Skip to Main content Skip to Navigation
Conference papers

Validation of Rules Used in Foxy Peer-to-Peer Network Investigations

Abstract : Rules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation.
Document type :
Conference papers
Complete list of metadata

https://hal.inria.fr/hal-01523719
Contributor : Hal Ifip <>
Submitted on : Tuesday, May 16, 2017 - 5:10:28 PM
Last modification on : Thursday, March 5, 2020 - 4:46:41 PM
Long-term archiving on: : Friday, August 18, 2017 - 12:41:10 AM

File

978-3-642-33962-2_16_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Ricci Ieong, Kam-Pui Chow, Pierre Lai. Validation of Rules Used in Foxy Peer-to-Peer Network Investigations. 8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.231-245, ⟨10.1007/978-3-642-33962-2_16⟩. ⟨hal-01523719⟩

Share

Metrics

Record views

307

Files downloads

192