Title
An analysis of anonymity technology usage
Abstract
Anonymity techniques provide legitimate usage such as privacy and freedom of speech, but are also used by cyber criminals to hide themselves. In this paper, we provide usage and geo-location analysis of major anonymization systems, i.e., anonymous proxy servers, remailers, JAP, I2P and Tor. Among these systems, remailers and JAP seem to have minimal usage. We then provide a detailed analysis of Tor system by analyzing traffic through two relays. Our results indicate certain countries utilize Tor network more than others. We also analyze anonymity systems from service perspective by inspecting sources of spam e-mail and peer-to-peer clients in recent data sets. We found that proxy servers are used more than other anonymity techniques in both. We believe this is due to proxies providing basic anonymity with minimal delay compared to other systems that incur higher delays.
Year
DOI
Venue
2011
10.1007/978-3-642-20305-3_10
TMA
Keywords
Field
DocType
anonymity technology usage,detailed analysis,anonymous proxy server,tor system,legitimate usage,tor network,anonymity technique,minimal usage,geo-location analysis,basic anonymity,anonymity system
Proxy (climate),Computer science,Computer security,Server,Computer network,Anonymity,Onion routing
Conference
Volume
ISSN
Citations 
6613
0302-9743
3
PageRank 
References 
Authors
0.37
14
5
Name
Order
Citations
PageRank
Bingdong Li1141.83
Esra Erdin2212.90
Mehmet Hadi Günes314916.19
George Bebis42397149.44
Todd Shipley560.80