Abstract | ||
---|---|---|
In recent years, peer-to-peer (P2P) applications have become the dominant form of Internet traffic. Foxy, a Chinese community focused file-sharing tool, is increasingly being used to disseminate private data and sensitive documents in Hong Kong. Unfortunately, its scattered design and a highly distributed network make it difficult to locate a file originator. This paper proposes an investigative model for analyzing Foxy communications and identifying the first uploaders of files. The model is built on the results of several experiments, which reveal behavior patterns of the Foxy protocol that can be used to expose traces of file originators. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1007/978-3-642-04155-6_13 | ADVANCES IN DIGITAL FORENSICS V |
Keywords | Field | DocType |
Peer-to-peer network forensics,Foxy network,Gnutella 2 protocol | Internet privacy,World Wide Web,Peer-to-peer,Computer science,Dissemination,Internet traffic | Conference |
Volume | ISSN | Citations |
306 | 1868-4238 | 3 |
PageRank | References | Authors |
0.70 | 1 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ricci S. C. Ieong | 1 | 58 | 6.84 |
Pierre K. Y. Lai | 2 | 75 | 10.54 |
Kam-Pui Chow | 3 | 283 | 39.82 |
Frank Y. W. Law | 4 | 63 | 9.46 |
Michael Y. K. Kwan | 5 | 64 | 9.93 |
Kenneth Tse | 6 | 3 | 0.70 |