650 lines
32 KiB
BibTeX
650 lines
32 KiB
BibTeX
%
|
|
%
|
|
% Reference:
|
|
%
|
|
% https://en.wikipedia.org/wiki/BibTeX
|
|
%
|
|
% Magic fields:
|
|
%
|
|
% www_tags -- used to control which page groups the paper appears in.
|
|
% This is a space-separated list.
|
|
% www_section -- the topic used under 'topics.html'
|
|
% www_{ps|pdf|ps_gz|txt|html|abstract}_url -- link for text/abstract of
|
|
% an entry.
|
|
% www_important -- set for important entries
|
|
% www_remarks -- annotation for an entry
|
|
|
|
%% List of sections
|
|
@string{comm = "Anonymous communication"}
|
|
@string{traffic = "Traffic analysis"}
|
|
@string{pub = "Anonymous publication"}
|
|
@string{proofs = "Provable shuffles"}
|
|
@string{methods = "Formal methods"}
|
|
@string{nym = "Pseudonymity"}
|
|
@string{pir = "Private Information Retrieval"}
|
|
@string{economics = "Economics"}
|
|
@string{censorship = "Communications Censorship"}
|
|
@string{credentials = "E-Cash / Anonymous Credentials"}
|
|
@string{lncs = "Lecture Notes in Computer Science"}
|
|
@string{misc = "Misc"}
|
|
|
|
#
|
|
# Proposed new sections: application privacy, data anonymization, ...
|
|
#
|
|
|
|
@inproceedings{orignal2015,
|
|
title = {A Transparent Implementation Of The Signature In Scheme EdDSA},
|
|
author = {Losev, V. I.},
|
|
booktitle = {Proceedings of Heuristic Algorithms and Distributed Computing},
|
|
year = {2015},
|
|
pages = {49--56},
|
|
www_pdf_url = {https://archive.org/download/HeuristicAlgorithmsAndDistributedComputing2015/tom2-nom4.pdf},
|
|
www_section = methods,
|
|
}
|
|
|
|
@mastersthesis{boerbreider,
|
|
title = {Invisible Internet Project(Report)},
|
|
author = {de Boer, Tim and Breider, Vincent},
|
|
school = {University of Amsterdam},
|
|
year = {2019},
|
|
month = {February},
|
|
www_pdf_url = {https://delaat.net/rp/2018-2019/p63/report.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
@mastersthesis{boerbreider-pres,
|
|
title = {Invisible Internet Project(Presentation)},
|
|
author = {de Boer, Tim and Breider, Vincent},
|
|
school = {University of Amsterdam},
|
|
year = {2019},
|
|
month = {February},
|
|
www_pdf_url = {https://delaat.net/rp/2018-2019/p63/presentation.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
@misc{gehl_2018,
|
|
place={Cambridge, MA},
|
|
title={Weaving the dark web: a trial of legitimacy on FreeNet, Tor, and I2P},
|
|
howpublished={The MIT Press},
|
|
author={Gehl, Robert W.},
|
|
year={2018},
|
|
note = {ISBN: 9780262038263},
|
|
www_section = misc,
|
|
www_html_url = {https://mitpress.mit.edu/books/weaving-dark-web},
|
|
}
|
|
|
|
@mastersthesis{alachkargastra2018-blockchain-based-sybil-mitigation,
|
|
title = {Blockchain-based Sybil Attack Mitigation: A Case Study of the I2P Network},
|
|
author = {Alachkar, Kotaiba and Gaastra, Dirk},
|
|
school = {University of Amsterdam},
|
|
year = {2018},
|
|
month = {June},
|
|
www_pdf_url = {https://delaat.net/rp/2017-2018/p97/report.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
@article{ye2018-deciding-anonymity,
|
|
author={L. Ye and X. Yu and J. Zhao and D. Zhan and X. Du and M. Guizani},
|
|
journal={IEEE Access},
|
|
title={Deciding Your Own Anonymity: User-Oriented Node Selection in I2P},
|
|
year={2018},
|
|
month={November},
|
|
volume={6},
|
|
number={},
|
|
pages={71350--71359},
|
|
