Privacy-implications of performance-based peer selection by onion-routers: a real-world case study using I2P
M Herrmann, C Grothoff - … Symposium, PETS 2011, Waterloo, ON, Canada …, 2011 - Springer
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011•Springer
I2P is one of the most widely used anonymizing Peer-to-Peer networks on the Internet today.
Like Tor, it uses onion routing to build tunnels between peers as the basis for providing
anonymous communication channels. Unlike Tor, I2P integrates a range of anonymously
hosted services directly with the platform. This paper presents a new attack on the I2P Peer-
to-Peer network, with the goal of determining the identity of peers that are anonymously
hosting HTTP services (Eepsite) in the network. Key design choices made by I2P …
Like Tor, it uses onion routing to build tunnels between peers as the basis for providing
anonymous communication channels. Unlike Tor, I2P integrates a range of anonymously
hosted services directly with the platform. This paper presents a new attack on the I2P Peer-
to-Peer network, with the goal of determining the identity of peers that are anonymously
hosting HTTP services (Eepsite) in the network. Key design choices made by I2P …
Abstract
I2P is one of the most widely used anonymizing Peer-to-Peer networks on the Internet today. Like Tor, it uses onion routing to build tunnels between peers as the basis for providing anonymous communication channels. Unlike Tor, I2P integrates a range of anonymously hosted services directly with the platform. This paper presents a new attack on the I2P Peer-to-Peer network, with the goal of determining the identity of peers that are anonymously hosting HTTP services (Eepsite) in the network.
Key design choices made by I2P developers, in particular performance-based peer selection, enable a sophisticated adversary with modest resources to break key security assumptions. Our attack first obtains an estimate of the victim’s view of the network. Then, the adversary selectively targets a small number of peers used by the victim with a denial-of-service attack while giving the victim the opportunity to replace those peers with other peers that are controlled by the adversary. Finally, the adversary performs some simple measurements to determine the identity of the peer hosting the service.
This paper provides the necessary background on I2P, gives details on the attack — including experimental data from measurements against the actual I2P network — and discusses possible solutions.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果