Skip to main content

Modeling the Invisible Internet

  • Conference paper
  • First Online:
Complex Networks & Their Applications XII (COMPLEX NETWORKS 2023)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1143))

Included in the following conference series:

  • 836 Accesses

Abstract

Understanding the properties of anonymity networks such as the Invisible Internet Project (Garlic router) and Tor (Onion router) is critical for the future of cybersecurity, cyberwarfare and Internet freedom. In this paper, we theoretically model the Invisible Internet and provide the preliminary components for developing a theoretical lens that can be used to address its open questions. Additionally, this work lays the theoretical foundation for studying I2P’s key network properties such as resilience, anonymity and minimum attackers/routers ratio to exploit the network. The model was validated against a simulated I2P network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Client protocol - i2p. https://geti2p.net/en/docs/how/tunnel-routing

  2. I2p netlogo simulation - i2p. https://github.com/Bouabdoj/I2P-modeling

  3. Open research questions - i2p. https://geti2p.net/en/research/questions

  4. Peer profiling and selection - i2p. https://geti2p.net/en/docs/how/peer-selection

  5. Tunnel routing - i2p. https://geti2p.net/en/docs/how/tunnel-routing

  6. Barabási, A.L.: Scale-free networks: a decade and beyond. science 325(5939), 412–413 (2009)

    Google Scholar 

  7. Bou Abdo, J., El Sibai, R., Demerjian, J.: Permissionless proof-of-reputation-x: a hybrid reputation-based consensus algorithm for permissionless blockchains. Trans. Emerg. Telecommun. Technol. 32(1), e4148 (2021)

    Article  Google Scholar 

  8. Bradbury, D.: Unveiling dark web. Netw. secur. 2014(4), 14–17 (2014)

    Article  Google Scholar 

  9. Cilleruelo, C., De-Marcos, L., Junquera-Sánchez, J., Martinez-Herraiz, J.J.: Interconnection between darknets. IEEE Internet Comput. 25(3), 61–70 (2020)

    Article  Google Scholar 

  10. Dingledine, R.: Tor hidden services. Proc, What the Hack (2005)

    Google Scholar 

  11. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Tech. rep, Naval Research Lab Washington DC (2004)

    Book  Google Scholar 

  12. Efraimidis, P.S., Spirakis, P.G.: Weighted random sampling with a reservoir. Information processing letters 97(5) (2006)

    Google Scholar 

  13. Gehl, R.W.: Weaving the dark web: legitimacy on freenet, Tor, and I2P. MIT Press (2018)

    Google Scholar 

  14. Hegde, P., de Veciana, G.: Performance and efficiency tradeoffs in blockchain overlay networks. In: Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, pp. 221–230 (2022)

    Google Scholar 

  15. Hoang, N.P., Doreen, S., Polychronakis, M.: Measuring i2p censorship at a global scale. In: 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19). USENIX Association, Santa Clara, CA (2019). https://www.usenix.org/conference/foci19/presentation/hoang

  16. Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An empirical study of the i2p anonymity network and its censorship resistance. In: Proceedings of the Internet Measurement Conference 2018, pp. 379–392 (2018)

    Google Scholar 

  17. Hübschle-Schneider, L., Sanders, P.: Parallel weighted random sampling. ACM Trans. Math. Softw. (TOMS) 48(3), 1–40 (2022)

    Article  MathSciNet  Google Scholar 

  18. Koyuncu, N., Kadilar, C.: Calibration weighting in stratified random sampling. Commun. Stat.-Simul. Comput. 45(7), 2267–2275 (2016)

    Article  MathSciNet  Google Scholar 

  19. Li, M., Lee, W.C., Sivasubramaniam, A.: Semantic small world: an overlay network for peer-to-peer search. In: Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004, pp. 228–238. IEEE (2004)

    Google Scholar 

  20. Li, Z., Xia, W., Cui, M., Fu, P., Gou, G., Xiong, G.: Mining the characteristics of the ethereum p2p network. In: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 20–30 (2020)

    Google Scholar 

  21. Marx, G.T.: Censorship and secrecy, social and legal perspectives. Int. Encycl. Soc. Behav. Sci. (2001)

    Google Scholar 

  22. Owen, G., Savage, N.: Empirical analysis of tor hidden services. IET Inf. Secur. 10(3), 113–118 (2016)

    Article  Google Scholar 

  23. Sanatinia, A., Noubir, G.: Onionbots: subverting privacy infrastructure for cyber attacks. In: 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE (2015)

    Google Scholar 

  24. Shekelyan, M., Cormode, G., Triantafillou, P., Shanghooshabad, A., Ma, Q.: Weighted random sampling over joins. arXiv preprint. arXiv:2201.02670 (2022)

  25. Stamatelatos, G., Efraimidis, P.S.: About weighted random sampling in preferential attachment models. arXiv preprint. arXiv:2102.08173 (2021)

  26. Tillé, Y.: Remarks on some misconceptions about unequal probability sampling without replacement. Comput. Sci. Rev. 47, 100,533 (2023)

    Google Scholar 

  27. Zeadally, S., Abdo, J.B.: Blockchain: trends and future opportunities. Internet Technol. Lett. 2(6), e130 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jacques Bou Abdo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abdo, J.B., Hossain, L. (2024). Modeling the Invisible Internet. In: Cherifi, H., Rocha, L.M., Cherifi, C., Donduran, M. (eds) Complex Networks & Their Applications XII. COMPLEX NETWORKS 2023. Studies in Computational Intelligence, vol 1143. Springer, Cham. https://doi.org/10.1007/978-3-031-53472-0_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-53472-0_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-53471-3

  • Online ISBN: 978-3-031-53472-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics