File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Appears in Collections:
Conference Paper: Validation of rules used in foxy peer-to-peer network investigations
Title | Validation of rules used in foxy peer-to-peer network investigations |
---|---|
Authors | |
Keywords | Peer-to-peer networks Foxy First seeder Network simulation |
Issue Date | 2012 |
Publisher | Springer. |
Citation | The 8th Annual IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, 3-5 January 2012. In IFIP Advances in Information and Communication Technology, v. 383 chapter 16, p. 231-245 How to Cite? |
Abstract | Rules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation. |
Description | IFIP Advances in Information and Communication Technology, v. 383 has title: Advances in Digital Forensics VIII |
Persistent Identifier | http://hdl.handle.net/10722/169302 |
ISBN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ieong, R | en_US |
dc.contributor.author | Chow, KP | en_US |
dc.contributor.author | Lai, P | en_US |
dc.date.accessioned | 2012-10-18T08:49:44Z | - |
dc.date.available | 2012-10-18T08:49:44Z | - |
dc.date.issued | 2012 | en_US |
dc.identifier.citation | The 8th Annual IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, 3-5 January 2012. In IFIP Advances in Information and Communication Technology, v. 383 chapter 16, p. 231-245 | en_US |
dc.identifier.isbn | 978-3-642-33962-2 | - |
dc.identifier.uri | http://hdl.handle.net/10722/169302 | - |
dc.description | IFIP Advances in Information and Communication Technology, v. 383 has title: Advances in Digital Forensics VIII | - |
dc.description.abstract | Rules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation. | - |
dc.language | eng | en_US |
dc.publisher | Springer. | - |
dc.relation.ispartof | IFIP Advances in Information and Communication Technology | en_US |
dc.rights | The original publication is available at www.springerlink.com | - |
dc.subject | Peer-to-peer networks | - |
dc.subject | Foxy | - |
dc.subject | First seeder | - |
dc.subject | Network simulation | - |
dc.title | Validation of rules used in foxy peer-to-peer network investigations | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Ieong, R: h0795555@hku.hk | en_US |
dc.identifier.email | Chow, KP: chow@cs.hku.hk | - |
dc.identifier.email | Lai, P: h0124929@hku.hk | - |
dc.identifier.authority | Chow, KP=rp00111 | en_US |
dc.identifier.hkuros | 211505 | en_US |
dc.identifier.volume | 383, chapter 16 | - |
dc.identifier.spage | 231 | en_US |
dc.identifier.epage | 245 | en_US |