2017
DOI: 10.1080/21642583.2017.1331770
|View full text |Cite
|
Sign up to set email alerts
|

The dark side of I2P, a forensic analysis case study

Abstract: The dark side of I2P, a forensic analysis case study http://researchonline.ljmu.ac.uk/9026/ Article LJMU has developed LJMU Research Online for users to access the research output of the University more effectively. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LJMU Research Online to facilitate their private study or for non-commercial research. You may not engage in f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The increase in Tor DNM shutdowns by law enforcement, competitors, and cyberattackers has led to the multi-homing of certain DNMs (e.g., AlphaBay, Kingdom, and Tor2Door) on I2P and multihoming of vendors on various DNM sites. Existing DNM research has almost exclusively focused on Tor DNMs, except for a few technical studies on I2P [82,83]. We examine a multi-homed DNM site on Tor and I2P -namely, AlphaBay.…”
Section: The Evolution Of Dnms: Policy Practices and Current Shift Fr...mentioning
confidence: 99%
“…The increase in Tor DNM shutdowns by law enforcement, competitors, and cyberattackers has led to the multi-homing of certain DNMs (e.g., AlphaBay, Kingdom, and Tor2Door) on I2P and multihoming of vendors on various DNM sites. Existing DNM research has almost exclusively focused on Tor DNMs, except for a few technical studies on I2P [82,83]. We examine a multi-homed DNM site on Tor and I2P -namely, AlphaBay.…”
Section: The Evolution Of Dnms: Policy Practices and Current Shift Fr...mentioning
confidence: 99%
“…The implementation of classification of I2P network data traffic is performed on the basis of algorithms such as Baysnet, naivebays, Support Vector Machine (SVM) and random forest traffic [15]. The obtained results shows that for segmentation of data set, RandomForest is greatest having accuracy of 100%.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are no public stats about daily users and services, but i2p is frequently maintained and developed. Also, like Tor hidden services, eepsitees became a place for illegal activities [7] [8].…”
Section: Introductionmentioning
confidence: 99%