A Model for Foxy Peer-to-Peer Network Investigations

In recent years, peer-to-peer (P2P) applications have become the dominant form of Internet traffic. Foxy, a Chinese community focused filesharing tool, is increasingly being used to disseminate private data and sensitive documents in Hong Kong. Unfortunately, its scattered design and a highly distributed network make it difficult to locate a file originator. This paper proposes an investigative model for analyzing Foxy communications and identifying the first uploaders of files. The model is built on the results of several experiments, which reveal behavior patterns of the Foxy protocol that can be used to expose traces of file originators.

[1]  Michael Y. K. Kwan,et al.  Security Analysis of the Foxy Peer-to-Peer File Sharing Tool , 2008 .

[2]  K.P. Chow,et al.  BTM - An Automated Rule-based BT Monitoring System for Piracy Detection , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[3]  Olfa Nasraoui,et al.  Node-Based Probing and Monitoring to Investigate Use of Peer-to-Peer Technologies for Distribution of Contraband Material , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.