Privacy-Implications Of Performance-Based Peer Selection By Onion-Routers: A Real-World Case Study Using I2p

Springer eBooks(2011)

引用 30|浏览27
暂无评分
摘要
I2P is one of the most widely used anonymizing Peer-to-Peer networks on the Internet today. Like Tor, it uses onion routing to build tunnels between peers as the basis for providing anonymous communication channels. Unlike Tor, I2P integrates a range of anonymously hosted services directly with the platform. This paper presents a new attack on the I2P Peer-to-Peer network, with the goal of determining the identity of peers that are anonymously hosting HTTP services (Eepsite) in the network.Key design choices made by I2P developers, in particular performance-based peer selection, enable a sophisticated adversary with modest resources to break key security assumptions. Our attack first obtains an estimate of the victim's view of the network. Then, the adversary selectively targets a small number of peers used by the victim with a denial-of-service attack while giving the victim the opportunity to replace those peers with other peers that are controlled by the adversary. Finally, the adversary performs some simple measurements to determine the identity of the peer hosting the service.This paper provides the necessary background on I2P, gives details on the attack including experimental data from measurements against the actual I2P network and discusses possible solutions.
更多
查看译文
关键词
Tunnel Construction, Exit Node, Malicious Peer, Monitor Node, USENIX Security Symposium
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要