Results 141 to 150 of about 6,802 (157)
Some of the next articles are maybe not open access.
Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020In recent years, more and more anonymous network have been developed. Since user's identity is difficult to trace in anonymous networks, many illegal activities are carried out in darknet. In this paper, we propose a hierarchical classifier of darknet traffic which can distinguish four types of darknet(Tor, I2P, ZeroNet, Freenet) and 25 darknet users ...
Yuzong Hu, Futai Zou, Linsen Li, Ping Yi
openaire +1 more source
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)
IEEE Transactions on Dependable and Secure Computing, 2020Traffic Classification (TC) is an important tool for several tasks, applied in different fields (security, management, traffic engineering, R&D). This process is impaired or prevented by privacy-preserving protocols and tools, that encrypt the communication content, and (in case of anonymity tools ) additionally hide the source, the destination, and ...
Pescape, Antonio +3 more
openaire +2 more sources
Large-scale discovery and empirical analysis for I2P eepSites
2017 IEEE Symposium on Computers and Communications (ISCC), 2017I2P is a widely used low-latency anonymous network that provides privacy to service providers, such as anonymous web services called eepSites. The large-scale discovery of eepSites allows us to grasp their size, content and popularity. In this paper, three approaches were proposed to discover eepSites: (1) running floodfill routers, (2) gathering hosts.
null Yue Gao +4 more
openaire +1 more source
Anonymizing Communication in VANets by Applying I2P Mechanisms
2019 IEEE Global Communications Conference (GLOBECOM), 2019Anonymizing communication becomes a substantial issue to enhance security and facing attacks. Huge researches are made in this field aiming to ensure a secure and anonymous communication. In vehicular ad hoc networks (VANets), this concept is used in different application areas like military domains, in which hiding destinations identities is necessary
Diab, Tayeb +3 more
openaire +2 more sources
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
2017 29th International Teletraffic Congress (ITC 29), 2017Traffic classification, i.e. associating network traffic to the application that generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D). This process is challenged by applications that preserve Internet users' privacy by encrypting the communication content, and even more by ...
Montieri, Antonio +3 more
openaire +2 more sources
I2P Anonymous Communication Network Measurement and Analysis
2019The I2P (Invisible Internet Project) network is a low-latency anonymous network composed of I2P routers based on garlic routing, which is mainly to protect privacy and prevent tracking, such as evading censorship and hiding whistle-blowers. As opposed to well-known and well-research Tor network, I2P aims to organize itself and distribute its anonymity.
Likun Liu +4 more
openaire +1 more source
Effects of Shared Bandwidth on Anonymity of the I2P Network Users
2017 IEEE Security and Privacy Workshops (SPW), 2017In this paper, we explored what could be achieved by a potential attacker on the I2P Network in terms of application and user profiling. In both cases, the effect of bandwidth sharing and participation have been analyzed. To explore this, we used a machine learning based approach to analyze the flows extracted from the traffic generated by the ...
Khalid Shahbar, A. Nur Zincir-Heywood
openaire +1 more source
Mapping I2P: Dataset Collection from a Location-based Perspective
Akanbi, Kemi +2 more
openaire +1 more source

