Validation of rules used in foxy peer-to-peer network investigations

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Rules have been specified for identifying first seeders in the Foxy peer-to-peer (P2P) network. However, these rules have not been validated due to difficulties in repeating download scenarios. This paper describes a rule validation scheme that uses a network simulation environment. The Type I and Type II error rates of Foxy network monitoring rules over 100 simulation experiments covering ten scenarios are measured and analyzed. The error rates reflect the limitations of the monitoring rules and demonstrate the importance of using network simulations for rule validation. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Ieong, R., Chow, K. P., & Lai, P. (2012). Validation of rules used in foxy peer-to-peer network investigations. In IFIP Advances in Information and Communication Technology (Vol. 383 AICT, pp. 231–245). https://doi.org/10.1007/978-3-642-33962-2_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free