Research Papers
Academic research and publications about I2P anonymity network
2025
University of Cincinnati technical report , June 2025.
PDF
@techreport{muntaka2025,
title = {Resilience of the Invisible Internet Project: A Computational Analysis},
author = {Siddique Abubakr Muntaka and Jacques Bou Abdo},
institution = {University of Cincinnati},
year = {2025},
month = {June},
url = {https://www.authorea.com/users/931185/articles/1302198-resilience-of-the-invisible-internet-project-a-computational-analysis},
www_section = {Traffic analysis},
}
University of Cincinnati technical report , September 2025.
PDF
@techreport{akanbi2025,
title = {Examining I2P Resilience: Effect of Centrality-based Attack},
author = {Kemi Akanbi and Sunkanmi Oluwadare and Jess Kropczynski and Jacques Bou Abdo},
institution = {University of Cincinnati},
year = {2025},
month = {September},
url = {https://arxiv.org/abs/2509.18572},
www_section = {Traffic analysis},
}
University of Cincinnati technical report , September 2025.
PDF
@techreport{krayem2025,
title = {Invisible Internet Project and Spatial Restrictions: A Systemic Vulnerability},
author = {Kemi Akanbi and Tarek Krayem and Siddique Abubakr Muntaka and Jacques Bou
Abdo},
institution = {University of Cincinnati},
year = {2025},
month = {September},
url = {https://www.authorea.com/users/931186/articles/1335026-invisible-internet-project-and-spatial-restrictions-a-systemic-vulnerability},
www_section = {Traffic analysis},
}
2024
Modeling the Invisible Internet
In the Complex Networks and their Applications XII, February 2024.
@inproceedings{abdo,
title = {Modeling the Invisible Internet},
author = {Jacques Bou Abdo and Liaquat Hossain},
booktitle = {Complex Networks and their Applications XII},
year = {2024},
month = {February},
publisher = {Springer},
url = {https://link.springer.com/chapter/10.1007/978-3-031-53472-0_30},
www_section = {Traffic analysis},
}
Forensic Analysis of I2P Communication Network in Android and macOS Environments
In the 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), April 2024.
@inproceedings{wangchuk,
title = {Forensic Analysis of I2P Communication Network in Android and macOS
Environments},
author = {Tashi Wangchuk and Ngaira Mandela and Tumaini Mbinda and Kamboisssoi Damedjate
and Felix Etyang and Joel Makopa},
booktitle = {2024 11th International Conference on Computing for Sustainable Global
Development (INDIACom)},
year = {2024},
month = {April},
publisher = {IEEE},
url = {https://ieeexplore.ieee.org/document/10498888},
www_section = {Traffic analysis},
}
2021
Research and implementation of bridge technology in I2P anonymous system
Ph.D. thesis, Beijing University of Posts and Telecommunications, 2021.
@phdthesis{yu2021,
title = {Research and implementation of bridge technology in I2P anonymous system},
author = {Yu Chih-Wei},
school = {Beijing University of Posts and Telecommunications},
year = {2021},
url = {https://www.zhangqiaokeyan.com/academic-degree-domestic_mphd_thesis/020318030805.html},
www_section = {Anonymous communication},
}
Sandia National Laboratories technical report , September 2021.
PDF
@techreport{stickland2021,
title = {Foundations of Rigorous Cyber Experimentation},
author = {Michael Stickland and Justin D. Li and Laura Swiler and Thomas Tarman},
institution = {Sandia National Laboratories},
year = {2021},
month = {September},
url = {https://www.osti.gov/servlets/purl/1854751/},
www_section = {Traffic analysis},
}
2020
In Communications Technology 53(1), January 2020, pages 161-167.
PDF
@article{qu2020,
title = {Analysis and Identification of I2P Anonymous Communication Traffic
Characteristics},
author = {QU Yun-xuan and WANG Yi-jun and XUE Zhi},
journal = {Communications Technology},
volume = {53},
number = {1},
year = {2020},
month = {January},
pages = {161--167},
doi = {10.3969/j.issn.1002-0802.2020.01.028},
url = {http://stats.i2p/docs/AII2PACTC-eng.docx},
www_pdf_url = {http://stats.i2p/docs/I2P%20%E5%8C%BF%E5%90%8D%E9%80%9A%E4%BF%A1%E6%B5%81%E9%87%8F%E7%89%B9%E5%BE%81%E5%88%86%E6%9E%90%E4%B8%8E%E8%AF%86%E5%88%AB-min.pdf},
keywords = {anonymous communication; I2P; traffic identification; statistical feature
analysis},
www_section = {Traffic analysis},
}
In EEE INTERNET COMPUTING 1, December 2020.
