I2P Forensic Analysis
Sneha Soney1, C. Balan2, Priya P. Sajan3, Elizabeth Rose Lalson4

1Sneha Soney, Department of Computer Science, ER & DCI Institute of Technology, Thiruvananthapuram, India.
2C. Balan, Knowledge Resource Centre, CDAC, Thiruvananthapuram, India.
3Priya P. Sajan, Knowledge Resource Centre, CDAC, Thiruvananthapuram, India.
4Elizabeth Rose Lalson, Department of Computer Science, ER & DCI Institute of Technology, Thiruvananthapuram, India.
Manuscript received on February 10, 2020. | Revised Manuscript received on February 20, 2020. | Manuscript published on March 30, 2020. | PP: 1678-1682 | Volume-8 Issue-6, March 2020. | Retrieval Number: F7404038620/2020©BEIESP | DOI: 10.35940/ijrte.E7404.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: I2P is an anonymous P2P distributed communication layer used to send messages to each other anonymously and safely. It is built on top of the internet and can be considered as an internet within the internet. Even though I2P is developed with an intention to create censorship resistant environment for the free flow of information, it is misused for illegal activities now a days. The possible misuses are less known among law enforcement agencies and existing industry approved software programs have no detection functionality for I2P. Because of the increased use of I2P in criminal purposes, there is a need for methods and tools to acquire and analyze digital evidence related to I2P. We conducted a detailed live memory dump analysis in order to find out the I2P related artifacts from a host machine. Furthermore, we propose a tool that will analyze the memory dump and system local files to find out the I2P related artifacts and provide a detailed report to the investigator.
Keywords: I2P, P2P, Artifacts, Memory Analysis.
Scope of the Article: Predictive Analysis.