abstract={With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong anonymity through its encryption and communication schemes. However, I2P does not consider the users' preferences, which is difficult to meet the individual demands of specific users and then allows them to decide their anonymity. Thus, this paper proposes two novel user-oriented node selection algorithms that can effectively enhance the anonymity or reduce the communication delay over the I2P network. In order to choose proper nodes, we also investigate key factors to evaluate the nodes. Then, the basic node selection algorithm (BNSA) is proposed to group routing nodes and provide high-performance node candidates. Based on BNSA, the geographic-diversity-oriented node selection algorithm (GDNSA) and the communication-delay-oriented node selection algorithm (CDNSA) are proposed. These can improve the anonymity or communication performance of the I2P network. The GDNSA increases the attack difficulty by establishing tunnels that span multiple regions. In the meantime, the CDNSA reduces the communication delay of the tunnel by selecting the next hop node with the lowest communication delay. Finally, the mathematical analysis and experimental results show that the GDNSA has good resistance to collusion attacks, and the CDNSA reduces the communication delay in spite of weakening a little anonymity},
|
|
keywords={Peer-to-peer computing;Delays;Routing;Relays;Logic gates;Security;Anonymous communication;node selection;geographic diversity;communication delay;I2P},
|
|
doi={10.1109/ACCESS.2018.2881719},
|
|
ISSN={2169-3536},
|
|
www_section = comm,
|
|
www_pdf_url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8537903},
|
|
}
|
|
|
|
|
|
@mastersthesis{smits2018:i2p-enhanced-outproxy,
|
|
title = {Risk Assessment for I2P With an Enhanced Outproxy Design},
|
|
author = {Smits, Dolf},
|
|
school = {Leiden University},
|
|
year = {2018},
|
|
month = {January}
|
|
url = {https://openaccess.leidenuniv.nl/handle/1887/64566},
|
|
www_pdf_url = {https://openaccess.leidenuniv.nl/bitstream/handle/1887/64566/Smits_D_2018_CS.pdf?sequence=2},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@inproceedings{phong2018:i2p-censorship-resistance,
|
|
title = {An Empirical Study of the I2P Anonymity Network and its Censorship Resistance},
|
|
author = {Nguyen, Phong Hoang and Kintis, Panagiotis and Antonakakis, Manos and Polychronakis, Michalis},
|
|
booktitle = {Proceedings of 2018 Internet Measurement Conference (IMC '18)},
|
|
year = {2018},
|
|
month = {October},
|
|
www_pdf_url = {https://www.researchgate.net/profile/Nguyen_Phong_Hoang/publication/327445307},
|
|
www_section = traffic,
|
|
}
|
|
|
|
|
|
@phdthesis{shahbar2017-dthesis,
|
|
title = {Analysis of Multilayer-Encryption Anonymity Networks},
|
|
author = {Khalid Shahbar},
|
|
institution = {Dalhousie University},
|
|
year = {2017},
|
|
month = {October},
|
|
abstract = {{This thesis studies and analyzes multilayer-encryption anonymity networks.
|
|
Traffic flow analysis is employed to identify multilayer-encryption anonymity networks.
|
|
The analysis includes collecting data from the three most popular anonymity networks
|
|
(namely, Tor, JonDonym and I2P). The collected data (Anon17) is made publicly available
|
|
for researchers on the field. The study also includes proposing weighted factors to
|
|
quantify and measure the level of anonymity these networks could provide.}},
|
|
www_pdf_url = {https://dalspace.library.dal.ca/bitstream/handle/10222/73395/Shahbar-Khalid-PhD-CS-Oct-2017.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@techreport{shahbar2017-dataset,
|
|
title = {Anon17: Network Traffic Dataset of Anonymity Services},
|
|
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
|
|
institution = {Dalhousie University},
|
|
year = {2017},
|
|
month = {March},
|
|
abstract = {{One of the difficulties that face researchers on the
|
|
anonymity networks field is the lack of anonymity dataset.