PDF
@article{interconnection-between-darknets,
title = {Interconnection between darknets},
author = {L. Ye and X. Yu and J. Zhao and D. Zhan and X. Du and M. Guizani},
journal = {EEE INTERNET COMPUTING},
volume = {1},
year = {2020},
month = {December},
doi = {10.1109/MIC.2020.3037723},
www_section = {Anonymous communication},
www_pdf_url = {https://arxiv.org/pdf/2012.05003},
keywords = {Tor, i2p, Darknet, Graph Analysis, Dataset},
abstract = {Tor and i2p networks are two of the most popular darknets. Both darknets have
become an area of illegal activities highlighting the necessity to study and
analyze them to identify and report illegal content to Law Enforcement Agencies
(LEAs). This paper analyzes the connections between the Tor network and the i2p
network. We created the first dataset that combines information from Tor and i2p
networks. The dataset contains more than 49k darknet services. The process of
building and analyzing the dataset shows that it is not possible to explore one
of the networks without considering the other. Both networks work as an ecosystem
and there are clear paths between them. Using graph analysis, we also identified
the most relevant domains, the prominent types of services in each network, and
their relations. Findings are relevant to LEAs and researchers aiming to crawl
and investigate i2p and Tor networks.},
issn = {2169-3536},
}
2019
Masters's thesis, University of Amsterdam, February 2019.
PDF
@mastersthesis{boerbreider,
title = {Invisible Internet Project(Report)},
author = {de Boer, Tim and Breider, Vincent},
school = {University of Amsterdam},
year = {2019},
month = {February},
www_section = {Anonymous communication},
www_pdf_url = {https://delaat.net/rp/2018-2019/p63/report.pdf},
}
Masters's thesis, University of Amsterdam, February 2019.
PDF
@mastersthesis{boerbreider-pres,
title = {Invisible Internet Project(Presentation)},
author = {de Boer, Tim and Breider, Vincent},
school = {University of Amsterdam},
year = {2019},
month = {February},
www_section = {Anonymous communication},
www_pdf_url = {https://delaat.net/rp/2018-2019/p63/presentation.pdf},
}
In the 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19), Santa Clara, CA, August 2019.
PDF
@inproceedings{239068,
title = {Measuring I2P Censorship at a Global Scale},
author = {Nguyen Phong Hoang and Sadie Doreen and Michalis Polychronakis},
booktitle = {9th USENIX Workshop on Free and Open Communications on the Internet (FOCI
19)},
year = {2019},
month = {August},
address = {Santa Clara, CA},
publisher = {USENIX Association},
url = {https://www.usenix.org/conference/foci19/presentation/hoang},
www_pdf_url = {https://www.usenix.org/system/files/foci19-paper_hoang.pdf},
www_section = {Traffic analysis},
}
2018
The MIT Press, 2018.
PDF
BibTeX key: gehl_5f2018
Masters's thesis, Leiden University, January 2018.
PDF
@mastersthesis{smits2018:i2p-enhanced-outproxy,
title = {Risk Assessment for I2P With an Enhanced Outproxy Design},
author = {Smits, Dolf},
school = {Leiden University},
year = {2018},
month = {January},
url = {https://openaccess.leidenuniv.nl/handle/1887/64566},
www_section = {Traffic analysis},
www_pdf_url = {https://openaccess.leidenuniv.nl/bitstream/handle/1887/64566/Smits_D_2018_CS.pdf?sequence=2},
}
Masters's thesis, University of Amsterdam, June 2018.
PDF
@mastersthesis{alachkargastra2018-blockchain-based-sybil-mitigation,
title = {Blockchain-based Sybil Attack Mitigation: A Case Study of the I2P Network},
author = {Alachkar, Kotaiba and Gaastra, Dirk},
school = {University of Amsterdam},
year = {2018},
month = {June},
www_section = {Anonymous communication},
www_pdf_url = {https://docslib.org/doc/12313748/blockchain-based-sybil-attack-mitigation-a-case-study-of-the-i2p},
}
In the Proceedings of 2018 Internet Measurement Conference (IMC '18), October 2018.
PDF
@inproceedings{phong2018:i2p-censorship-resistance,
title = {An Empirical Study of the I2P Anonymity Network and its Censorship Resistance},
author = {Nguyen, Phong Hoang and Kintis, Panagiotis and Antonakakis, Manos and
Polychronakis, Michalis},
booktitle = {Proceedings of 2018 Internet Measurement Conference (IMC '18)},
year = {2018},
month = {October},
www_pdf_url = {https://www.researchgate.net/profile/Nguyen_Phong_Hoang/publication/327445307},
www_section = {Traffic analysis},
}
In IEEE Access 6, November 2018, pages 71350-71359.
