Abstract:
In this paper, we explored what could be achieved by a potential attacker on the I2P Network in terms of application and user profiling. In both cases, the effect of band...Show MoreMetadata
Abstract:
In this paper, we explored what could be achieved by a potential attacker on the I2P Network in terms of application and user profiling. In both cases, the effect of bandwidth sharing and participation have been analyzed. To explore this, we used a machine learning based approach to analyze the flows extracted from the traffic generated by the applications and the users. Our results show that profiling the users and applications on the I2P network is possible. The amount of shared bandwidth has an effect on the accuracy of profiling the users and the applications. Furthermore, applications that do not use the shared clients tunnels increases the possibility to profile the behavior of the flows.
Published in: 2017 IEEE Security and Privacy Workshops (SPW)
Date of Conference: 25-25 May 2017
Date Added to IEEE Xplore: 21 December 2017
ISBN Information: