An analysis of anonymizer technology usage

Bingdong Li, Esra Erdin, Mehmet Hadi Güneş, George Bebis, Todd Shipley

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations

    Abstract

    Anonymity techniques provide legitimate usage such as privacy and freedom of speech, but are also used by cyber criminals to hide themselves. In this paper, we provide usage and geo-location analysis of major anonymization systems, i.e., anonymous proxy servers, remailers, JAP, I2P and Tor. Among these systems, remailers and JAP seem to have minimal usage. We then provide a detailed analysis of Tor system by analyzing traffic through two relays. Our results indicate certain countries utilize Tor network more than others. We also analyze anonymity systems from service perspective by inspecting sources of spam e-mail and peer-to-peer clients in recent data sets. We found that proxy servers are used more than other anonymity techniques in both. We believe this is due to proxies providing basic anonymity with minimal delay compared to other systems that incur higher delays.

    Original languageEnglish
    Title of host publicationTraffic Monitoring and Analysis - Third International Workshop, TMA 2011, Proceedings
    Pages108-121
    Number of pages14
    DOIs
    StatePublished - 2011
    Event3rd International Workshop on Traffic Monitoring and Analysis, TMA 2011 - Vienna, Austria
    Duration: 27 Apr 201127 Apr 2011

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume6613 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference3rd International Workshop on Traffic Monitoring and Analysis, TMA 2011
    Country/TerritoryAustria
    CityVienna
    Period27/04/1127/04/11

    Keywords

    • Anonymizer
    • Tor
    • onion routing

    Fingerprint

    Dive into the research topics of 'An analysis of anonymizer technology usage'. Together they form a unique fingerprint.

    Cite this