Validation of Rules Used in Foxy Peer-to-Peer Network Investigations

Rules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation.

[1]  K. P. Chow,et al.  Forensic Investigation of Peer-to-Peer Networks , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.

[2]  Ka-ying. Lai,et al.  Profiling internet pirates , 2011 .

[3]  Michael Y. K. Kwan,et al.  Security Analysis of the Foxy Peer-to-Peer File Sharing Tool , 2008 .

[4]  K. P. Chow,et al.  A Model for Foxy Peer-to-Peer Network Investigations , 2009, IFIP Int. Conf. Digital Forensics.

[5]  Bernie Mulgrew,et al.  Proceedings IEEE International Conference on Communications , 1989 .

[6]  Bin Fan,et al.  Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems , 2006, 2006 IEEE International Conference on Communications.

[7]  Sujeet Shenoi,et al.  Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers , 2009, IFIP Int. Conf. Digital Forensics.

[8]  Kam-Pui Chow,et al.  Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers , 2010, IFIP Int. Conf. Digital Forensics.

[9]  Chang-Tsun Li Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.

[10]  K. P. Chow,et al.  Identifying First Seeders in Foxy Peer-to-Peer Networks , 2010, IFIP Int. Conf. Digital Forensics.

[11]  K.P. Chow,et al.  BTM - An Automated Rule-based BT Monitoring System for Piracy Detection , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).