Skip to main content

A Bird’s Eye View on the I2P Anonymous File-Sharing Environment

  • Conference paper
Book cover Network and System Security (NSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7645))

Included in the following conference series:

Abstract

Anonymous communications have been gaining more and more interest from Internet users as privacy and anonymity problems have emerged. Among anonymous enabled services, anonymous filesharing is one of the most active one and is increasingly growing. Large scale monitoring on these systems allows us to grasp how they behave, which type of data is shared among users, the overall behaviour in the system. But does large scale monitoring jeopardize the system anonymity?

In this work we present the first large scale monitoring architecture and experiments on the I2P network, a low-latency message-oriented anonymous network. We characterize the file-sharing environment within I2P, and evaluate if this monitoring affects the anonymity provided by the network.

We show that most activities within the network are file-sharing oriented, along with anonymous web-hosting. We assess the wide geographical location of nodes and network popularity. We also demonstrate that group-based profiling is feasible on this particular network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Siganos, G., Pujol, J.M., Rodriguez, P.: Monitoring the Bittorrent Monitors: A Bird’s Eye View. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 175–184. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  2. Steiner, M., En-Najjary, T., Biersack, E.W.: A global view of Kad. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC 2007, San Diego, California, USA. ACM (October 2007)

    Google Scholar 

  3. Banerjee, A., Faloutsos, M., Bhuyan, L.N.: The P2P War: Someone Is Monitoring Your Activities! In: Akyildiz, I.F., Sivakumar, R., Ekici, E., de Oliveira, J.C., McNair, J. (eds.) NETWORKING 2007. LNCS, vol. 4479, pp. 1096–1107. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Chaabane, A., Manils, P., Ali Kaafar, M.: Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network. In: Proceedings of the 2010 4th International Conference on Network and System Security. IEEE Computer Society, Washington, DC (2010)

    Google Scholar 

  5. McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63–76. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. I2P. The I2P network, http://www.i2p2.de/

  7. Goldschlag, D., Reed, M., Syverson, P.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  8. Maymounkov, P., Mazières, D.: Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Timpanaro, J.P., Cholez, T., Chrisment, I., Festor, O.: When KAD meets BitTorrent - Building a Stronger P2P Network. In: Proceedings of the 8th International Workshop on Hot Topics in Peer-to-Peer Systems, HotP2P 2011, Anchorage, Alaska, USA. IEEE Computer Society (May 2011)

    Google Scholar 

  10. Blond, S.L., Manils, P., Chaabane, A., Kaafar, M.A., Castelluccia, C., Legout, A., Dabbous, W.: One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET 2011, Boston, MA. USENIX Association (March 2011)

    Google Scholar 

  11. Loesing, K., Murdoch, S.J., Dingledine, R.: A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 203–215. Springer, Heidelberg (2010)

    Google Scholar 

  12. Loesing, K.: Measuring the Tor network from public directory information. In: Proceedings of the 4th Hot Topics in Privacy Enhancing Technologies, HotPETS 2011, Seattle, WA, USA. Springer (August 2009)

    Google Scholar 

  13. Timpanaro, J.P., Chrisment, I., Festor, O.: I2P’s Usage Characterization. In: Pescapè, A., Salgarelli, L., Dimitropoulos, X. (eds.) TMA 2012. LNCS, vol. 7189, pp. 48–51. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  14. Crenshaw, A.: Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts. In: Black Hat 2011, Washington, DC, USA (March 2011)

    Google Scholar 

  15. Herrmann, M., Grothoff, C.: Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 155–174. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Timpanaro, J.P., Chrisment, I., Festor, O. (2012). A Bird’s Eye View on the I2P Anonymous File-Sharing Environment. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34601-9_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34600-2

  • Online ISBN: 978-3-642-34601-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics