forked from I2P_Developers/i2p.www
Update I2P papers list
This commit is contained in:
@@ -33,10 +33,71 @@
|
||||
|
||||
@string{lncs = "Lecture Notes in Computer Science"}
|
||||
|
||||
@phdthesis{shahbar2017-dthesis,
|
||||
title = {Analysis of Multilayer-Encryption Anonymity Networks},
|
||||
author = {Khalid Shahbar},
|
||||
institution = {Dalhousie University},
|
||||
year = {2017},
|
||||
month = {October},
|
||||
abstract = {{This thesis studies and analyzes multilayer-encryption anonymity networks.
|
||||
Traffic flow analysis is employed to identify multilayer-encryption anonymity networks.
|
||||
The analysis includes collecting data from the three most popular anonymity networks
|
||||
(namely, Tor, JonDonym and I2P). The collected data (Anon17) is made publicly available
|
||||
for researchers on the field. The study also includes proposing weighted factors to
|
||||
quantify and measure the level of anonymity these networks could provide.}},
|
||||
www_pdf_url = {https://dalspace.library.dal.ca/bitstream/handle/10222/73395/Shahbar-Khalid-PhD-CS-Oct-2017.pdf},
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@techreport{shahbar2017-dataset,
|
||||
title = {Anon17: Network Traffic Dataset of Anonymity Services},
|
||||
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
|
||||
institution = {Dalhousie University},
|
||||
year = {2017},
|
||||
month = {March},
|
||||
abstract = {{One of the difficulties that face researchers on the
|
||||
anonymity networks field is the lack of anonymity dataset.
|
||||
Researchers need to collect their data to conduct a research or to
|
||||
use a simulated environment to collect the data they need. The
|
||||
lack of such a dataset is due to the nature of the anonymity
|
||||
networks. These anonymity networks aim to provide certain level
|
||||
of privacy for the users. In this paper, we present Anon17, a
|
||||
traffic flow dataset of different anonymity services. Anon17
|
||||
specifically contains data collected from three anonymity
|
||||
networks; Tor, JonDonym, and I2P.}},
|
||||
keywords = {Dataset ; Tor ; I2P ; JonDonym ; Traffic Flow ; Anonymity},
|
||||
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-03.pdf},
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@techreport{shahbar2017-measuring-anonymity-services,
|
||||
title = {Weighted Factors for Measuring Anonymity Services: A Case Study on Tor, JonDonym, and I2P},
|
||||
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
|
||||
institution = {Dalhousie University},
|
||||
year = {2017},
|
||||
month = {January},
|
||||
abstract = {{There are many systems that provide anonymity
|
||||
service for the users. Most of these systems work on the
|
||||
separation between the users' identity and the final destination.
|
||||
The level of anonymity these services provide affected by several
|
||||
factors. Some of these factors are related to the design of the
|
||||
anonymity service itself. Others are related to how the system is
|
||||
used or what is the application/purpose the user wants to run
|
||||
over the anonymity service. In this paper we: (i) propose five
|
||||
factors that aim to measure the anonymity level from the user's
|
||||
perspective; (ii) evaluate these factors on three anonymity
|
||||
services, namely Tor, JonDonym, and I2P as case studies; and
|
||||
(iii) present a mechanism to evaluate anonymity services based
|
||||
on our factors and measure the level of anonymity.}},
|
||||
keywords = {Anonymity Factors ; Metrics ; Tor ; I2P ; JonDonym},
|
||||
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/CS-2017-01.pdf},
|
||||
www_section = comm,
|
||||
}
|
||||
|
||||
@inproceedings{shahbar2017:effects-shared-bandwidth,
|
||||
title = {Effects of Shared Bandwidth on Anonymity of the I2P Network Users},
|
||||
author = {Khalid Shahbar and A. Nur Zincir-Heywood},
|
||||
booktitle = {38th IEEE Symposium on Security and Privacy Workshops, 2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017)},
|
||||
booktitle = {Proceedings of the 38th IEEE Symposium on Security and Privacy Workshops, 2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017)},
|
||||
year = {2017},
|
||||
month = {May},
|
||||
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-04.pdf},
|
||||
@@ -46,7 +107,7 @@
|
||||
@inproceedings{wilson2016,
|
||||
title = {Forensic analysis of I2P activities},
|
||||
author = {Wilson, Maxim and Bazli, Behnam},
|
||||
booktitle = {2016 22nd International Conference on Automation and Computing (ICAC)},
