Update I2P papers list

This commit is contained in:
str4d
2017-11-02 23:51:26 +00:00
parent 2146f41ced
commit 99235c7dee

View File

@@ -33,10 +33,71 @@
@string{lncs = "Lecture Notes in Computer Science"}
@phdthesis{shahbar2017-dthesis,
title = {Analysis of Multilayer-Encryption Anonymity Networks},
author = {Khalid Shahbar},
institution = {Dalhousie University},
year = {2017},
month = {October},
abstract = {{This thesis studies and analyzes multilayer-encryption anonymity networks.
Traffic flow analysis is employed to identify multilayer-encryption anonymity networks.
The analysis includes collecting data from the three most popular anonymity networks
(namely, Tor, JonDonym and I2P). The collected data (Anon17) is made publicly available
for researchers on the field. The study also includes proposing weighted factors to
quantify and measure the level of anonymity these networks could provide.}},
www_pdf_url = {https://dalspace.library.dal.ca/bitstream/handle/10222/73395/Shahbar-Khalid-PhD-CS-Oct-2017.pdf},
www_section = traffic,
}
@techreport{shahbar2017-dataset,
title = {Anon17: Network Traffic Dataset of Anonymity Services},
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
institution = {Dalhousie University},
year = {2017},
month = {March},
abstract = {{One of the difficulties that face researchers on the
anonymity networks field is the lack of anonymity dataset.
Researchers need to collect their data to conduct a research or to
use a simulated environment to collect the data they need. The
lack of such a dataset is due to the nature of the anonymity
networks. These anonymity networks aim to provide certain level
of privacy for the users. In this paper, we present Anon17, a
traffic flow dataset of different anonymity services. Anon17
specifically contains data collected from three anonymity
networks; Tor, JonDonym, and I2P.}},
keywords = {Dataset ; Tor ; I2P ; JonDonym ; Traffic Flow ; Anonymity},
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-03.pdf},
www_section = traffic,
}
@techreport{shahbar2017-measuring-anonymity-services,
title = {Weighted Factors for Measuring Anonymity Services: A Case Study on Tor, JonDonym, and I2P},
author = {Shahbar, Khalid and Zincir-Heywood, A. Nur},
institution = {Dalhousie University},
year = {2017},
month = {January},
abstract = {{There are many systems that provide anonymity
service for the users. Most of these systems work on the
separation between the users' identity and the final destination.
The level of anonymity these services provide affected by several
factors. Some of these factors are related to the design of the
anonymity service itself. Others are related to how the system is
used or what is the application/purpose the user wants to run
over the anonymity service. In this paper we: (i) propose five
factors that aim to measure the anonymity level from the user's
perspective; (ii) evaluate these factors on three anonymity
services, namely Tor, JonDonym, and I2P as case studies; and
(iii) present a mechanism to evaluate anonymity services based
on our factors and measure the level of anonymity.}},
keywords = {Anonymity Factors ; Metrics ; Tor ; I2P ; JonDonym},
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/CS-2017-01.pdf},
www_section = comm,
}
@inproceedings{shahbar2017:effects-shared-bandwidth,
title = {Effects of Shared Bandwidth on Anonymity of the I2P Network Users},
author = {Khalid Shahbar and A. Nur Zincir-Heywood},
booktitle = {38th IEEE Symposium on Security and Privacy Workshops, 2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017)},
booktitle = {Proceedings of the 38th IEEE Symposium on Security and Privacy Workshops, 2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017)},
year = {2017},
month = {May},
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-04.pdf},
@@ -46,7 +107,7 @@
@inproceedings{wilson2016,
title = {Forensic analysis of I2P activities},
author = {Wilson, Maxim and Bazli, Behnam},
booktitle = {2016 22nd International Conference on Automation and Computing (ICAC)},
booktitle = {Proceedings of the 2016 22nd International Conference on Automation and Computing (ICAC)},
year = {2016},
month = Sep,
www_section = comm,
@@ -73,7 +134,7 @@ possibilities on I2P.}},
@inproceedings{jeong2016,
title = {A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure},
author = {Seong Hoon Jeong et al},
booktitle = {SIGCOMM '16 Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
booktitle = {Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
year = {2016},
month = Aug,
abstract = {{The Invisible Internet Project (I2P) is an overlay network
@@ -92,7 +153,7 @@ various potential directions of addressing such leakage.}},
keywords = {I2P, DNS, privacy, security, network analysis},
www_section = traffic,
www_pdf_url = {https://www.cse.buffalo.edu/~mohaisen/doc/16-sigcomm.pdf},
pages = {557-558},
pages = {557--558},
}
@article{haughey2016,
@@ -110,7 +171,7 @@ various potential directions of addressing such leakage.}},
@inproceedings{ali2016,
title = {TOR vs I2P: A Comparative Study},
author = {Ali, Afzaal and Khan, Maria and Saddique, Muhammad and Pirzada, Umar and Zohaib, Muhammad and Ahmad, Imran and Debnath, Narayan},
booktitle = {2016 IEEE International Conference on Industrial Technology (ICIT)},
booktitle = {Proceedings of the 2016 IEEE International Conference on Industrial Technology (ICIT)},
year = {2016},
month = Mar,
www_section = traffic,
@@ -123,6 +184,7 @@ various potential directions of addressing such leakage.}},
institution = {Media Technology, Leiden University},
year = {2015},
www_pdf_url = {https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf},
www_section = comm
}
@article{vashi2015,
@@ -155,10 +217,10 @@ various potential directions of addressing such leakage.}},
title = {{Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security}},
author = {Timpanaro, Juan Pablo and Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier},
url = {https://hal.inria.fr/hal-01238453},
booktitle = {{ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy}},
booktitle = {{Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015)}},
address = {Angers, France},
organization = {{SciTePress}},
pages = {46-55},
pages = {46--55},
year = {2015},
month = Feb,
doi = {10.5220/0005226600460055},
@@ -211,6 +273,7 @@ various potential directions of addressing such leakage.}},
volume = {9},
number = {9},
pages = {2269--2278},
www_pdf_url = {https://pdfs.semanticscholar.org/3e5f/2b136df32beef1281b6b2f206093806c57f6.pdf}
www_section = traffic,
}
@@ -248,6 +311,7 @@ networks},
abstract={{The I2P network provides an abstraction layer allowing two parties to communicate in an anonymous manner. This network is optimised for anonymous web hosting and anonymous file-sharing. I2P's file- sharing community is highly active where users deploy their file-sharing applications on top of the network. I2P uses a variation of Onion routing, thus assuring the unlinkability between a user and its file-sharing application. In this paper, we take the first step towards the linkability of users and applications in the I2P network. We conduct a group-based characterisation, where we determine to what extent a group of users is responsible for the overall I2P's file-sharing activity. We used Pearson's coefficient to correlate users from two cities and the most used anonymous file-sharing application. We determine that two cities explain more than a third of all file-sharing activity within the I2P network.}},
keywords={Internet;data privacy;groupware;peer-to-peer computing;I2P anonymous file-sharing environment;I2P network;Invisible Internet Project;Onion routing;Pearsons coefficient;abstraction layer;anonymous Web hosting;anonymous file-sharing application;file-sharing activity;group-based characterisation;user-application linkability;Cities and towns;Correlation;Distributed databases;IP networks;Internet;Monitoring;Privacy},
doi={10.1109/NTMS.2014.6814020},
www_pdf_url = {https://hal.inria.fr/hal-00986228/file/NTMS_Paper.pdf}
www_section = traffic,
}