PDF
@article{ye2018-deciding-anonymity,
title = {Deciding Your Own Anonymity: User-Oriented Node Selection in I2P},
author = {L. Ye and X. Yu and J. Zhao and D. Zhan and X. Du and M. Guizani},
journal = {IEEE Access},
volume = {6},
number = {},
year = {2018},
month = {November},
pages = {71350--71359},
doi = {10.1109/ACCESS.2018.2881719},
abstract = {With the development of Internet applications, anonymous communication
technology plays a very significant role in protecting personal privacy. As one
of the most popular anonymous communication systems, I2P provides strong
anonymity through its encryption and communication schemes. However, I2P does not
consider the users' preferences, which is difficult to meet the individual
demands of specific users and then allows them to decide their anonymity. Thus,
this paper proposes two novel user-oriented node selection algorithms that can
effectively enhance the anonymity or reduce the communication delay over the I2P
network. In order to choose proper nodes, we also investigate key factors to
evaluate the nodes. Then, the basic node selection algorithm (BNSA) is proposed
to group routing nodes and provide high-performance node candidates. Based on
BNSA, the geographic-diversity-oriented node selection algorithm (GDNSA) and the
communication-delay-oriented node selection algorithm (CDNSA) are proposed. These
can improve the anonymity or communication performance of the I2P network. The
GDNSA increases the attack difficulty by establishing tunnels that span multiple
regions. In the meantime, the CDNSA reduces the communication delay of the tunnel
by selecting the next hop node with the lowest communication delay. Finally, the
mathematical analysis and experimental results show that the GDNSA has good
resistance to collusion attacks, and the CDNSA reduces the communication delay in
spite of weakening a little anonymity},
www_pdf_url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8537903},
keywords = {Peer-to-peer computing;Delays;Routing;Relays;Logic gates;Security;Anonymous
communication;node selection;geographic diversity;communication delay;I2P},
www_section = {Anonymous communication},
issn = {2169-3536},
}
2017
Dalhousie University technical report , January 2017.
PDF
@techreport{shahbar2017-measuring-anonymity-services,
title = {Weighted Factors for Measuring Anonymity Services: A Case Study on Tor,
JonDonym, and I2P},
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
institution = {Dalhousie University},
year = {2017},
month = {January},
abstract = {{There are many systems that provide anonymity service for the users. Most of
these systems work on the separation between the users' identity and the final
destination. The level of anonymity these services provide affected by several
factors. Some of these factors are related to the design of the anonymity service
itself. Others are related to how the system is used or what is the
application/purpose the user wants to run over the anonymity service. In this
paper we: (i) propose five factors that aim to measure the anonymity level from
the user's perspective; (ii) evaluate these factors on three anonymity services,
namely Tor, JonDonym, and I2P as case studies; and (iii) present a mechanism to
evaluate anonymity services based on our factors and measure the level of
anonymity.}},
www_section = {Anonymous communication},
www_pdf_url = {/docs/research/shahbar2017.pdf},
keywords = {Anonymity Factors ; Metrics ; Tor ; I2P ; JonDonym},
}
Dalhousie University technical report , March 2017.
PDF
@techreport{shahbar2017-dataset,
title = {Anon17: Network Traffic Dataset of Anonymity Services},
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
institution = {Dalhousie University},
year = {2017},
month = {March},
abstract = {{One of the difficulties that face researchers on the anonymity networks
field is the lack of anonymity dataset. Researchers need to collect their data to
conduct a research or to use a simulated environment to collect the data they
need. The lack of such a dataset is due to the nature of the anonymity networks.
These anonymity networks aim to provide certain level of privacy for the users.
In this paper, we present Anon17, a traffic flow dataset of different anonymity
services. Anon17 specifically contains data collected from three anonymity
networks; Tor, JonDonym, and I2P.}},
www_section = {Traffic analysis},
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-03.pdf},
keywords = {Dataset ; Tor ; I2P ; JonDonym ; Traffic Flow ; Anonymity},
}
In the Proceedings of the 38th IEEE Symposium on Security and Privacy Workshops, 2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017), May 2017.
PDF
@inproceedings{shahbar2017:effects-shared-bandwidth,
title = {Effects of Shared Bandwidth on Anonymity of the I2P Network Users},
author = {Khalid Shahbar and A. Nur Zincir-Heywood},
booktitle = {Proceedings of the 38th IEEE Symposium on Security and Privacy Workshops,
2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC
2017)},
year = {2017},
month = {May},
www_pdf_url = {https://www.researchgate.net/publication/321999503_Effects_of_Shared_Bandwidth_on_Anonymity_of_the_I2P_Network_Users},
www_section = {Traffic analysis},
}
The Dark side of I2P, a forensic analysis case study
In System Science & Control Engeneering 2017(5), June 2017, pages 278-286.
@article{bazli2017-the-dark-side-of-i2p,
title = {The Dark side of I2P, a forensic analysis case study},
author = {Bazli, Wilson and Hurst},
journal = {System Science & Control Engeneering},
volume = {2017},
number = {5},
year = {2017},
month = {June},
pages = {278--286},
doi = {10.1080/21642583.2017.1331770},
url = {https://doi.org/10.1080/21642583.2017.1331770},
www_section = {Traffic analysis},
}
Ph.D. thesis, October 2017.