|
||||
booktitle = {Proceedings of the 2016 22nd International Conference on Automation and Computing (ICAC)},
|
||||
year = {2016},
|
||||
month = Sep,
|
||||
www_section = comm,
|
||||
@@ -73,7 +134,7 @@ possibilities on I2P.}},
|
||||
@inproceedings{jeong2016,
|
||||
title = {A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure},
|
||||
author = {Seong Hoon Jeong et al},
|
||||
booktitle = {SIGCOMM '16 Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
|
||||
booktitle = {Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
|
||||
year = {2016},
|
||||
month = Aug,
|
||||
abstract = {{The Invisible Internet Project (I2P) is an overlay network
|
||||
@@ -92,7 +153,7 @@ various potential directions of addressing such leakage.}},
|
||||
keywords = {I2P, DNS, privacy, security, network analysis},
|
||||
www_section = traffic,
|
||||
www_pdf_url = {https://www.cse.buffalo.edu/~mohaisen/doc/16-sigcomm.pdf},
|
||||
pages = {557-558},
|
||||
pages = {557--558},
|
||||
}
|
||||
|
||||
@article{haughey2016,
|
||||
@@ -110,7 +171,7 @@ various potential directions of addressing such leakage.}},
|
||||
@inproceedings{ali2016,
|
||||
title = {TOR vs I2P: A Comparative Study},
|
||||
author = {Ali, Afzaal and Khan, Maria and Saddique, Muhammad and Pirzada, Umar and Zohaib, Muhammad and Ahmad, Imran and Debnath, Narayan},
|
||||
booktitle = {2016 IEEE International Conference on Industrial Technology (ICIT)},
|
||||
booktitle = {Proceedings of the 2016 IEEE International Conference on Industrial Technology (ICIT)},
|
||||
year = {2016},
|
||||
month = Mar,
|
||||
www_section = traffic,
|
||||
@@ -123,6 +184,7 @@ various potential directions of addressing such leakage.}},
|
||||
institution = {Media Technology, Leiden University},
|
||||
year = {2015},
|
||||
www_pdf_url = {https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf},
|
||||
www_section = comm
|
||||
}
|
||||
|
||||
@article{vashi2015,
|
||||
@@ -155,10 +217,10 @@ various potential directions of addressing such leakage.}},
|
||||
title = {{Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security}},
|
||||
author = {Timpanaro, Juan Pablo and Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier},
|
||||
url = {https://hal.inria.fr/hal-01238453},
|
||||
booktitle = {{ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy}},
|
||||
booktitle = {{Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015)}},
|
||||
address = {Angers, France},
|
||||
organization = {{SciTePress}},
|
||||
pages = {46-55},
|
||||
pages = {46--55},
|
||||
year = {2015},
|
||||
month = Feb,
|
||||
doi = {10.5220/0005226600460055},
|
||||
@@ -211,6 +273,7 @@ various potential directions of addressing such leakage.}},
|
||||
volume = {9},
|
||||
number = {9},
|
||||
pages = {2269--2278},
|
||||
www_pdf_url = {https://pdfs.semanticscholar.org/3e5f/2b136df32beef1281b6b2f206093806c57f6.pdf}
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@@ -248,6 +311,7 @@ networks},
|
||||
abstract={{The I2P network provides an abstraction layer allowing two parties to communicate in an anonymous manner. This network is optimised for anonymous web hosting and anonymous file-sharing. I2P's file- sharing community is highly active where users deploy their file-sharing applications on top of the network. I2P uses a variation of Onion routing, thus assuring the unlinkability between a user and its file-sharing application. In this paper, we take the first step towards the linkability of users and applications in the I2P network. We conduct a group-based characterisation, where we determine to what extent a group of users is responsible for the overall I2P's file-sharing activity. We used Pearson's coefficient to correlate users from two cities and the most used anonymous file-sharing application. We determine that two cities explain more than a third of all file-sharing activity within the I2P network.}},
|
||||
keywords={Internet;data privacy;groupware;peer-to-peer computing;I2P anonymous file-sharing environment;I2P network;Invisible Internet Project;Onion routing;Pearsons coefficient;abstraction layer;anonymous Web hosting;anonymous file-sharing application;file-sharing activity;group-based characterisation;user-application linkability;Cities and towns;Correlation;Distributed databases;IP networks;Internet;Monitoring;Privacy},
|
||||
doi={10.1109/NTMS.2014.6814020},
|
||||
www_pdf_url = {https://hal.inria.fr/hal-00986228/file/NTMS_Paper.pdf}
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user