Skip to Main content Skip to Navigation
Conference papers

Validation of Rules Used in Foxy Peer-to-Peer Network Investigations

Abstract : Rules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation.
Document type :
Conference papers
Complete list of metadata
Contributor : Hal Ifip <>
Submitted on : Tuesday, May 16, 2017 - 5:10:28 PM
Last modification on : Thursday, March 5, 2020 - 4:46:41 PM
Long-term archiving on: : Friday, August 18, 2017 - 12:41:10 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Ricci Ieong, Kam-Pui Chow, Pierre Lai. Validation of Rules Used in Foxy Peer-to-Peer Network Investigations. 8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.231-245, ⟨10.1007/978-3-642-33962-2_16⟩. ⟨hal-01523719⟩



Record views


Files downloads