|
|
Researchers need to collect their data to conduct a research or to
|
|
use a simulated environment to collect the data they need. The
|
|
lack of such a dataset is due to the nature of the anonymity
|
|
networks. These anonymity networks aim to provide certain level
|
|
of privacy for the users. In this paper, we present Anon17, a
|
|
traffic flow dataset of different anonymity services. Anon17
|
|
specifically contains data collected from three anonymity
|
|
networks; Tor, JonDonym, and I2P.}},
|
|
keywords = {Dataset ; Tor ; I2P ; JonDonym ; Traffic Flow ; Anonymity},
|
|
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-03.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@article{bazli2017-the-dark-side-of-i2p,
|
|
title = {The Dark side of I2P, a forensic analysis case study},
|
|
author = {Bazli, Wilson and Hurst},
|
|
journal = {System Science & Control Engeneering},
|
|
year = {2017},
|
|
month = June,
|
|
volume = {2017},
|
|
number = {5},
|
|
pages = {278--286},
|
|
doi = {10.1080/21642583.2017.1331770},
|
|
url= {https://doi.org/10.1080/21642583.2017.1331770},
|
|
www_section = traffic,
|
|
}
|
|
|
|
|
|
|
|
@techreport{shahbar2017-measuring-anonymity-services,
|
|
title = {Weighted Factors for Measuring Anonymity Services: A Case Study on Tor, JonDonym, and I2P},
|
|
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
|
|
institution = {Dalhousie University},
|
|
year = {2017},
|
|
month = {January},
|
|
abstract = {{There are many systems that provide anonymity
|
|
service for the users. Most of these systems work on the
|
|
separation between the users' identity and the final destination.
|
|
The level of anonymity these services provide affected by several
|
|
factors. Some of these factors are related to the design of the
|
|
anonymity service itself. Others are related to how the system is
|
|
used or what is the application/purpose the user wants to run
|
|
over the anonymity service. In this paper we: (i) propose five
|
|
factors that aim to measure the anonymity level from the user's
|
|
perspective; (ii) evaluate these factors on three anonymity
|
|
services, namely Tor, JonDonym, and I2P as case studies; and
|
|
(iii) present a mechanism to evaluate anonymity services based
|
|
on our factors and measure the level of anonymity.}},
|
|
keywords = {Anonymity Factors ; Metrics ; Tor ; I2P ; JonDonym},
|
|
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/CS-2017-01.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
@inproceedings{shahbar2017:effects-shared-bandwidth,
|
|
title = {Effects of Shared Bandwidth on Anonymity of the I2P Network Users},
|
|
author = {Khalid Shahbar and A. Nur Zincir-Heywood},
|
|
booktitle = {Proceedings of the 38th IEEE Symposium on Security and Privacy Workshops, 2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017)},
|
|
year = {2017},
|
|
month = {May},
|
|
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-04.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@inproceedings{wilson2016,
|
|
title = {Forensic analysis of I2P activities},
|
|
author = {Wilson, Maxim and Bazli, Behnam},
|
|
booktitle = {Proceedings of the 2016 22nd International Conference on Automation and Computing (ICAC)},
|
|
year = {2016},
|
|
month = Sep,
|
|
www_section = comm,
|
|
}
|
|
|
|
#
|
|
# Actually a bachelors thesis but there's no @ for that
|
|
#
|
|
@mastersthesis{muller-bthesis,
|
|
title = {Analysis of the I2P Network - Information Gathering and Attack Evaluations},
|
|
author = {Jens M{\"u}ller},
|
|
school = {Bern University of Applied Sciences},
|
|
year = {2016},
|
|
month = {June},
|
|
type = {Bachelors Thesis},
|
|
abstract = {{This thesis consists of three main parts, one giving an introduction to I2P, the Invisible Internet Project, one
|
|
that presents I2P Observer, a software to collect information about I2P and one that evaluates different attack
|
|
possibilities on I2P.}},
|
|
note = {Title : Analysis of the I2P Network. School: Bern University of Applied Sciences - Department of Computer Science},
|
|
www_section = traffic,
|
|
