File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-642-04155-6_13
- Scopus: eid_2-s2.0-84943569404
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: A model for foxy peer-to-peer network investigations
Title | A model for foxy peer-to-peer network investigations |
---|---|
Authors | |
Keywords | Peer-to-peer network forensics Foxy network Gnutella 2 protocol |
Issue Date | 2009 |
Publisher | Springer New York LLC. The Journal's web site is located at http://www.springer.com/series/6102 |
Citation | The 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL., 26-28 January 2009. In IFIP Advances in Information and Communication Technology, 2009, v. 306, p. 175-186 How to Cite? |
Abstract | In recent years, peer-to-peer (P2P) applications have become the dominant form of Internet traffic. Foxy, a Chinese community focused filesharing tool, is increasingly being used to disseminate private data and sensitive documents in Hong Kong. Unfortunately, its scattered design and a highly distributed network make it difficult to locate a file originator. This paper proposes an investigative model for analyzing Foxy communications and identifying the first uploaders of files. The model is built on the results of several experiments, which reveal behavior patterns of the Foxy protocol that can be used to expose traces of file originators. |
Description | This series vol. entitled: Advances in Digital Forensics V: 5th IFIP WG 11.9 International Conference on Digital Forensics ... 2009 : revised selected papers Part 4 Network Forensics |
Persistent Identifier | http://hdl.handle.net/10722/61187 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.242 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ieong, RSC | en_HK |
dc.contributor.author | Lai, PKY | en_HK |
dc.contributor.author | Chow, KP | en_HK |
dc.contributor.author | Law, FYW | en_HK |
dc.contributor.author | Kwan, MYK | en_HK |
dc.contributor.author | Tse, KWH | en_HK |
dc.date.accessioned | 2010-07-13T03:32:47Z | - |
dc.date.available | 2010-07-13T03:32:47Z | - |
dc.date.issued | 2009 | en_HK |
dc.identifier.citation | The 5th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL., 26-28 January 2009. In IFIP Advances in Information and Communication Technology, 2009, v. 306, p. 175-186 | - |
dc.identifier.isbn | 978-3-642-04154-9 | - |
dc.identifier.issn | 1868-4238 | - |
dc.identifier.uri | http://hdl.handle.net/10722/61187 | - |
dc.description | This series vol. entitled: Advances in Digital Forensics V: 5th IFIP WG 11.9 International Conference on Digital Forensics ... 2009 : revised selected papers | en_HK |
dc.description | Part 4 Network Forensics | - |
dc.description.abstract | In recent years, peer-to-peer (P2P) applications have become the dominant form of Internet traffic. Foxy, a Chinese community focused filesharing tool, is increasingly being used to disseminate private data and sensitive documents in Hong Kong. Unfortunately, its scattered design and a highly distributed network make it difficult to locate a file originator. This paper proposes an investigative model for analyzing Foxy communications and identifying the first uploaders of files. The model is built on the results of several experiments, which reveal behavior patterns of the Foxy protocol that can be used to expose traces of file originators. | - |
dc.language | eng | en_HK |
dc.publisher | Springer New York LLC. The Journal's web site is located at http://www.springer.com/series/6102 | - |
dc.relation.ispartof | IFIP Advances in Information and Communication Technology | - |
dc.rights | The original publication is available at www.springerlink.com | - |
dc.subject | Peer-to-peer network forensics | - |
dc.subject | Foxy network | - |
dc.subject | Gnutella 2 protocol | - |
dc.title | A model for foxy peer-to-peer network investigations | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Ieong, RSC: scrieong@cs.hku.hk | en_HK |
dc.identifier.email | Lai, PKY: kylai@cs.hku.hk | - |
dc.identifier.email | Chow, KP: chow@cs.hku.hk | - |
dc.identifier.email | Law, FYW: ywlaw@cs.hku.hk | - |
dc.identifier.email | Kwan, MYK: ykkwan@cs.hku.hk | - |
dc.identifier.email | Tse, KWH: whktse@cs.hku.hk | - |
dc.identifier.authority | Chow, KP=rp00111 | en_HK |
dc.identifier.doi | 10.1007/978-3-642-04155-6_13 | - |
dc.identifier.scopus | eid_2-s2.0-84943569404 | - |
dc.identifier.hkuros | 167093 | en_HK |
dc.identifier.volume | 306 | - |
dc.identifier.spage | 175 | - |
dc.identifier.epage | 186 | - |
dc.publisher.place | United States | - |
dc.customcontrol.immutable | sml 140812 | - |
dc.identifier.issnl | 1868-4238 | - |