Measuring Freenet in the Wild: Censorship-Resilience under Observation

Freenet, a fully decentralized publication system designed for censorship-resistant communication, exhibits long delays and low success rates for finding and retrieving content. In order to improve its performance, an in-depth understanding of the deployed system is required. Therefore, we performed an extensive measurement study accompanied by a code analysis to identify bottlenecks of the existing algorithms and obtained a realistic user model for the improvement and evaluation of new algorithms.

[1]  Jon M. Kleinberg,et al.  The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.

[2]  H. Federrath Freenet : A Distributed Anonymous Information Storage and Retrieval System in Designing Privacy Enhancing Technologies , 2001 .

[3]  Krishna P. Gummadi,et al.  A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems , 2002, CCRV.

[4]  Ian Clarke,et al.  Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..

[5]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[6]  Stefan Savage,et al.  Understanding Availability , 2003, IPTPS.

[7]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[8]  Fabián E. Bustamante,et al.  Friendships that Last: Peer Lifespan and its Role in P2P Protocols , 2003, WCW.

[9]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[10]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[11]  Thomas Fuhrmann,et al.  Bootstrapping locality-aware P2P networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[12]  Jia Wang,et al.  Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..

[13]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[14]  Xiaoning Ding,et al.  Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.

[15]  J. Srivastava,et al.  TR 05-030 Network Size Estimation In A Peer-to-Peer Network , 2005 .

[16]  Daniel Stutzbach,et al.  Understanding churn in peer-to-peer networks , 2006, IMC '06.

[17]  Oskar Sandberg,et al.  Distributed Routing in Small-World Networks , 2006, ALENEX.

[18]  Christian Grothoff,et al.  Routing in the Dark: Pitch Black , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[19]  Mohamed Hefeeda,et al.  Traffic modeling and proportional partial caching for peer-to-peer systems , 2008, TNET.

[20]  Nicholas Hopper,et al.  Membership-concealing overlay networks , 2009, CCS.

[21]  Anja Feldmann,et al.  Understanding online social network usage from a network perspective , 2009, IMC '09.

[22]  Prateek Mittal,et al.  ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies , 2009, CCS.

[23]  I. Clarke,et al.  Private Communication Through a Network of Trusted Connections : The Dark Freenet , 2010 .

[24]  Thomas E. Anderson,et al.  Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.

[25]  Prateek Mittal,et al.  X-Vine: Secure and Pseudonymous Routing Using Social Networks , 2011, ArXiv.

[26]  Stefanie Roos,et al.  Attack Resistant Network Embeddings for Darknets , 2011, 2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops.

[27]  Stefanie Roos,et al.  A contribution to analyzing and enhancing Darknet routing , 2013, 2013 Proceedings IEEE INFOCOM.

[28]  Zhenhai Duan,et al.  A traceback attack on Freenet , 2013, 2013 Proceedings IEEE INFOCOM.

[29]  David Wolinsky,et al.  Hang with your buddies to resist intersection attacks , 2013, CCS.