www_pdf_url = {https://jenix.net/i2p-observer/Analysis_of_the_I2P_Network-Bachelor_Thesis.pdf},
|
|
}
|
|
|
|
@inproceedings{jeong2016,
|
|
title = {A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure},
|
|
author = {Seong Hoon Jeong et al},
|
|
booktitle = {Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
|
|
year = {2016},
|
|
month = Aug,
|
|
abstract = {{The Invisible Internet Project (I2P) is an overlay network
|
|
that provides secure and anonymous communication chan-he
|
|
nels. EepSites are the anonymous websites hosted in the I2P
|
|
network. To access the eepSites, DNS requests of a domainnd
|
|
name suffixed with the .i2p pseudo top-level domain (TLD)their
|
|
are routed within the I2P network. However, not only thatption of the
|
|
.i2p queries are leaking in the public DNS infrastructure,both
|
|
but also such leakage has various plausible root causes andance
|
|
implications that are different from other related leakage. Ine
|
|
this paper, we analyze the leaked .i2p requests captured iny
|
|
the A and J root name servers of the public DNS, showingas its
|
|
that a large number of queries are observed and outlining
|
|
various potential directions of addressing such leakage.}},
|
|
keywords = {I2P, DNS, privacy, security, network analysis},
|
|
www_section = traffic,
|
|
www_pdf_url = {https://www.cse.buffalo.edu/~mohaisen/doc/16-sigcomm.pdf},
|
|
pages = {557--558},
|
|
}
|
|
|
|
@article{haughey2016,
|
|
title = {Anonymity networks and the fragile cyber ecosystem},
|
|
author = {Haughey, Hamish and Epiphaniou, Gregory and Al-Khateeb, Haider M.},
|
|
journal = {Network Security},
|
|
year = {2016},
|
|
month = Mar,
|
|
volume = {2016},
|
|
number = {3},
|
|
pages = {10--18},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@inproceedings{ali2016,
|
|
title = {TOR vs I2P: A Comparative Study},
|
|
author = {Ali, Afzaal and Khan, Maria and Saddique, Muhammad and Pirzada, Umar and Zohaib, Muhammad and Ahmad, Imran and Debnath, Narayan},
|
|
booktitle = {Proceedings of the 2016 IEEE International Conference on Industrial Technology (ICIT)},
|
|
year = {2016},
|
|
month = Mar,
|
|
www_section = traffic,
|
|
}
|
|
|
|
@techreport{astolfi2015,
|
|
title = {I2P - The Invisible Internet Project},
|
|
author = {Astolfi, Felipe and Kroese, Jelger and {Van Oorschot}, Jeroen},
|
|
type = {Web Technology Report},
|
|
institution = {Media Technology, Leiden University},
|
|
year = {2015},
|
|
www_pdf_url = {https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf},
|
|
www_section = comm
|
|
}
|
|
|
|
@article{vashi2015,
|
|
title = {Performance Improvement in I2P using SSL},
|
|
author = {Vashi, Dipal and Khilari, Girish},
|
|
journal = {International Journal of Science, Engineering and Technology Research},
|
|
year = {2015},
|
|
month = May,
|
|
volume = {4},
|
|
number = {5},
|
|
pages = {1454--1456},
|
|
www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1454-1456.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@article{vhora2015,
|
|
title = {Defending Eclipse Attack in I2P using Structured Overlay Network},
|
|
author = {Vhora, Hasib and Khilari, Girish},
|
|
journal = {International Journal of Science, Engineering and Technology Research},
|
|
year = {2015},
|
|
month = May,
|
|
volume = {4},
|
|
number = {5},
|
|
pages = {1515--1518},
|
|
www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1515-1518.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@inproceedings{timpanaro:hal-01238453,
|
|
title = {{Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security}},
|
|
author = {Timpanaro, Juan Pablo and Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier},
|
|
url = {https://hal.inria.fr/hal-01238453},
|
|
booktitle = {{Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015)}},
|
|
address = {Angers, France},
|
|
organization = {{SciTePress}},
|
|
pages = {46--55},
|
|
year = {2015},
|
|
month = Feb,
|
|
doi = {10.5220/0005226600460055},
|
|
keywords = {I2P ; security ; DHT},
|
|
www_pdf_url = {https://hal.inria.fr/hal-01238453/file/I2P-design-vs-performance-security.pdf},
|
|
www_section = traffic,
|
|
hal_id = {hal-01238453},
|
|
hal_version = {v1},
|
|
}
|
|
|
|
|
|
@misc{tchabe2014,
|
|
title = {Anonymous Communications: A survey on I2P},
|
|
author = {Tchabe, Gildas Nya and Xu, Yinhua},
|
|
howpublished = {CDC Publication},
|
|
year = {2014},
|
|
www_pdf_url = {https://www.cdc.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Lehre/SS13/Seminar/CPS/cps2014_submission_4.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@article{vashi2014,
|
|
title = {A Survey on I2P Crypto Mechanism},
|
|
author = {Vashi, Dipal and Khilari, Girish},
|
|
journal = {International Journal of Engineering Development and Research},
|
|
year = {2014},
|
|
volume = {3},
|
|
number = {1},
|
|
pages = {99--102},
|
|
www_pdf_url = {https://www.ijedr.org/papers/IJEDR1501021.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@article{karthigeyan2014,
|
|
title = {A Comprehensive Behavior Analysis of TOR versus I2P},
|
|
author = {Karthigeyan, A. and {Robinson Joel}, M. and Manikandan, S. P. and {Raja Guru}, P. and Raman, Sri},
|
|
journal = {International Journal of Applied Engineering Research},
|
|
year = {2014},
|
|
volume = {9},
|
|
number = {20},
|
|
pages = {7333--7345},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@article{liu2014,
|
|
title = {Empirical Measurement and Analysis of I2P Routers},
|
|
author = {Peipeng Liu et al},
|
|
journal = {Journal of Networks},
|
|
year = {2014},
|
|
month = Sep,
|
|
volume = {9},
|
|
number = {9},
|
|
pages = {2269--2278},
|
|
www_pdf_url = {https://pdfs.semanticscholar.org/3e5f/2b136df32beef1281b6b2f206093806c57f6.pdf}
|
|
www_section = traffic,
|
|
}
|
|
|
|
@inproceedings{conrad2014,
|
|
title = {A Survey on Tor and I2P},
|
|
author = {Bernd Conrad and Fatemeh Shirazi},
|
|
booktitle = {Proceedings of the 9th International
|
|
Conference on Internet Monitoring and Protection (ICIMP 2014)},
|
|
year = {2014},
|
|
abstract = {{This paper gives a short introduction and a comparison
|
|
on two low-latency anonymous communication networks. The
|
|
main part features a review of the low latency anonymous
|
|
communication networks, namely, The Onion Routing (Tor) and
|
|
the Invisible Internet Project (I2P). An introduction to their
|
|
overall structure is given, followed by a detailed description of the
|
|
core parts of both networks. Furthermore, a comparison of both
|
|
will feature important aspects like node selection, performance
|
|
and scalability. The detailed description and comparison of the
|
|
two systems show that determining which system to use highly
|
|
depends on the field of application, since each system has its
|
|
strength and weaknesses in specific areas.}},
|
|
keywords = {Tor; I2P; low latency anonymous communication
|
|
networks},
|
|
www_pdf_url = {/_static/pdf/icimp_2014_1_40_30015.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
@inproceedings{timpanaro2014,
|
|
title={Group-Based Characterization for the I2P Anonymous File-Sharing Environment},
|
|
author={Timpanaro, J.P. and Chrisment, I and Festor, O.},
|
|
booktitle={Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS)},
|
|
year={2014},
|
|
month={March},
|
|
pages={1--5},
|
|
abstract={{The I2P network provides an abstraction layer allowing two parties to communicate in an anonymous manner. This network is optimised for anonymous web hosting and anonymous file-sharing. I2P's file- sharing community is highly active where users deploy their file-sharing applications on top of the network. I2P uses a variation of Onion routing, thus assuring the unlinkability between a user and its file-sharing application. In this paper, we take the first step towards the linkability of users and applications in the I2P network. We conduct a group-based characterisation, where we determine to what extent a group of users is responsible for the overall I2P's file-sharing activity. We used Pearson's coefficient to correlate users from two cities and the most used anonymous file-sharing application. We determine that two cities explain more than a third of all file-sharing activity within the I2P network.}},
|
|
keywords={Internet;data privacy;groupware;peer-to-peer computing;I2P anonymous file-sharing environment;I2P network;Invisible Internet Project;Onion routing;Pearsons coefficient;abstraction layer;anonymous Web hosting;anonymous file-sharing application;file-sharing activity;group-based characterisation;user-application linkability;Cities and towns;Correlation;Distributed databases;IP networks;Internet;Monitoring;Privacy},
|
|
doi={10.1109/NTMS.2014.6814020},
|
|
www_pdf_url = {https://hal.inria.fr/hal-00986228/file/NTMS_Paper.pdf}
|
|
www_section = traffic,
|
|
}
|
|
|
|
@inproceedings{egger2013:practical-attacks,
|
|
title = {Practical Attacks Against the I2P Network},
|
|
author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna},
|
|
booktitle = {Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013)},
|
|
year = {2013},
|
|
month = Oct,
|
|
www_tags = {selected},
|
|
www_pdf_url = {http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@article{wang2013,
|
|
title = {Towards Measurement on the I2P Network},
|
|
author = {Xue Bin Wang and Pei Peng Liu and Cheng Long Li and Qing Feng Tan},
|
|
journal = {Applied Mechanics and Materials},
|
|
year = {2013},
|
|
month = Sep,
|
|
volume = {427--429},
|
|
pages = {2223--2228},
|
|
www_section = traffic,
|
|
}
|
|
|
|
%% hal-00744922, version 1
|
|
%% http://hal.inria.fr/hal-00744922
|
|
@inproceedings{timpanaro:hal-00744922,
|
|
hal_id = {hal-00744922},
|
|
url = {http://hal.inria.fr/hal-00744922},
|
|
title = {{Improving Content Availability in the I2P Anonymous File-Sharing Environment}},
|
|
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
|
|
abstract = {{Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTorrent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable.}},
|
|
language = {English},
|
|
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
|
|
booktitle = {{Proceedings of the 4th International Symposium on Cyberspace Safety and Security}},
|
|
publisher = {Springer},
|
|
pages = {77--92},
|
|
address = {Melbourne, Australia},
|
|
volume = {4},
|
|
audience = {international },
|
|
doi = {10.1007/978-3-642-35362-8 },
|
|
year = {2012},
|
|
month = Dec,
|
|
www_pdf_url = {http://hal.inria.fr/hal-00744922/PDF/Improving\_Content\_Availability\_in\_the\_I2P\_0AAnonymous\_File-Sharing\_Environment\_0A.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
%% hal-00744919, version 1
|
|
%% http://hal.inria.fr/hal-00744919
|
|
@inproceedings{timpanaro:hal-00744919,
|
|
hal_id = {hal-00744919},
|
|
url = {http://hal.inria.fr/hal-00744919},
|
|
title = {{A Bird's Eye View on the I2P Anonymous File-sharing Environment}},
|
|
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
|
|
abstract = {{Anonymous communications have been gaining more and more interest from Internet users as privacy and anonymity problems have emerged. Among anonymous enabled services, anonymous file-sharing is one of the most active one and is increasingly growing. Large scale monitoring on these systems allows us to grasp how they behave, which type of data is shared among users, the overall behaviour in the system. But does large scale monitoring jeopardize the system anonymity? In this work we present the first large scale monitoring architecture and experiments on the I2P network, a low-latency message-oriented anonymous network. We characterize the file-sharing environment within I2P, and evaluate if this monitoring affects the anonymity provided by the network. We show that most activities within the network are file-sharing oriented, along with anonymous web-hosting. We assess the wide geographical location of nodes and network popularity. We also demonstrate that group-based profiling is feasible on this particular network.}},
|
|
keywords = {Large scale monitoring, I2P, Security risks, Anonymous file-sharing},
|
|
language = {English},
|
|
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
|
|
booktitle = {{Proceedings of the 6th International Conference on Network and System Security}},
|
|
address = {Wu Yi Shan, China},
|
|
audience = {international },
|
|
year = {2012},
|
|
month = Nov,
|
|
www_pdf_url = {http://hal.inria.fr/hal-00744919/PDF/A\_Birda\_s\_Eye\_View\_on\_the\_I2P\_Anonymous\_0AFile-sharing\_Environment\_0A.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@article{ruiz2012,
|
|
title = {A survey on solutions and main free tools for privacy enhancing Web communications},
|
|
author = {A Ruiz-Mart{\'i}nez},
|
|
journal = {Journal of Network and Computer Applications},
|
|
year = {2012},
|
|
month = Sep,
|
|
volume = {35},
|
|
number = {5},
|
|
pages = {1473--1492},
|
|
www_pdf_url = {http://www.freehaven.net/anonbib/cache/Ruiz-Martinez_2012.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
%% hal-00744902, version 1
|
|
%% http://hal.inria.fr/hal-00744902
|
|
@inproceedings{timpanaro:hal-00744902,
|
|
hal_id = {hal-00744902},
|
|
url = {http://hal.inria.fr/hal-00744902},
|
|
title = {{I2P's Usage Characterization}},
|
|
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
|
|
abstract = {{We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and show through three one-week measurement experiments the ability of the system to identify a significant number of all running applications, among web servers and file-sharing clients. Additionally, we identify 37\% of published I2P applications, which turn out to be unreachable after their publication on the I2P distributed database.}},
|
|
language = {English},
|
|
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
|
|
booktitle = {{Proceedings of the 4th International Workshop on Traffic Monitoring and Analysis (TMA 2012)}},
|
|
address = {Vienne, Austria},
|
|
audience = {international },
|
|
year = {2012},
|
|
month = Mar,
|
|
www_pdf_url = {http://hal.inria.fr/hal-00744902/PDF/TMA2012-LNCS.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@misc{ehlert2011:usability-comparison-i2p-tor,
|
|
title = {I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison},
|
|
author = {Mathias Ehlert},
|
|
howpublished = {Seminar, Humboldt University of Berlin},
|
|
year = {2011},
|
|
month = {November},
|
|
www_pdf_url = {http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
%% inria-00632259, version 1
|
|
%% http://hal.inria.fr/inria-00632259
|
|
@misc{timpanaro:inria-00632259,
|
|
hal_id = {inria-00632259},
|
|
url = {http://hal.inria.fr/inria-00632259},
|
|
title = {{Monitoring the I2P network}},
|
|
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
|
|
howpublished = {Preprint},
|
|
abstract = {{We present the first monitoring study aiming to characterize the usage of the I2P network, a low-latency anonymous network based on garlic routing. We design a distributed monitoring architecture for the I2P network and we show through a one week long experiment that we are able to identify 32\% of all running applications, among web servers and file- sharing clients. Additionally, we identify 37\% of published I2P applications, which turn out to be unreachable after its publication on the I2P distributed database.}},
|
|
language = {English},
|
|
affiliation = {MADYNES - INRIA Lorraine - LORIA},
|
|
year = {2011},
|
|
month = Oct,
|
|
www_pdf_url = {http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@inproceedings{pets2011-i2p,
|
|
title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P},
|
|
author = {Michael Herrmann and Christian Grothoff},
|
|
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011)},
|
|
year = {2011},
|
|
month = {July},
|
|
location = {Waterloo, Canada},
|
|
www_tags = {selected},
|
|
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@mastersthesis{hermann2011-mthesis,
|
|
title = {Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P},
|
|
author = {Michael Hermann},
|
|
school = {TU-Munich},
|
|
year = {2011},
|
|
month = {March},
|
|
www_pdf_url = {https://gnunet.org/sites/default/files/herrmann2011mt.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@inproceedings{zantout2011,
|
|
title = {I2P Data Communication System},
|
|
author = {Bassam Zantout and Ramzi Haraty},
|
|
booktitle = {Proceedings of ICN 2011, The Tenth International Conference on Networks},
|
|
year = {2011},
|
|
month = Jan,
|
|
location = {St. Maarten, The Netherlands Antilles},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@inproceedings{BlackHat2011-crenshaw,
|
|
url = {http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers},
|
|
title = {Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts},
|
|
author = {Adrian Crenshaw},
|
|
booktitle = {Proceedings of Black Hat 2011},
|
|
year = {2011},
|
|
month = {January},
|
|
location = {Washington, DC},
|
|
www_pdf_url = {http://www.irongeek.com/downloads/Identifying%20the%20true%20IP%20of%20I2P%20service%20hosts.pdf},
|
|
www_section = traffic,
|
|
}
|
|
|
|
@mastersthesis{delmer-mthesis,
|
|
title = {L'{\'e}mergence au sein d'internet de communaut{\'e}s virtuelles et anonymes, Freenet et i2p},
|
|
author = {Laurie Delmer},
|
|
school = {Universit{\'e} catholique de Louvain - D{\'e}partement des sciences politiques et sociales},
|
|
year = {2009},
|
|
note = {Title : The rise in internet virtual and anonymous communities, Freenet and I2P. School: Catholic University of Leuven - Department of Political and Social Science},
|
|
www_section = comm,
|
|
}
|
|
|
|
@inproceedings{abou-tair2009,
|
|
title={Usability Inspection of Anonymity Networks},
|
|
author={Abou-Tair, D.e.I. and Pimenidis, L. and Schomburg, J. and Westermann, B.},
|
|
booktitle={Proceedings of the World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS '09)},
|
|
year={2009},
|
|
month=Aug,
|
|
pages={100--109},
|
|
abstract={{Today, to be monitored while surfing the web seems to be a natural act and thus tools and applications to achieve online anonymity are more important than ever. The usability of such a tool plays not only a prominent role for each single user; in the area of anonymization networks it usually holds that the protection for every single user is higher, the more users participate. Hence, usability is of great importance, since bad usability decreases the number of potential users. In this paper we examine the usability of four software implementations for anonymous communication techniques especially with regards to the installation procedure. The usability is evaluated with the help of cognitive walk-throughs. We also inspect the quality of service of these implementations by means of a performance test.}},
|
|
keywords={Internet;security of data;anonymity networks;anonymization networks;anonymous communication techniques;cognitive walk-throughs;installation;quality of service;software implementations;usability inspection;Communication system security;Inspection;Monitoring;Operating systems;Privacy;Quality management;Quality of service;System testing;Technology management;Usability;AN.ON;Anonymity;HCI;JAP;JonDo;JondoNym;Tor;Usability},
|
|
doi={10.1109/CONGRESS.2009.38},
|
|
www_pdf_url = {http://pimenidis.org/research/papers/usability-inspection.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
@inproceedings{petcon2009-schomburg,
|
|
title = {Anonymity Techniques - Usability Tests of Major Anonymity Networks},
|
|
author = {Jens Schomburg},
|
|
booktitle = {Proceedings of PET-CON 2009.1},
|
|
location = {Dresden, Germany},
|
|
year = {2009},
|
|
month = {March},
|
|
pages = {49--58},
|
|
www_pdf_url = {https://people.torproject.org/~karsten/petcon-proceedings-2009.1.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
@inproceedings{petcon2009-zzz,
|
|
title = {Peer Profiling and Selection in the I2P Anonymous Network},
|
|
author = {zzz (Pseudonym) and Lars Schimmer},
|
|
booktitle = {Proceedings of PET-CON 2009.1},
|
|
location = {Dresden, Germany},
|
|
year = {2009},
|
|
month = {March},
|
|
pages = {59--70},
|
|
www_pdf_url = {/_static/pdf/I2P-PET-CON-2009.1.pdf},
|
|
www_section = comm,
|
|
}
|
|
|
|
@misc{jrandom2003,
|
|
title = {Invisible Internet Project (I2P) Project Overview},
|
|
author = {jrandom (Pseudonym)},
|
|
howpublished = {Design document},
|
|
year = {2003},
|
|
month = Aug,
|
|
www_pdf_url = {/_static/pdf/i2p_philosophy.pdf},
|
|
www_section = comm,
|
|
www_tags = {tech-report},
|
|
}
|
|
|