PDF
@phdthesis{shahbar2017-dthesis,
title = {Analysis of Multilayer-Encryption Anonymity Networks},
author = {Khalid Shahbar},
institution = {Dalhousie University},
year = {2017},
month = {October},
abstract = {{This thesis studies and analyzes multilayer-encryption anonymity networks.
Traffic flow analysis is employed to identify multilayer-encryption anonymity
networks. The analysis includes collecting data from the three most popular
anonymity networks (namely, Tor, JonDonym and I2P). The collected data (Anon17)
is made publicly available for researchers on the field. The study also includes
proposing weighted factors to quantify and measure the level of anonymity these
networks could provide.}},
www_section = {Traffic analysis},
www_pdf_url = {https://dalspace.library.dal.ca/bitstream/handle/10222/73395/Shahbar-Khalid-PhD-CS-Oct-2017.pdf},
}
2016
Anonymity networks and the fragile cyber ecosystem
In Network Security 2016(3), March 2016, pages 10-18.
@article{haughey2016,
title = {Anonymity networks and the fragile cyber ecosystem},
author = {Haughey, Hamish and Epiphaniou, Gregory and Al-Khateeb, Haider M.},
journal = {Network Security},
volume = {2016},
number = {3},
year = {2016},
month = {March},
pages = {10--18},
www_section = {Traffic analysis},
}
TOR vs I2P: A Comparative Study
In the Proceedings of the 2016 IEEE International Conference on Industrial Technology (ICIT), March 2016.
@inproceedings{ali2016,
title = {TOR vs I2P: A Comparative Study},
author = {Ali, Afzaal and Khan, Maria and Saddique, Muhammad and Pirzada, Umar and
Zohaib, Muhammad and Ahmad, Imran and Debnath, Narayan},
booktitle = {Proceedings of the 2016 IEEE International Conference on Industrial
Technology (ICIT)},
year = {2016},
month = {March},
www_section = {Traffic analysis},
}
Bachelors Thesis, Bern University of Applied Sciences, June 2016.
PDF
@mastersthesis{muller-bthesis,
title = {Analysis of the I2P Network - Information Gathering and Attack Evaluations},
author = {Jens M{\"u}ller},
school = {Bern University of Applied Sciences},
year = {2016},
month = {June},
type = {Bachelors Thesis},
note = {Title : Analysis of the I2P Network. School: Bern University of Applied Sciences
- Department of Computer Science},
abstract = {{This thesis consists of three main parts, one giving an introduction to I2P,
the Invisible Internet Project, one that presents I2P Observer, a software to
collect information about I2P and one that evaluates different attack
possibilities on I2P.}},
www_pdf_url = {https://docslib.org/doc/6144412/analysis-of-the-i2p-network-information-gathering-and-attack-evaluations},
www_section = {Traffic analysis},
}
In the SIGCOMM 2016 August 22-26, Florianopolis, Brazil, August 2016.
PDF
@inproceedings{jeong2016,
title = {A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure},
author = {Seong Hoon Jeong and Ah Reum Kang and Joongheon Kim and Huy Kang Kim2 and Aziz
Mohaisen},
booktitle = {SIGCOMM 2016 August 22-26, Florianopolis, Brazil},
year = {2016},
month = {August},
www_pdf_url = {https://www.cs.ucf.edu/~mohaisen/doc/sigcomm16.pdf},
www_section = {Anonymous communication},
}
Forensic analysis of I2P activities
In the Proceedings of the 2016 22nd International Conference on Automation and Computing (ICAC), September 2016.
@inproceedings{wilson2016,
title = {Forensic analysis of I2P activities},
author = {Wilson, Maxim and Bazli, Behnam},
booktitle = {Proceedings of the 2016 22nd International Conference on Automation and
Computing (ICAC)},
year = {2016},
month = {September},
www_section = {Anonymous communication},
}
2015
In the Proceedings of Heuristic Algorithms and Distributed Computing, 2015, pages 49-56.
PDF
@inproceedings{orignal2015,
title = {A Transparent Implementation Of The Signature In Scheme EdDSA},
author = {Losev, V. I.},
booktitle = {Proceedings of Heuristic Algorithms and Distributed Computing},
year = {2015},
pages = {49--56},
www_section = {Formal methods},
www_pdf_url = {https://archive.org/download/HeuristicAlgorithmsAndDistributedComputing2015/tom2-nom4.pdf},
}
Media Technology, Leiden University Web Technology Report , 2015.
PDF
@techreport{astolfi2015,
title = {I2P - The Invisible Internet Project},
author = {Astolfi, Felipe and Kroese, Jelger and {Van Oorschot}, Jeroen},
institution = {Media Technology, Leiden University},
year = {2015},
type = {Web Technology Report},
www_section = {Anonymous communication},
www_pdf_url = {https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf},
}
In the Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, France, February 2015, pages 46-55.
