A longitudinal analysis of. i2p leakage in the public DNS infrastructure

SH Jeong, AR Kang, J Kim, HK Kim… - Proceedings of the 2016 …, 2016 - dl.acm.org
The Invisible Internet Project (I2P) is an overlay network that provides secure and
anonymous communication channels. EepSites are the anonymous websites hosted in the …

[PDF][PDF] Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts

A Crenshaw - Black Hat DC, 2011 - irongeek.com
This paper will present research into services hosted internally on the I2P anonymity
network, focusing on I2P hosted websites known as eepSites, and how the true identity of …

Domain name encryption is not enough: Privacy leakage via IP-based website fingerprinting

NP Hoang, AA Niaki, P Gill, M Polychronakis - arXiv preprint arXiv …, 2021 - arxiv.org
Although the security benefits of domain name encryption technologies such as DNS over
TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their …

Leakage of. onion at the DNS Root: Measurements, Causes, and Countermeasures

A Mohaisen, K Ren - IEEE/ACM Transactions on Networking, 2017 - ieeexplore.ieee.org
The Tor hidden services, one of the features of the Tor anonymity network, are widely used
for providing anonymity to services within the Tor network. Tor uses the. onion pseudo-top …

An empirical study of the i2p anonymity network and its censorship resistance

NP Hoang, P Kintis, M Antonakakis… - Proceedings of the …, 2018 - dl.acm.org
Tor and I2P are well-known anonymity networks used by many individuals to protect their
online privacy and anonymity. Tor's centralized directory services facilitate the …

Institutional privacy risks in sharing DNS data

B Imana, A Korolova, J Heidemann - Proceedings of the Applied …, 2021 - dl.acm.org
The Domain Name System (DNS) is used in every website visit and e-mail transmission, so
privacy is an obvious concern. In DNS, users ask recursive resolvers (or" recursives") to …

Assessing the privacy benefits of domain name encryption

NP Hoang, A Akhavan Niaki, N Borisov, P Gill… - Proceedings of the 15th …, 2020 - dl.acm.org
As Internet users have become more savvy about the potential for their Internet
communication to be observed, the use of network traffic encryption technologies (eg …

[PDF][PDF] Dns privacy not so private: the traffic analysis perspective

S Siby, M Juarez… - … 11th Workshop on …, 2018 - dspace.networks.imdea.org
The Domain Name Service (DNS) is ubiquitous in today's Internet infrastructure. Almost
every connection to an Internet service is preceded by a DNS lookup. A vast majority of DNS …

Statistical estimation of the names of HTTPS servers with domain name graphs

T Mori, T Inoue, A Shimoda, K Sato, S Harada… - Computer …, 2016 - Elsevier
Adoption of SSL/TLS to protect the privacy of web users has become increasingly common.
In fact, as of September 2015, more than 68% of top-1M websites deploy SSL/TLS to encrypt …

Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services

F Zhang, Y Zhang, B Liu, E Alowaisheq, L Ying… - Proceedings of the …, 2023 - dl.acm.org
Leveraging DNS for covert communications is appealing since most networks allow DNS
traffic, especially the ones directed toward renowned DNS hosting services. Unfortunately …