amplify traffic from peers....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 54 شماره
صفحات -
تاریخ انتشار 2015