Abstract
Understanding the properties of anonymity networks such as the Invisible Internet Project (Garlic router) and Tor (Onion router) is critical for the future of cybersecurity, cyberwarfare and Internet freedom. In this paper, we theoretically model the Invisible Internet and provide the preliminary components for developing a theoretical lens that can be used to address its open questions. Additionally, this work lays the theoretical foundation for studying I2P’s key network properties such as resilience, anonymity and minimum attackers/routers ratio to exploit the network. The model was validated against a simulated I2P network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Client protocol - i2p. https://geti2p.net/en/docs/how/tunnel-routing
I2p netlogo simulation - i2p. https://github.com/Bouabdoj/I2P-modeling
Open research questions - i2p. https://geti2p.net/en/research/questions
Peer profiling and selection - i2p. https://geti2p.net/en/docs/how/peer-selection
Tunnel routing - i2p. https://geti2p.net/en/docs/how/tunnel-routing
Barabási, A.L.: Scale-free networks: a decade and beyond. science 325(5939), 412–413 (2009)
Bou Abdo, J., El Sibai, R., Demerjian, J.: Permissionless proof-of-reputation-x: a hybrid reputation-based consensus algorithm for permissionless blockchains. Trans. Emerg. Telecommun. Technol. 32(1), e4148 (2021)
Bradbury, D.: Unveiling dark web. Netw. secur. 2014(4), 14–17 (2014)
Cilleruelo, C., De-Marcos, L., Junquera-Sánchez, J., Martinez-Herraiz, J.J.: Interconnection between darknets. IEEE Internet Comput. 25(3), 61–70 (2020)
Dingledine, R.: Tor hidden services. Proc, What the Hack (2005)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. Tech. rep, Naval Research Lab Washington DC (2004)
Efraimidis, P.S., Spirakis, P.G.: Weighted random sampling with a reservoir. Information processing letters 97(5) (2006)
Gehl, R.W.: Weaving the dark web: legitimacy on freenet, Tor, and I2P. MIT Press (2018)
Hegde, P., de Veciana, G.: Performance and efficiency tradeoffs in blockchain overlay networks. In: Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, pp. 221–230 (2022)
Hoang, N.P., Doreen, S., Polychronakis, M.: Measuring i2p censorship at a global scale. In: 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19). USENIX Association, Santa Clara, CA (2019). https://www.usenix.org/conference/foci19/presentation/hoang
Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An empirical study of the i2p anonymity network and its censorship resistance. In: Proceedings of the Internet Measurement Conference 2018, pp. 379–392 (2018)
Hübschle-Schneider, L., Sanders, P.: Parallel weighted random sampling. ACM Trans. Math. Softw. (TOMS) 48(3), 1–40 (2022)
Koyuncu, N., Kadilar, C.: Calibration weighting in stratified random sampling. Commun. Stat.-Simul. Comput. 45(7), 2267–2275 (2016)
Li, M., Lee, W.C., Sivasubramaniam, A.: Semantic small world: an overlay network for peer-to-peer search. In: Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004, pp. 228–238. IEEE (2004)
Li, Z., Xia, W., Cui, M., Fu, P., Gou, G., Xiong, G.: Mining the characteristics of the ethereum p2p network. In: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pp. 20–30 (2020)
Marx, G.T.: Censorship and secrecy, social and legal perspectives. Int. Encycl. Soc. Behav. Sci. (2001)
Owen, G., Savage, N.: Empirical analysis of tor hidden services. IET Inf. Secur. 10(3), 113–118 (2016)
Sanatinia, A., Noubir, G.: Onionbots: subverting privacy infrastructure for cyber attacks. In: 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE (2015)
Shekelyan, M., Cormode, G., Triantafillou, P., Shanghooshabad, A., Ma, Q.: Weighted random sampling over joins. arXiv preprint. arXiv:2201.02670 (2022)
Stamatelatos, G., Efraimidis, P.S.: About weighted random sampling in preferential attachment models. arXiv preprint. arXiv:2102.08173 (2021)
Tillé, Y.: Remarks on some misconceptions about unequal probability sampling without replacement. Comput. Sci. Rev. 47, 100,533 (2023)
Zeadally, S., Abdo, J.B.: Blockchain: trends and future opportunities. Internet Technol. Lett. 2(6), e130 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Abdo, J.B., Hossain, L. (2024). Modeling the Invisible Internet. In: Cherifi, H., Rocha, L.M., Cherifi, C., Donduran, M. (eds) Complex Networks & Their Applications XII. COMPLEX NETWORKS 2023. Studies in Computational Intelligence, vol 1143. Springer, Cham. https://doi.org/10.1007/978-3-031-53472-0_30
Download citation
DOI: https://doi.org/10.1007/978-3-031-53472-0_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-53471-3
Online ISBN: 978-3-031-53472-0
eBook Packages: EngineeringEngineering (R0)