Validation of Rules Used in Foxy Peer-to-Peer Network Investigations

Abstract : Rules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation.
Type de document :
Communication dans un congrès
Gilbert Peterson; Sujeet Shenoi. 8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. Springer, IFIP Advances in Information and Communication Technology, AICT-383, pp.231-245, 2012, Advances in Digital Forensics VIII. 〈10.1007/978-3-642-33962-2_16〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01523719
Contributeur : Hal Ifip <>
Soumis le : mardi 16 mai 2017 - 17:10:28
Dernière modification le : vendredi 1 décembre 2017 - 01:16:43
Document(s) archivé(s) le : vendredi 18 août 2017 - 00:41:10

Fichier

978-3-642-33962-2_16_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Ricci Ieong, Kam-Pui Chow, Pierre Lai. Validation of Rules Used in Foxy Peer-to-Peer Network Investigations. Gilbert Peterson; Sujeet Shenoi. 8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. Springer, IFIP Advances in Information and Communication Technology, AICT-383, pp.231-245, 2012, Advances in Digital Forensics VIII. 〈10.1007/978-3-642-33962-2_16〉. 〈hal-01523719〉

Partager

Métriques

Consultations de la notice

53

Téléchargements de fichiers

10