![]() One of the main priorities for P2P investigators is to identify cases where a user is actively engaged in the production of child sexual abuse (CSA) media - they can be indicators of recent or on-going child abuse. The increasing levels of criminal media being shared in peer-to-peer (P2P) networks pose a significant challenge to law enforcement agencies. ICOP: Live Forensics to Reveal Previously Unknown Criminal Media on P2PĬlaudia Peersmana, Christian Schulzeb, Awais Rashida, Margaret Brennanc, Carl FischeraĪSecurity Lancaster Research Centre, Lancaster University, Lancaster, UK b German Research Center for Artificial Intelligence (DFKI), Kaiserslautern, Germany cSchool ofApplied Psychology, University College Cork, Cork, Ireland Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. ![]() As a service to our customers we are providing this early version of the manuscript. This is a PDF file of an unedited manuscript that has been accepted for publication. Please cite this article as: Peersman C, Schulze C, Rashid A, Brennan M, Fischer C, iCOP: Live forensics to reveal previously unknown criminal media on P2P networks, Digital Investigation (2016), doi: 10.1016/j.diin.2016.07.002. Received Date: 15 November 2015 Revised Date: 6 June 2016 Accepted Date: 13 July 2016 ICOP: Live forensics to reveal previously unknown criminal media on P2P networks Claudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan, Carl Fischer Finally, our evaluation on real CSA case data shows high degrees of accuracy, while hands-on trials with law enforcement officers demonstrate the toolkit's complementarity to extant investigative workflows. In addition, the system offers secondary features, such as showing on-line sharers of known CSA files and the ability to see other files shared by the same GUID or other IP addresses used by the same P2P client. The approach has been implemented into the iCOP toolkit, a software package that is designed to perform live forensic analysis on a P2P network environment. Additionally, the research was extensively discussed with law enforcement cybercrime specialists from different European countries and Interpol. In this paper, we present a new intelligent forensics approach that incorporates the advantages of artificial intelligence and machine learning theory to automatically flag new/previously unseen CSA media to investigators. As a result, these tools are not able to adequately triage the thousands of results they retrieve, nor can they identify new child abuse media that are being released on to a network. ![]() Although a number of P2P monitoring tools exist to detect paedophile activity in such networks, they typically rely on hash value databases of known CSA media. One of the main priorities for P2P investigators is to identify cases where a user is actively engaged in the production of child sexual abuse (CSA) media – they can be indicators of recent or on-going child abuse. Abstract of research paper on Computer and information sciences, author of scientific article - Claudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan, Carl Fischer
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |