Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security

Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor

Abstract

.

References

  1. Biryukov, A., Pustogarov, I., and Weinmann, R.-P. (2013). Trawling for tor hidden services: Detection, measurement, deanonymization. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP 7813, pages 80-94, Washington, DC, USA. IEEE Computer Society.
  2. Cholez, T., Chrisment, I., and Festor, O. (2009). Evaluation of Sybil Attacks Protection Schemes in KAD. In Sadre, R. and Pras, A., editors, 3rd International Conference on Autonomous Infrastructure, Management and Security - AIMS 2009, volume 5637 of Lecture Notes in Computer Science, pages 70-82, Enschede, Netherlands. University of Twente, Springer.
  3. Cholez, T., Chrisment, I., Festor, O., and Doyen, G. (2012). Detection and mitigation of localized attacks in a widely deployed P2P network. Peer-to-Peer Networking and Applications, 6(2):155-174.
  4. Crenshaw, A. (2011). Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts. In Black Hat DC 2011, Black Hat 7811, DC.
  5. Douceur, J. R. (2002). The Sybil Attack. In Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS 7801, pages 251-260, London, UK. Springer-Verlag.
  6. Egger, C., Schlumberger, J., Kruegel, C., and Vigna, G. (2013). Practical attacks against the i2p network. In Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013).
  7. Exchange, T. S. DDoS attack on Tor directory. bit.ly/ 1iWOrmC. Last visited on 12/2013.
  8. Gatti, R., Lewis, S., Ozment, A., Rayna, T., and Serjantov, A. (2004). Sufficiently secure peer-to-peer networks. Workshop on the Economics of Information Security.
  9. Herrmann, M. and Grothoff, C. (2011). Privacyimplications of performance-based peer selection by onion-routers: a real-world case study using I2P. In Proceedings of the 11th International Conference on Privacy Enhancing Technologies, PETS 7811, pages 155-174, Berlin, Heidelberg. Springer-Verlag.
  10. Hopper, N., Vasserman, E. Y., and Chan-TIN, E. (2010). How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur., 13(2):13:1-13:28.
  11. Levine, B. N., Shields, C., and Margolin, N. B. (2006). A Survey of Solutions to the Sybil Attack. Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA.
  12. Loesing, K., Murdoch, S. J., and Dingledine, R. (2010). A case study on measuring statistical data in the tor anonymity network. In Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, FC'10, pages 203-215, Berlin, Heidelberg. Springer-Verlag.
  13. Margolin, N. B. and Levine, B. N. (2007). Informant: detecting sybils using incentives. In Proc. of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, FC 7807/USEC 7807, pages 192-207, Berlin, Heidelberg. Springer-Verlag.
  14. Maymounkov, P. and Mazières, D. (2002). Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS 7801, pages 53-65, London, UK. Springer-Verlag.
  15. Mccoy, D., Bauer, K., Grunwald, D., Kohno, T., and Sicker, D. (2008). Shining Light in Dark Places: Understanding the Tor Network. In Proceedings of the 8th Privacy Enhancing Technologies Symposium, PETS 7808, Leuven, Belgium.
  16. Steiner, M., Biersack, E. W., and En Najjary, T. (2007). Actively monitoring peers in KAD. In Proceedings of the 6th International Workshop on Peer-to-Peer Systems, February 26-27, 2007, Bellevue, USA, IPTPS 2007, Bellevue, UNITED STATES.
  17. Steiner, M., En-najjary, T., and Biersack, E. W. (2007). Exploiting kad: Possible uses and misuses. ACM SIGCOMM CCR, 37.
  18. Stutzbach, D. and Rejaie, R. (2006). Understanding churn in peer-to-peer networks. In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 7806, pages 189-202, New York, NY, USA. ACM.
  19. Timpanaro, J. P., Chrisment, I., and Festor, O. (2012). A Bird's Eye View on the I2P Anonymous File-sharing Environment. In Proceedings of the 6th International Conference on Network and System Security, NSS 7812, Wu Yi Shan, China.
  20. Urdaneta, G., Pierre, G., and Steen, M. V. (2011). A survey of DHT security techniques. ACM Comput. Surv., 43(2):8:1-8:49.
  21. Wang, P., Tyra, J., Chan-Tin, E., Malchow, T., Kune, D. F., Hopper, N., and Kim, Y. (2008). Attacking the kad network. In Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, SecureComm 7808, pages 23:1-23:10, New York, NY, USA. ACM.
  22. zzz and Schimmer, L. (2009). Peer proling and selection in the I2P anonymous network. In Proceedings of PETCON 2009.1.
Download


Paper Citation


in Harvard Style

Timpanaro J., Cholez T., Chrisment I. and Festor O. (2015). Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security . In Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-081-9, pages 46-55. DOI: 10.5220/0005226600460055


in Bibtex Style

@conference{icissp15,
author={Juan Pablo Timpanaro and Thibault Cholez and Isabelle Chrisment and Olivier Festor},
title={Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2015},
pages={46-55},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005226600460055},
isbn={978-989-758-081-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security
SN - 978-989-758-081-9
AU - Timpanaro J.
AU - Cholez T.
AU - Chrisment I.
AU - Festor O.
PY - 2015
SP - 46
EP - 55
DO - 10.5220/0005226600460055