PDF
@inproceedings{timpanaro:hal-01238453,
title = {{Evaluation of the Anonymous I2P Network's Design Choices Against Performance
and Security}},
author = {Timpanaro, Juan Pablo and Cholez, Thibault and Chrisment, Isabelle and Festor,
Olivier},
booktitle = {{Proceedings of the 1st International Conference on Information Systems
Security and Privacy (ICISSP 2015)}},
organization = {{SciTePress}},
year = {2015},
month = {February},
address = {Angers, France},
pages = {46--55},
hal_id = {hal-01238453},
doi = {10.5220/0005226600460055},
url = {https://hal.inria.fr/hal-01238453},
www_section = {Traffic analysis},
www_pdf_url = {https://hal.inria.fr/hal-01238453/file/I2P-design-vs-performance-security.pdf},
keywords = {I2P ; security ; DHT},
hal_version = {v1},
}
In International Journal of Science, Engineering and Technology Research 4(5), May 2015, pages 1454-1456.
PDF
@article{vashi2015,
title = {Performance Improvement in I2P using SSL},
author = {Vashi, Dipal and Khilari, Girish},
journal = {International Journal of Science, Engineering and Technology Research},
volume = {4},
number = {5},
year = {2015},
month = {May},
pages = {1454--1456},
www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1454-1456.pdf},
www_section = {Traffic analysis},
}
In International Journal of Science, Engineering and Technology Research 4(5), May 2015, pages 1515-1518.
PDF
@article{vhora2015,
title = {Defending Eclipse Attack in I2P using Structured Overlay Network},
author = {Vhora, Hasib and Khilari, Girish},
journal = {International Journal of Science, Engineering and Technology Research},
volume = {4},
number = {5},
year = {2015},
month = {May},
pages = {1515--1518},
www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1515-1518.pdf},
www_section = {Traffic analysis},
}
2014
CDC Publication, 2014.
PDF
@misc{tchabe2014,
title = {Anonymous Communications: A survey on I2P},
author = {Tchabe, Gildas Nya and Xu, Yinhua},
year = {2014},
howpublished = {CDC Publication},
www_section = {Traffic analysis},
www_pdf_url = {https://www.cdc.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Lehre/SS13/Seminar/CPS/cps2014_submission_4.pdf},
}
In International Journal of Engineering Development and Research 3(1), 2014, pages 99-102.
PDF
@article{vashi2014,
title = {A Survey on I2P Crypto Mechanism},
author = {Vashi, Dipal and Khilari, Girish},
journal = {International Journal of Engineering Development and Research},
volume = {3},
number = {1},
year = {2014},
pages = {99--102},
www_pdf_url = {https://www.ijedr.org/papers/IJEDR1501021.pdf},
www_section = {Traffic analysis},
}
A Comprehensive Behavior Analysis of TOR versus I2P
In International Journal of Applied Engineering Research 9(20), 2014, pages 7333-7345.
@article{karthigeyan2014,
title = {A Comprehensive Behavior Analysis of TOR versus I2P},
author = {Karthigeyan, A. and {Robinson Joel}, M. and Manikandan, S. P. and {Raja Guru},
P. and Raman, Sri},
journal = {International Journal of Applied Engineering Research},
volume = {9},
number = {20},
year = {2014},
pages = {7333--7345},
www_section = {Traffic analysis},
}
In the Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP 2014), 2014.
PDF
@inproceedings{conrad2014,
title = {A Survey on Tor and I2P},
author = {Bernd Conrad and Fatemeh Shirazi},
booktitle = {Proceedings of the 9th International Conference on Internet Monitoring and
Protection (ICIMP 2014)},
year = {2014},
www_section = {Anonymous communication},
www_pdf_url = {/docs/historical/icimp_2014_1_40_30015.pdf},
keywords = {Tor; I2P; low latency anonymous communication networks},
abstract = {{This paper gives a short introduction and a comparison on two low-latency
anonymous communication networks. The main part features a review of the low
latency anonymous communication networks, namely, The Onion Routing (Tor) and the
Invisible Internet Project (I2P). An introduction to their overall structure is
given, followed by a detailed description of the core parts of both networks.
Furthermore, a comparison of both will feature important aspects like node
selection, performance and scalability. The detailed description and comparison
of the two systems show that determining which system to use highly depends on
the field of application, since each system has its strength and weaknesses in
specific areas.}},
}
In the Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS), March 2014, pages 1-5.
PDF
@inproceedings{timpanaro2014,
title = {Group-Based Characterization for the I2P Anonymous File-Sharing Environment},
author = {Timpanaro, J.P. and Chrisment, I and Festor, O.},
booktitle = {Proceedings of the 6th International Conference on New Technologies,
Mobility and Security (NTMS)},
year = {2014},
month = {March},
pages = {1--5},
doi = {10.1109/NTMS.2014.6814020},
www_section = {Traffic analysis},
abstract = {{The I2P network provides an abstraction layer allowing two parties to
communicate in an anonymous manner. This network is optimised for anonymous web
hosting and anonymous file-sharing. I2P's file- sharing community is highly
active where users deploy their file-sharing applications on top of the network.
