Validation Rules for Enhanced Foxy P2P Network Investigations
暂无分享,去创建一个
Experiments with the Foxy P2P network have demonstrated that the first uploader of a file can be identified when search queries are submitted to all the network nodes during initial file sharing. However, in real Foxy networks, file search queries are not transmitted to the entire Foxy network and this process may not identify the first uploader. This paper presents a set of validation rules that validate the observed first uploader. The validation rules define the seeder curve that consistently describes the number of uploaders over time. Analysis of four scenarios shows improved accuracy at detecting the first uploader and that, in situations with insufficient competition for file content, the first uploader may not be identified precisely.
[1] K. P. Chow,et al. Forensic Investigation of Peer-to-Peer Networks , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.
[2] Kp Chow,et al. Enchanced monitoring rule through direct node query for Foxy network investigation , 2012 .
[3] Sujeet Shenoi,et al. Advances in Digital Forensics VIII , 2012, IFIP Advances in Information and Communication Technology.
[4] K. P. Chow,et al. Validation of Rules Used in Foxy Peer-to-Peer Network Investigations , 2012, IFIP Int. Conf. Digital Forensics.