Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2934872.2960423acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
short-paper
Free access

A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure

Published: 22 August 2016 Publication History
  • Get Citation Alerts
  • Abstract

    The Invisible Internet Project (I2P) is an overlay network that provides secure and anonymous communication channels. EepSites are the anonymous websites hosted in the I2P network. To access the eepSites, DNS requests of a domain name suffixed with the {\sf .i2p} pseudo top-level domain (TLD) are routed within the I2P network. However, not only that {\sf .i2p} queries are leaking in the public DNS infrastructure, but also such leakage has various plausible root causes and implications that are different from other related leakage. In this paper, we analyze the leaked {\sf .i2p} requests captured in the A and J root name servers of the public DNS, showing that a large number of queries are observed and outlining various potential directions of addressing such leakage.

    References

    [1]
    A. Crenshaw. Common darknet weaknesses: DNS leaks and application level problems. http://bit.ly/1TetH8w, 2014.
    [2]
    R. Dingledine, N. Mathewson, and P. F. Syverson. Tor: The second-generation onion router. In USENIX Security, 2004.
    [3]
    M. Herrmann and C. Grothoff. Privacy-implications of performance-based peer selection by onion-routers: a real-world case study using I2P. In PETS, 2011.
    [4]
    M. Thomas and A. Mohaisen. Measuring the leakage of onion at the root. In ACM WPES, 2014.
    [5]
    R. Tokazowski. Phishme: Dyre attackers shift tactics. http://phishme.com/dyre-attackers-shift-tactics, 2014.

    Cited By

    View all
    • (2018)An Empirical Study of the I2P Anonymity Network and its Censorship ResistanceProceedings of the Internet Measurement Conference 201810.1145/3278532.3278565(379-392)Online publication date: 31-Oct-2018
    • (2017)Does Query Blocking Improve DNS Privacy?Information Security Applications10.1007/978-3-319-56549-1_1(1-14)Online publication date: 30-Mar-2017

    Index Terms

    1. A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SIGCOMM '16: Proceedings of the 2016 ACM SIGCOMM Conference
        August 2016
        645 pages
        ISBN:9781450341936
        DOI:10.1145/2934872
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 22 August 2016

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. DNS
        2. I2P
        3. Network Analysis
        4. Privacy
        5. Security

        Qualifiers

        • Short-paper

        Conference

        SIGCOMM '16
        Sponsor:
        SIGCOMM '16: ACM SIGCOMM 2016 Conference
        August 22 - 26, 2016
        Florianopolis, Brazil

        Acceptance Rates

        SIGCOMM '16 Paper Acceptance Rate 39 of 231 submissions, 17%;
        Overall Acceptance Rate 462 of 3,389 submissions, 14%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)87
        • Downloads (Last 6 weeks)12
        Reflects downloads up to 10 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2018)An Empirical Study of the I2P Anonymity Network and its Censorship ResistanceProceedings of the Internet Measurement Conference 201810.1145/3278532.3278565(379-392)Online publication date: 31-Oct-2018
        • (2017)Does Query Blocking Improve DNS Privacy?Information Security Applications10.1007/978-3-319-56549-1_1(1-14)Online publication date: 30-Mar-2017

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media