I2P uses a variation of Onion routing, thus assuring the unlinkability between a
user and its file-sharing application. In this paper, we take the first step
towards the linkability of users and applications in the I2P network. We conduct
a group-based characterisation, where we determine to what extent a group of
users is responsible for the overall I2P's file-sharing activity. We used
Pearson's coefficient to correlate users from two cities and the most used
anonymous file-sharing application. We determine that two cities explain more
than a third of all file-sharing activity within the I2P network.}},
www_pdf_url = {https://hal.inria.fr/hal-00986228/file/NTMS_Paper.pdf},
keywords = {Internet;data privacy;groupware;peer-to-peer computing;I2P anonymous
file-sharing environment;I2P network;Invisible Internet Project;Onion
routing;Pearsons coefficient;abstraction layer;anonymous Web hosting;anonymous
file-sharing application;file-sharing activity;group-based
characterisation;user-application linkability;Cities and
towns;Correlation;Distributed databases;IP networks;Internet;Monitoring;Privacy},
}
In Journal of Networks 9(9), September 2014, pages 2269-2278.
PDF
@article{liu2014,
title = {Empirical Measurement and Analysis of I2P Routers},
author = {Peipeng Liu et al},
journal = {Journal of Networks},
volume = {9},
number = {9},
year = {2014},
month = {September},
pages = {2269--2278},
www_pdf_url = {https://pdfs.semanticscholar.org/3e5f/2b136df32beef1281b6b2f206093806c57f6.pdf},
www_section = {Traffic analysis},
}
2013
Towards Measurement on the I2P Network
In Applied Mechanics and Materials 427-429, September 2013, pages 2223-2228.
@article{wang2013,
title = {Towards Measurement on the I2P Network},
author = {Xue Bin Wang and Pei Peng Liu and Cheng Long Li and Qing Feng Tan},
journal = {Applied Mechanics and Materials},
volume = {427--429},
year = {2013},
month = {September},
pages = {2223--2228},
www_section = {Traffic analysis},
}
In the Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013), October 2013.
PDF
@inproceedings{egger2013:practical-attacks,
title = {Practical Attacks Against the I2P Network},
author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni
Vigna},
booktitle = {Proceedings of the 16th International Symposium on Research in Attacks,
Intrusions and Defenses (RAID 2013)},
year = {2013},
month = {October},
www_pdf_url = {http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf},
www_tags = {selected},
www_section = {Traffic analysis},
}
2012
In the Proceedings of the 4th International Workshop on Traffic Monitoring and Analysis (TMA 2012), Vienne, Austria, March 2012.
PDF
@inproceedings{timpanaro:hal-00744902,
title = {{I2P's Usage Characterization}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
booktitle = {{Proceedings of the 4th International Workshop on Traffic Monitoring and
Analysis (TMA 2012)}},
year = {2012},
month = {March},
address = {Vienne, Austria},
hal_id = {hal-00744902},
language = {English},
url = {http://hal.inria.fr/hal-00744902},
abstract = {{We present the first monitoring study aiming to characterize the usage of
the I2P network, a low-latency anonymous network based on garlic routing. We
design a distributed monitoring architecture for the I2P network and show through
three one-week measurement experiments the ability of the system to identify a
significant number of all running applications, among web servers and
file-sharing clients. Additionally, we identify 37\% of published I2P
applications, which turn out to be unreachable after their publication on the I2P
distributed database.}},
www_section = {Traffic analysis},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
audience = {international},
www_pdf_url = {http://hal.inria.fr/hal-00744902/PDF/TMA2012-LNCS.pdf},
}
In Journal of Network and Computer Applications 35(5), September 2012, pages 1473-1492.
PDF
@article{ruiz2012,
title = {A survey on solutions and main free tools for privacy enhancing Web
communications},
author = {A Ruiz-Mart{\'i}nez},
journal = {Journal of Network and Computer Applications},
volume = {35},
number = {5},
year = {2012},
month = {September},
pages = {1473--1492},
www_pdf_url = {http://www.freehaven.net/anonbib/cache/Ruiz-Martinez_2012.pdf},
www_section = {Anonymous communication},
}
In the Proceedings of the 6th International Conference on Network and System Security, Wu Yi Shan, China, November 2012.
PDF
@inproceedings{timpanaro:hal-00744919,
title = {{A Bird's Eye View on the I2P Anonymous File-sharing Environment}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
booktitle = {{Proceedings of the 6th International Conference on Network and System
Security}},
year = {2012},
month = {November},
address = {Wu Yi Shan, China},
hal_id = {hal-00744919},
language = {English},
url = {http://hal.inria.fr/hal-00744919},
abstract = {{Anonymous communications have been gaining more and more interest from
Internet users as privacy and anonymity problems have emerged. Among anonymous
enabled services, anonymous file-sharing is one of the most active one and is
increasingly growing. Large scale monitoring on these systems allows us to grasp
how they behave, which type of data is shared among users, the overall behaviour
in the system. But does large scale monitoring jeopardize the system anonymity?
