• DocumentCode
    181985
  • Title

    BitTorrent Sync: Network Investigation Methodology

  • Author

    Scanlon, Mark ; Farina, J. ; Kechadi, M-Tahar

  • Author_Institution
    UCD Sch. of Comput. Sci. & Inf., Univ. Coll. Dublin, Dublin, Ireland
  • fYear
    2014
  • fDate
    8-12 Sept. 2014
  • Firstpage
    21
  • Lastpage
    29
  • Abstract
    The volume of personal information and data most Internet users find themselves amassing is ever increasing, and the fast pace of the modern world results in most people requiring instant access to their files. Millions of these users turn to cloud-based file synchronisation services, such as Dropbox, Microsoft SkyDrive, Apple iCloud and Google Drive, to enable "always-on" access to their most up-to-date data from any computer or mobile device with an Internet connection. The prevalence of recent articles regarding invasion of privacy issues and data protection breaches in the media has caused many to review their online personal data security practices. To provide an alternative to cloud-based file backup and synchronisation, BitTorrent Inc. released an alternative cloudless file backup and synchronisation service, named BitTorrent Sync in April 2013. BitTorrent Sync\´s popularity rose dramatically throughout 2013, reaching over two million active users by the end of the year. This paper outlines a number of scenarios where the network investigation of the service may prove invaluable as part of a digital forensic investigation. An investigation methodology is proposed outlining the required steps involved in retrieving digital evidence from the network and the results from a proof of concept investigation are presented.
  • Keywords
    back-up procedures; cloud computing; data protection; digital forensics; file organisation; mobile computing; synchronisation; Apple iCloud; BitTorrent Sync; Dropbox; Google Drive; Internet; Microsoft SkyDrive; cloudless file backup service; cloudless file synchronisation service; data access; data privacy issues; data protection breaches; digital forensic investigation; mobile device; online personal data security practices; Cloud computing; Cryptography; Forensics; Protocols; Servers; Synchronization; BitTorrent Sync; Digital Forensics; Methodology; Network Investigation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Availability, Reliability and Security (ARES), 2014 Ninth International Conference on
  • Conference_Location
    Fribourg
  • Type

    conf

  • DOI
    10.1109/ARES.2014.11
  • Filename
    6980260