Abstract
Anonymous communications have been gaining more and more interest from Internet users as privacy and anonymity problems have emerged. Among anonymous enabled services, anonymous filesharing is one of the most active one and is increasingly growing. Large scale monitoring on these systems allows us to grasp how they behave, which type of data is shared among users, the overall behaviour in the system. But does large scale monitoring jeopardize the system anonymity?
In this work we present the first large scale monitoring architecture and experiments on the I2P network, a low-latency message-oriented anonymous network. We characterize the file-sharing environment within I2P, and evaluate if this monitoring affects the anonymity provided by the network.
We show that most activities within the network are file-sharing oriented, along with anonymous web-hosting. We assess the wide geographical location of nodes and network popularity. We also demonstrate that group-based profiling is feasible on this particular network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Siganos, G., Pujol, J.M., Rodriguez, P.: Monitoring the Bittorrent Monitors: A Bird’s Eye View. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 175–184. Springer, Heidelberg (2009)
Steiner, M., En-Najjary, T., Biersack, E.W.: A global view of Kad. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC 2007, San Diego, California, USA. ACM (October 2007)
Banerjee, A., Faloutsos, M., Bhuyan, L.N.: The P2P War: Someone Is Monitoring Your Activities! In: Akyildiz, I.F., Sivakumar, R., Ekici, E., de Oliveira, J.C., McNair, J. (eds.) NETWORKING 2007. LNCS, vol. 4479, pp. 1096–1107. Springer, Heidelberg (2007)
Chaabane, A., Manils, P., Ali Kaafar, M.: Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. In: Proceedings of the 2010 4th International Conference on Network and System Security. IEEE Computer Society, Washington, DC (2010)
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63–76. Springer, Heidelberg (2008)
I2P. The I2P network, http://www.i2p2.de/
Goldschlag, D., Reed, M., Syverson, P.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)
Maymounkov, P., Mazières, D.: Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)
Timpanaro, J.P., Cholez, T., Chrisment, I., Festor, O.: When KAD meets BitTorrent - Building a Stronger P2P Network. In: Proceedings of the 8th International Workshop on Hot Topics in Peer-to-Peer Systems, HotP2P 2011, Anchorage, Alaska, USA. IEEE Computer Society (May 2011)
Blond, S.L., Manils, P., Chaabane, A., Kaafar, M.A., Castelluccia, C., Legout, A., Dabbous, W.: One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET 2011, Boston, MA. USENIX Association (March 2011)
Loesing, K., Murdoch, S.J., Dingledine, R.: A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 203–215. Springer, Heidelberg (2010)
Loesing, K.: Measuring the Tor network from public directory information. In: Proceedings of the 4th Hot Topics in Privacy Enhancing Technologies, HotPETS 2011, Seattle, WA, USA. Springer (August 2009)
Timpanaro, J.P., Chrisment, I., Festor, O.: I2P’s Usage Characterization. In: Pescapè, A., Salgarelli, L., Dimitropoulos, X. (eds.) TMA 2012. LNCS, vol. 7189, pp. 48–51. Springer, Heidelberg (2012)
Crenshaw, A.: Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts. In: Black Hat 2011, Washington, DC, USA (March 2011)
Herrmann, M., Grothoff, C.: Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 155–174. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Timpanaro, J.P., Chrisment, I., Festor, O. (2012). A Bird’s Eye View on the I2P Anonymous File-Sharing Environment. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-34601-9_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34600-2
Online ISBN: 978-3-642-34601-9
eBook Packages: Computer ScienceComputer Science (R0)