![]() To this end, four classifiers are trained and tested on the dataset: (i) Naïve Bayes, (ii) Bayesian Network, (iii) C4.5, and (iv) Random Forest. ![]() In this paper, leveraging a public dataset released in 2017, we provide (repeatable) classification results with the aim of investigating to what degree the specific anonymity tool (and the traffic it hides) can be identified, when compared to the traffic of the other considered anonymity tools, using machine learning approaches based on the sole statistical features. This process is challenged by applications that preserve Internet users' privacy by encrypting the communication content, and even more by anonymity tools, additionally hiding the source, the destination, and the nature of the communication. associating network traffic to the application that generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D). Each of the users’ computers, in this case, acts as a server, which allows passing traffic in parallel through several nodes.Traffic classification, i.e. I2P uses UDP for similar purposes, which allows you to build a network on the same principle that downloads files to torrent trackers are organized. Due to the shortage of servers and a large number of clients, overloads often occur, which does not have the best effect on speed. In Tor, data is transmitted sequentially from node to node using TCP. i2p in i2p).And at the same time, I2P and Tor, which are quite similar in a number of features, are still very different in architecture. There are similarities: in both cases, the connection to the Internet is organized through gateways, according to the same principles, multi-layer encryption and random construction of data transfer chains are carried out, internal pseudo-domains of sites look similarly (.onion in Tor and. Many do not distinguish between I2P and Tor, considering them to be of the same type as anonymous networks. In addition, such networks are disadvantageous to those who are still using limitless tariffs, since in this case not only the data packets requested and sent by the user are transferred, but also alien ones, by analogy with torrent networks. For Russian-speaking users, these include a fairly small number of sites in Russian, although in recent times their number has begun to grow. In this case, since along with its own traffic, the traffic of other users passes through the site, it is almost impossible to isolate and determine its ownership, let alone recognize itI2p has some drawbacks. Unencrypted traffic is transmitted only from the application to the proxy server within the local computer. Decryption occurs only on the recipient’s gateway. In addition, to log in to i2p, you must enter the enable proxy (address 127.0.0.1 and port 4444) in the browser.Anonymity in i2p networks is ensured due to the fact that all traffic passing through the gateway is encrypted. For her work, you also need a java-machine version 1.5 or higher installed on your computer. Download the router program for example here. It can be installed in standard mode without any changes. In fact, it is a gateway or proxy server that does not require special configuration. To do this, you need to run a router program on your computer that will send traffic to this network. Moreover, data transmission with the help of various programs also includes encryption, and therefore anonymity.Connect to i2p can use any of the well-known and widespread operating systems Windows, MacOS, Linux and others. ![]() Naturally, i2p has its own mail, services for instant text and voice messaging. At the same time, the site address will have a quite memorable look of the type. Moreover, the latter can be done in quite affordable ways, in particular by bundling Apache + PHP + MySQL. ![]() In i2p, routing is carried out through the tunnels, and the network address is encrypted, so no one can prove, for example, the fact of downloading or uploading a file to the network, which for some reason was found illegal or simply turned out to be unsuitable for the authorities.I2p can also create completely independent servers and resources that are visible only to users of this network. This feature was the main reason for its increasing popularity.The main difference and advantage of i2p is the inability to set the user’s IP address, which can be done on the usual Internet without any special problems. All traffic on this network is completely isolated and encrypted, thereby ensuring the anonymity of data exchange. In this case, there is a view of the layering over the already existing Internet, so i2p is sometimes also called the “network over the network”. Translated from English “overlay” – overlay or layering. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |