File Download

There are no files associated with this item.

Supplementary

Conference Paper: Validation of rules used in foxy peer-to-peer network investigations

TitleValidation of rules used in foxy peer-to-peer network investigations
Authors
KeywordsPeer-to-peer networks
Foxy
First seeder
Network simulation
Issue Date2012
PublisherSpringer.
Citation
The 8th Annual IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, 3-5 January 2012. In IFIP Advances in Information and Communication Technology, v. 383 chapter 16, p. 231-245 How to Cite?
AbstractRules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation.
DescriptionIFIP Advances in Information and Communication Technology, v. 383 has title: Advances in Digital Forensics VIII
Persistent Identifierhttp://hdl.handle.net/10722/169302
ISBN

 

DC FieldValueLanguage
dc.contributor.authorIeong, Ren_US
dc.contributor.authorChow, KPen_US
dc.contributor.authorLai, Pen_US
dc.date.accessioned2012-10-18T08:49:44Z-
dc.date.available2012-10-18T08:49:44Z-
dc.date.issued2012en_US
dc.identifier.citationThe 8th Annual IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, 3-5 January 2012. In IFIP Advances in Information and Communication Technology, v. 383 chapter 16, p. 231-245en_US
dc.identifier.isbn978-3-642-33962-2-
dc.identifier.urihttp://hdl.handle.net/10722/169302-
dc.descriptionIFIP Advances in Information and Communication Technology, v. 383 has title: Advances in Digital Forensics VIII-
dc.description.abstractRules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation.-
dc.languageengen_US
dc.publisherSpringer.-
dc.relation.ispartofIFIP Advances in Information and Communication Technologyen_US
dc.rightsThe original publication is available at www.springerlink.com-
dc.subjectPeer-to-peer networks-
dc.subjectFoxy-
dc.subjectFirst seeder-
dc.subjectNetwork simulation-
dc.titleValidation of rules used in foxy peer-to-peer network investigationsen_US
dc.typeConference_Paperen_US
dc.identifier.emailIeong, R: h0795555@hku.hken_US
dc.identifier.emailChow, KP: chow@cs.hku.hk-
dc.identifier.emailLai, P: h0124929@hku.hk-
dc.identifier.authorityChow, KP=rp00111en_US
dc.identifier.hkuros211505en_US
dc.identifier.volume383, chapter 16-
dc.identifier.spage231en_US
dc.identifier.epage245en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats