Towards Measurement on the I2P Network

Article Preview

Abstract:

The I2P network has been widely used to protect user privacy via an open network of onion routers run by volunteers. To the best of our knowledge, the behavior of peers in the I2P network has not been well investigated in the existing researches. In this paper, we first present a simple and effective way to collect peers in the I2P network. Each day over 82% peers has been collected compared to the statistics from the statistics web site. With the data collected, we perform an empirical evaluation, revealing the phenomenon about IP address aliasing and identity aliasing. As identity aliasing makes bad impact on the availability and anonymity of the I2P network, we introduce family concept into the I2P network to mitigate the impact.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2223-2228

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] i2p website, http: /www. i2p2. de.

Google Scholar

[2] i2p statistic website, http: /stats. i2p. in.

Google Scholar

[3] L. Schimmer, Peer profiling and selection in the i2p anonymous network, in PET-CON 2009. 1., TU Dresden, Germany, 03/2009 (2009).

Google Scholar

[4] A. Crenshaw, Darknets and hidden servers: Identifying the true ip/network identity of i2p service hosts, Black Hat, (2011).

Google Scholar

[5] M. Herrmann and C. Grothoff, Privacy-implications of performance- based peer selection by onion-routers: a real-world case study using i2p, in Privacy Enhancing Technologies. Springer, 2011, p.155– 174.

DOI: 10.1007/978-3-642-22263-4_9

Google Scholar

[6] J. P. Timpanaro, I. Chrisment, and O. Festor, Improving content avail- ability in the i2p anonymous file-sharing environment, in Cyberspace Safety and Security. Springer, 2012, p.77–92.

DOI: 10.1007/978-3-642-35362-8_8

Google Scholar

[7] J. P. Timpanaro, C. Isabelle, F. Olivier et al., Monitoring the i2p network, (2011).

Google Scholar

[8] J. Timpanaro, I. Chrisment, and O. Festor, A birds eye view on the i2p anonymous file-sharing environment, in Network and System Security, ser. Lecture Notes in Computer Science, L. Xu, E. Bertino, and Y. Mu, Eds. Springer Berlin Heidelberg, 2012, vol. 7645, p.135.

DOI: 10.1007/978-3-642-34601-9_11

Google Scholar

[9] J. P. Timpanaro, I. Chrisment, and O. Festor, I2p's usage characteriza- tion, in Traffic Monitoring and Analysis. Springer, 2012, p.48–51.

Google Scholar

[10] J. Douceur, The sybil attack, in Peer-to-Peer Systems, ser. Lecture Notes in Computer Science, P. Druschel, F. Kaashoek, and A. Rowstron, Eds. Springer Berlin Heidelberg, 2002, vol. 2429, p.251–260.

DOI: 10.1007/3-540-45748-8_24

Google Scholar

[11] D. Stutzbach and R. Rejaie, Understanding churn in peer-to-peer networks, " in Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, ser. IMC , 06. New York, NY, USA: ACM, 2006, p.189–202.

DOI: 10.1145/1177080.1177105

Google Scholar

[12] D. Mccoy, T. Kohno, and D. Sicker, Shining light in dark places: Understanding the tor network, in In Proceedings of the 8th Privacy Enhancing Technologies Symposium, (2008).

DOI: 10.1007/978-3-540-70630-4_5

Google Scholar

[13] K. Loesing, S. Murdoch, and R. Dingledine, A case study on measuring statistical data in the tor anonymity network, in Financial Cryptogra- phy and Data Security, ser. Lecture Notes in Computer Science, R. Sion,R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, and F. Seb, Eds. Springer Berlin Heidelberg, 2010, vol. 6054, p.203.

DOI: 10.1007/978-3-642-14992-4_19

Google Scholar