In this work we present the first large scale monitoring architecture and
experiments on the I2P network, a low-latency message-oriented anonymous network.
We characterize the file-sharing environment within I2P, and evaluate if this
monitoring affects the anonymity provided by the network. We show that most
activities within the network are file-sharing oriented, along with anonymous
web-hosting. We assess the wide geographical location of nodes and network
popularity. We also demonstrate that group-based profiling is feasible on this
particular network.}},
www_section = {Traffic analysis},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
audience = {international},
www_pdf_url = {http://hal.inria.fr/hal-00744919/PDF/A\_Birda\_s\_Eye\_View\_on\_the\_I2P\_Anonymous\_0AFile-sharing\_Environment\_0A.pdf},
keywords = {Large scale monitoring, I2P, Security risks, Anonymous file-sharing},
}
In the Proceedings of the 4th International Symposium on Cyberspace Safety and Security, Melbourne, Australia, December 2012, pages 77-92.
PDF
@inproceedings{timpanaro:hal-00744922,
title = {{Improving Content Availability in the I2P Anonymous File-Sharing Environment}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
booktitle = {{Proceedings of the 4th International Symposium on Cyberspace Safety and
Security}},
volume = {4},
year = {2012},
month = {December},
address = {Melbourne, Australia},
pages = {77--92},
publisher = {Springer},
hal_id = {hal-00744922},
doi = {10.1007/978-3-642-35362-8},
language = {English},
url = {http://hal.inria.fr/hal-00744922},
abstract = {{Anonymous communication has gained more and more interest from Internet
users as privacy and anonymity problems have emerged. Dedicated anonymous
networks such as Freenet and I2P allow anonymous file-sharing among users.
However, one major problem with anonymous file-sharing networks is that the
available content is highly reduced, mostly with outdated files, and
non-anonymous networks, such as the BitTorrent network, are still the major
source of content: we show that in a 30-days period, 21648 new torrents were
introduced in the BitTorrent community, whilst only 236 were introduced in the
anonymous I2P network, for four different categories of content. Therefore, how
can a user of these anonymous networks access this varied and non-anonymous
content without compromising its anonymity? In this paper, we improve content
availability in an anonymous environment by proposing the first internetwork
model allowing anonymous users to access and share content in large public
communities while remaining anonymous. We show that our approach can efficiently
interconnect I2P users and public BitTorrent swarms without affecting their
anonymity nor their performance. Our model is fully implemented and freely
usable.}},
www_section = {Anonymous communication},
affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA},
audience = {international},
www_pdf_url = {http://hal.inria.fr/hal-00744922/PDF/Improving\_Content\_Availability\_in\_the\_I2P\_0AAnonymous\_File-Sharing\_Environment\_0A.pdf},
}
2011
I2P Data Communication System
In the Proceedings of ICN 2011, The Tenth International Conference on Networks, St. Maarten, The Netherlands Antilles, January 2011.
@inproceedings{zantout2011,
title = {I2P Data Communication System},
author = {Bassam Zantout and Ramzi Haraty},
booktitle = {Proceedings of ICN 2011, The Tenth International Conference on Networks},
year = {2011},
month = {January},
location = {St. Maarten, The Netherlands Antilles},
www_section = {Traffic analysis},
}
In the Proceedings of Black Hat 2011, Washington, DC, January 2011.
PDF
@inproceedings{BlackHat2011-crenshaw,
title = {Darknets and hidden servers: Identifying the true IP/network identity of I2P
service hosts},
author = {Adrian Crenshaw},
booktitle = {Proceedings of Black Hat 2011},
year = {2011},
month = {January},
location = {Washington, DC},
url = {http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers},
www_pdf_url = {http://www.irongeek.com/downloads/Identifying%20the%20true%20IP%20of%20I2P%20service%20hosts.pdf},
www_section = {Traffic analysis},
}
Masters's thesis, TU-Munich, March 2011.
PDF
@mastersthesis{hermann2011-mthesis,
title = {Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A
Real-World Case Study using I2P},
author = {Michael Hermann},
school = {TU-Munich},
year = {2011},
month = {March},
www_section = {Traffic analysis},
www_pdf_url = {https://gnunet.org/sites/default/files/herrmann2011mt.pdf},
}
In the Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), Waterloo, Canada, July 2011.
PDF
@inproceedings{pets2011-i2p,
title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A
Real-World Case Study using I2P},
author = {Michael Herrmann and Christian Grothoff},
booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS
2011)},
year = {2011},
month = {July},
location = {Waterloo, Canada},
www_tags = {selected},
www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf},
www_section = {Traffic analysis},
}
Preprint, October 2011.
