% Encoding: UTF-8
@COMMENT{BibTeX export based on data in FAU CRIS: https://cris.fau.de/}
@COMMENT{For any questions please write to cris-support@fau.de}
@misc{faucris.109382724,
abstract = {
Anonymity networks, such as Tor or I2P, were built to allow users to access network resources
(e.g., to publicly express their opinion) without revealing their identity. Newer designs, like I2P,
run in a completely decentralized way, while older systems, like Tor, are built around central
authorities. The decentralized approach has advantages (no trusted central party, better scala-
bility), but there are also security risks associated with the use of distributed hash tables (DHTs)
in this environment.
I2P was built with these security problems in mind, and the network is considered to provide
anonymity for all practical purposes. Unfortunately, this is not entirely justified. In this thesis,
we present a group of attacks that can be used to deanonymize I2P users. Specifically, we show
that an attacker, with relatively limited resources, is able to deanonymize any I2P user with high
probability.
},
author = {Egger, Christoph},
faupublication = {yes},
keywords = {Anonymity},
peerreviewed = {automatic},
title = {{Analysing} and attacking the {I2P} {Network} {Database}},
url = {https://static.siccegge.de/pdfs/bachelor-thesis.pdf},
year = {2013}
}