Validation of Rules Used in Foxy Peer-to-Peer Network Investigations - Archive ouverte HAL Access content directly
Conference Papers Year : 2012

Validation of Rules Used in Foxy Peer-to-Peer Network Investigations

(1) , (1) , (1)
1

Abstract

Rules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation.
Fichier principal
Vignette du fichier
978-3-642-33962-2_16_Chapter.pdf (1.2 Mo) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01523719 , version 1 (16-05-2017)

Licence

Attribution - CC BY 4.0

Identifiers

Cite

Ricci Ieong, Kam-Pui Chow, Pierre Lai. Validation of Rules Used in Foxy Peer-to-Peer Network Investigations. 8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.231-245, ⟨10.1007/978-3-642-33962-2_16⟩. ⟨hal-01523719⟩
209 View
72 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More