Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Proceedings of the First International Workshop on Information Hiding
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Shining Light in Dark Places: Understanding the Tor Network
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Monitoring the Bittorrent Monitors: A Bird's Eye View
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
The P2P war: someone is monitoring your activities!
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
A case study on measuring statistical data in the tor anonymity network
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network
NSS '10 Proceedings of the 2010 Fourth International Conference on Network and System Security
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
TMA'12 Proceedings of the 4th international conference on Traffic Monitoring and Analysis
Hi-index | 0.00 |
Anonymous communications have been gaining more and more interest from Internet users as privacy and anonymity problems have emerged. Among anonymous enabled services, anonymous filesharing is one of the most active one and is increasingly growing. Large scale monitoring on these systems allows us to grasp how they behave, which type of data is shared among users, the overall behaviour in the system. But does large scale monitoring jeopardize the system anonymity? In this work we present the first large scale monitoring architecture and experiments on the I2P network, a low-latency message-oriented anonymous network. We characterize the file-sharing environment within I2P, and evaluate if this monitoring affects the anonymity provided by the network. We show that most activities within the network are file-sharing oriented, along with anonymous web-hosting. We assess the wide geographical location of nodes and network popularity. We also demonstrate that group-based profiling is feasible on this particular network.