2009
DOI: 10.1007/978-3-642-04155-6_13
|View full text |Cite
|
Sign up to set email alerts
|

A Model for Foxy Peer-to-Peer Network Investigations

Abstract: In recent years, peer-to-peer (P2P) applications have become the dominant form of Internet traffic. Foxy, a Chinese community focused filesharing tool, is increasingly being used to disseminate private data and sensitive documents in Hong Kong. Unfortunately, its scattered design and a highly distributed network make it difficult to locate a file originator. This paper proposes an investigative model for analyzing Foxy communications and identifying the first uploaders of files. The model is built on the resul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
9
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 3 publications
(3 reference statements)
1
9
0
Order By: Relevance
“…Several works described the Gnutella protocol [1,10,11,7] and how to listen, collect, and interpret trac. An optimal node placement algorithm [11] for information retrieval was discussed, but its purpose was for use in P2P client software in order to nd information while conserving bandwidth and limiting the amount of trac overhead in the network.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…Several works described the Gnutella protocol [1,10,11,7] and how to listen, collect, and interpret trac. An optimal node placement algorithm [11] for information retrieval was discussed, but its purpose was for use in P2P client software in order to nd information while conserving bandwidth and limiting the amount of trac overhead in the network.…”
Section: Methodsmentioning
confidence: 99%
“…2.5 P2P Network Usage Behavior [10] proposes a heuristic method for determining peers that introduce a particular le into a P2P network. This method is based o of a hypothetical model of how les are rst introduced and distributed in a P2P network.…”
Section: The Compartmental Model For P2p Networkmentioning
confidence: 99%
See 3 more Smart Citations