The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2013 vol.17)
pp: 60-66
Yuval Shavitt , Tel-Aviv University
Noa Zilberman , Tel-Aviv University
ABSTRACT
Peer-to-peer networks' widespread use makes multimedia files available to users worldwide. However, such networks are often used to spread illegal material while the data source and acquiring users remain anonymous. This article analyzes activity measurements in the BitTorrent network and examines child sex abuse activity through three major BitTorrent Web portals.
INDEX TERMS
Internet, Privacy, Portals, Peer to peer computing, Information filtering, Law enforcement, Information retrieval, Web search, peer to peer, BitTorrent, child sex abuse, P2P, file sharing
CITATION
Yuval Shavitt, Noa Zilberman, "On the Presence of Child Sex Abuse in BitTorrent Networks", IEEE Internet Computing, vol.17, no. 3, pp. 60-66, May-June 2013, doi:10.1109/MIC.2013.2
REFERENCES
1. K. Mochalski and H. Schulze, Internet Study 2008/2009, Ipoque, 2009.
2. C. Lynn, Image Recognition Takes Another Step Forward, tech. report, Seybold, 2004.
3. M. Liberatore et al., "Forensic Investigation of Peer-to-Peer File Sharing Networks," Proc. Digital Forensic Research Workshop Ann. Digital Forensics Research Conf., Elsevier, 2010; doi:10.1016j.diin.2010.05.012.
4. F. Waters, "Challenges and Solutions for Protecting our Children from Violence and Exploitation in the 21st Century," testimony to US Senate Committee on the Judiciary, Subcommittee on Crime and Drugs, 2007.
5. P. Fagundes, "Fighting Internet Child Pornography: The Brazilian Experience," The Police Chief, Sept. 2009.
6. "Crimes against Children," Interpol fact sheet COM/FS/2009-09/THB-03, 2009.
7. M. Brennan and S. Hammond, Complete Critical Literature Rev., tech. report, Identifying and Catching Originators in P2P Networks (iCOP), 2011.
8. D. Hughes et al., "Peer-to-Peer: Is Deviant Behavior the Norm on P2P File Sharing Networks?" IEEE Distributed Systems Online, vol. 7, no. 2, 2006.
9. V. Vehovar et al., An Empirical Investigation of Paedophile Keywords in eDonkey P2P Network, tech. report, Measurement and Analysis of P2P Activity against Pedophile Content Project, 2009.
10. M. Latapy, C. Magnien, and R. Fournier, "Quantifying Paedophile Queries in a Large P2P System," Proc. IEEE Infocom Mini Conf., IEEE, 2011.
11. D. Hughes et al., "Supporting Law Enforcement in Digital Communities through Natural Language Analysis," Proc. 2nd Int'l Workshop Computational Forensics, Springer, 2008, pp. 122–134.
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool