A longitudinal analysis of .i2p leakage in the public DNS infrastructure

Seong Hoon Jeong, Ah Reum Kang, Joongheon Kim, Huy Kang Kim, Aziz Mohaisen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

The Invisible Internet Project (I2P) is an overlay network that provides secure and anonymous communication channels. EepSites are the anonymous websites hosted in the I2P network. To access the eepSites, DNS requests of a domain name suffixed with the .i2p pseudo top-level domain (TLD) are routed within the I2P network. However, not only that .i2p queries are leaking in the public DNS infrastructure, but also such leakage has various plausible root causes and implications that are different from other related leakage. In this paper, we analyze the leaked .i2p requests captured in the A and J root name servers of the public DNS, showing that a large number of queries are observed and outlining various potential directions of addressing such leakage.

Original languageEnglish
Title of host publicationSIGCOMM 2016 - Proceedings of the 2016 ACM Conference on Special Interest Group on Data Communication
PublisherAssociation for Computing Machinery, Inc
Pages557-558
Number of pages2
ISBN (Electronic)9781450341936
DOIs
Publication statusPublished - 2016 Aug 22
Event2016 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2016 - Florianopolis, Brazil
Duration: 2016 Aug 222016 Aug 26

Publication series

NameSIGCOMM 2016 - Proceedings of the 2016 ACM Conference on Special Interest Group on Data Communication

Other

Other2016 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2016
Country/TerritoryBrazil
CityFlorianopolis
Period16/8/2216/8/26

Keywords

  • DNS
  • I2P
  • Network analysis
  • Privacy
  • Security

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Communication
  • Computer Networks and Communications
  • Signal Processing

Fingerprint

Dive into the research topics of 'A longitudinal analysis of .i2p leakage in the public DNS infrastructure'. Together they form a unique fingerprint.

Cite this