Monitoring an anonymity network: Toward the deanonymization of hidden services

被引:1
作者
Simioni, Marco [1 ,2 ]
Gladyshev, Pavel [1 ]
Habibnia, Babak [1 ]
de Souza, Paulo Roberto Nunes [3 ]
机构
[1] Univ Coll Dublin, Digital Forens Investigat Res Lab, Dublin, Ireland
[2] IBM Res Europe, Dublin, Ireland
[3] Univ Fed Espirito Santo, Dept Comp, Vitoria, ES, Brazil
来源
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION | 2021年 / 38卷
关键词
Anonymity networks; i2p; Tor; Deanonymization;
D O I
10.1016/j.fsidi.2021.301135
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymity networks are an example of Privacy Enhancing Technology (PET) whose historical goal is to avoid censorship, preserve users privacy, and promote freedom of speech. Such networks, however, also provide a "safe haven" for criminal activity: previous research observed a dominance of commerce platforms delivered as hidden services within The Onion Router (Tor) network, undoubtedly the most popular anonymization technology at the time of writing, largely around narcotics and illegal financial services. Extensive research has been conducted on locating hidden services on the Tor network, but a general method that is able, given a service delivered via anonymity network, to effectively produce a list of candidate nodes responsible for delivering the service still remains an open research problem. In this paper we describe the infrastructure we have designed and implemented for monitoring the Invisible Internet Project (I2P) network, which is a smaller scale anonymity network compared to Tor but already proven to be used for illicit activities, and how its output can be used to enable such general method. (c) 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:9
相关论文
共 21 条
[1]  
[Anonymous], 2006, HOT NOT REVEALING HI, DOI DOI 10.1145/1180405.1180410
[2]  
[Anonymous], GITHUB REPOSITORY I2
[3]  
[Anonymous], EMPIRICAL STUDY I2P
[4]  
[Anonymous], ALPINE MINIMAL DOCKE
[5]  
Back Adam., 2001, Information Hiding, volume 2137 of Lecture Notes in Computer Science, V2137, P245, DOI DOI 10.1007/3-540-45496-9_18
[6]   Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization [J].
Biryukov, Alex ;
Pustogarov, Ivan ;
Weinmann, Ralf-Philipp .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :80-94
[7]   EdgeNet: A Global Cloud That Spreads by Local Action [J].
Cappos, Justin ;
Hemmings, Matthew ;
McGeer, Rick ;
Rafetseder, Albert ;
Ricart, Glenn .
2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, :359-360
[8]   Criminal motivation on the dark web: A categorisation model for law enforcement [J].
Dalins, Janis ;
Wilson, Campbell ;
Carman, Mark .
DIGITAL INVESTIGATION, 2018, 24 :62-71
[9]  
Dingledine R., 2004, USENIX ASS P 13 USEN, V13, P21
[10]  
Elices JA, 2013, IEEE CONF COMM NETW, P385, DOI 10.1109/CNS.2013.6682740