Abstract
Experiments with the Foxy P2P network have demonstrated that the first uploader of a file can be identified when search queries are submitted to all the network nodes during initial file sharing. However, in real Foxy networks, file search queries are not transmitted to the entire Foxy network and this process may not identify the first uploader. This paper presents a set of validation rules that validate the observed first uploader. The validation rules define the seeder curve that consistently describes the number of uploaders over time. Analysis of four scenarios shows improved accuracy at detecting the first uploader and that, in situations with insufficient competition for file content, the first uploader may not be identified precisely.
Chapter PDF
Similar content being viewed by others
References
ckseol, More personal data identified by Foxy King (in Chinese), HKHeadline.com, Hong Kong, China ( http://blogcity.me/blog/reply_blog_express.asp?f=C6T2E3Z19P239366&id=566836 ), August 18, 2013.
Gnucleus, GnucDNA – Free P2P Core Component ( www.gnucleus.org/GnucDNA ).
R. Ieong and K. Chow, Enhanced monitoring rule through direct node query for Foxy network investigation, presented at the First International Conference on Digital Forensics and Investigation, 2012.
R. Ieong, K. Chow and P. Lai, Validation of rules used in Foxy peer-to-peer network investigations, in Advances in Digital Forensics VIII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 231–245, 2012.
R. Ieong, P. Lai, K. Chow, M. Kwan, F. Law, H. Tse and K. Tse, Forensic investigation and analysis of peer-to-peer networks, in Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, C. Li (Ed.), IGI Global, Hershey, Pennsylvania, pp. 355–378, 2010.
Sing Tao, Another personal data leak from HK Police Force identified by Foxy King (in Chinese), Toronto, Canada ( http://news.singtao.ca/toronto/2013-09-25/hongkong1380094959d4714768.html ), September 25, 2013.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ieong, R., Chow, KP. (2014). Validation Rules for Enhanced Foxy P2P Network Investigations. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics X. DigitalForensics 2014. IFIP Advances in Information and Communication Technology, vol 433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44952-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-662-44952-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44951-6
Online ISBN: 978-3-662-44952-3
eBook Packages: Computer ScienceComputer Science (R0)