PDF
@misc{timpanaro:inria-00632259,
title = {{Monitoring the I2P network}},
author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier},
year = {2011},
month = {October},
howpublished = {Preprint},
hal_id = {inria-00632259},
language = {English},
url = {http://hal.inria.fr/inria-00632259},
abstract = {{We present the first monitoring study aiming to characterize the usage of
the I2P network, a low-latency anonymous network based on garlic routing. We
design a distributed monitoring architecture for the I2P network and we show
through a one week long experiment that we are able to identify 32\% of all
running applications, among web servers and file- sharing clients. Additionally,
we identify 37\% of published I2P applications, which turn out to be unreachable
after its publication on the I2P distributed database.}},
affiliation = {MADYNES - INRIA Lorraine - LORIA},
www_pdf_url = {http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf},
www_section = {Traffic analysis},
}
Seminar, Humboldt University of Berlin, November 2011.
PDF
@misc{ehlert2011:usability-comparison-i2p-tor,
title = {I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison},
author = {Mathias Ehlert},
year = {2011},
month = {November},
howpublished = {Seminar, Humboldt University of Berlin},
www_section = {Anonymous communication},
www_pdf_url = {https://www.freehaven.net/anonbib/cache/ehlert2011:usability-comparison-i2p-tor.pdf},
}
2009
L'émergence au sein d'internet de communautés virtuelles et anonymes, Freenet et i2p
Masters's thesis, Université catholique de Louvain - Département des sciences politiques et sociales, 2009.
@mastersthesis{delmer-mthesis,
title = {L'{\'e}mergence au sein d'internet de communaut{\'e}s virtuelles et anonymes,
Freenet et i2p},
author = {Laurie Delmer},
school = {Universit{\'e} catholique de Louvain - D{\'e}partement des sciences politiques
et sociales},
year = {2009},
note = {Title : The rise in internet virtual and anonymous communities, Freenet and I2P.
School: Catholic University of Leuven - Department of Political and Social
Science},
www_section = {Anonymous communication},
}
In the Proceedings of PET-CON 2009.1, Dresden, Germany, March 2009, pages 49-58.
PDF
@inproceedings{petcon2009-schomburg,
title = {Anonymity Techniques - Usability Tests of Major Anonymity Networks},
author = {Jens Schomburg},
booktitle = {Proceedings of PET-CON 2009.1},
year = {2009},
month = {March},
location = {Dresden, Germany},
pages = {49--58},
www_section = {Anonymous communication},
www_pdf_url = {https://people.torproject.org/~karsten/petcon-proceedings-2009.1.pdf},
}
In the Proceedings of PET-CON 2009.1, Dresden, Germany, March 2009, pages 59-70.
PDF
@inproceedings{petcon2009-zzz,
title = {Peer Profiling and Selection in the I2P Anonymous Network},
author = {zzz (Pseudonym) and Lars Schimmer},
booktitle = {Proceedings of PET-CON 2009.1},
year = {2009},
month = {March},
location = {Dresden, Germany},
pages = {59--70},
www_section = {Anonymous communication},
www_pdf_url = {/docs/historical/I2P-PET-CON-2009.1.pdf},
}
In the Proceedings of the World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS '09), August 2009, pages 100-109.
PDF
@inproceedings{abou-tair2009,
title = {Usability Inspection of Anonymity Networks},
author = {Abou-Tair, D.e.I. and Pimenidis, L. and Schomburg, J. and Westermann, B.},
booktitle = {Proceedings of the World Congress on Privacy, Security, Trust and the
Management of e-Business (CONGRESS '09)},
year = {2009},
month = {August},
pages = {100--109},
doi = {10.1109/CONGRESS.2009.38},
www_section = {Anonymous communication},
abstract = {{Today, to be monitored while surfing the web seems to be a natural act and
thus tools and applications to achieve online anonymity are more important than
ever. The usability of such a tool plays not only a prominent role for each
single user; in the area of anonymization networks it usually holds that the
protection for every single user is higher, the more users participate. Hence,
usability is of great importance, since bad usability decreases the number of
potential users. In this paper we examine the usability of four software
implementations for anonymous communication techniques especially with regards to
the installation procedure. The usability is evaluated with the help of cognitive
walk-throughs. We also inspect the quality of service of these implementations by
means of a performance test.}},
www_pdf_url = {https://www.researchgate.net/publication/224084986_Usability_Inspection_of_Anonymity_Networks},
keywords = {Internet;security of data;anonymity networks;anonymization networks;anonymous
communication techniques;cognitive walk-throughs;installation;quality of
service;software implementations;usability inspection;Communication system
security;Inspection;Monitoring;Operating systems;Privacy;Quality
management;Quality of service;System testing;Technology
management;Usability;AN.ON;Anonymity;HCI;JAP;JonDo;JondoNym;Tor;Usability},
}