TY - GEN
T1 - An analysis of anonymizer technology usage
AU - Li, Bingdong
AU - Erdin, Esra
AU - Güneş, Mehmet Hadi
AU - Bebis, George
AU - Shipley, Todd
PY - 2011
Y1 - 2011
N2 - Anonymity techniques provide legitimate usage such as privacy and freedom of speech, but are also used by cyber criminals to hide themselves. In this paper, we provide usage and geo-location analysis of major anonymization systems, i.e., anonymous proxy servers, remailers, JAP, I2P and Tor. Among these systems, remailers and JAP seem to have minimal usage. We then provide a detailed analysis of Tor system by analyzing traffic through two relays. Our results indicate certain countries utilize Tor network more than others. We also analyze anonymity systems from service perspective by inspecting sources of spam e-mail and peer-to-peer clients in recent data sets. We found that proxy servers are used more than other anonymity techniques in both. We believe this is due to proxies providing basic anonymity with minimal delay compared to other systems that incur higher delays.
AB - Anonymity techniques provide legitimate usage such as privacy and freedom of speech, but are also used by cyber criminals to hide themselves. In this paper, we provide usage and geo-location analysis of major anonymization systems, i.e., anonymous proxy servers, remailers, JAP, I2P and Tor. Among these systems, remailers and JAP seem to have minimal usage. We then provide a detailed analysis of Tor system by analyzing traffic through two relays. Our results indicate certain countries utilize Tor network more than others. We also analyze anonymity systems from service perspective by inspecting sources of spam e-mail and peer-to-peer clients in recent data sets. We found that proxy servers are used more than other anonymity techniques in both. We believe this is due to proxies providing basic anonymity with minimal delay compared to other systems that incur higher delays.
KW - Anonymizer
KW - Tor
KW - onion routing
UR - http://www.scopus.com/inward/record.url?scp=79955100121&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79955100121&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-20305-3_10
DO - 10.1007/978-3-642-20305-3_10
M3 - Conference contribution
AN - SCOPUS:79955100121
SN - 9783642203046
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 108
EP - 121
BT - Traffic Monitoring and Analysis - Third International Workshop, TMA 2011, Proceedings
T2 - 3rd International Workshop on Traffic Monitoring and Analysis, TMA 2011
Y2 - 27 April 2011 through 27 April 2011
ER -