Defending Eclipse Attack in I2P Using Structured Overlay Network

The ‘Darknet’ is a part of cyberspace that is hidden from the ‘Surface web’. In Darknet both publishers and visitors are anonymous. There are several ways to access Darknet such as through Freenet, TOR and I2P. Though I2P is a decentralized anonymous network, there are several security risks incorporated with Distributed Hash Table (DHT) that may breach anonymity of I2P. In this paper, the authors will study basics of I2P, eclipse attack and existing defense mechanism of eclipse attack and the mechanism to prevent the eclipse attack.

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Subscribe to the Developer Insider Newsletter

From the hottest programming languages to commentary on the Linux OS, get the developer and open source news and tips you need to know. Delivered Tuesdays and Thursdays

Resource Details

Provided by:
Creative Commons
Topic:
Networking
Format:
PDF