Mapping The Invisible Internet: Framework and Dataset

📅 2025-06-22
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Prior research on I2P has predominantly focused on its application layer (e.g., dark web services), leaving a critical gap in systematic, empirical analysis of its network-layer architecture and publicly available measurement datasets. Method: This paper presents the first large-scale network-layer measurement of I2P, introducing SWARM-I2P—a distributed probing framework that integrates dynamic port mapping, netDb parsing, console querying, and passive traffic monitoring. Contribution/Results: We collect and analyze data from over 50,000 I2P routers—including 2,077 FastSet nodes and 2,331 high-capacity routers—along with 4.22 million connection records and over one million packets. The dataset characterizes geolocation (3,444 nodes across 92 countries), bandwidth, latency, uptime, and traffic patterns. To our knowledge, this is the first empirically derived, publicly documented I2P network-layer dataset, enabling rigorous tunnel optimization, resilience assessment, and adversarial modeling—thereby bridging a fundamental gap in anonymous network infrastructure research.

Technology Category

Application Category

📝 Abstract
This article presents a novel dataset focusing on the network layer of the Invisible Internet Project (I2P), where prior research has predominantly examined application layers like the dark web. Data was collected through the SWARM- I2P framework, deploying I2P routers as mapping agents, utilizing dynamic port mapping (30000-50000 range). The dataset documents over 50,000 nodes, including 2,077 FastSet nodes and 2,331 high-capacity nodes characterized by bandwidth, latency (mean 121.21ms +- 48.50), and uptime metrics. It contains 1,997 traffic records (1,003,032 packets/bytes) and 4,222,793 records (2,147,585,625 packets/bytes), with geographic distributions for 3,444 peers showing capacity metrics (mean 8.57 +- 1.20). Collection methods included router console queries (127.0.0.1:port/tunnels), netDb analysis, and passive monitoring, with anonymized identifiers. Data is structured in CSV/TXT formats (Zenodo) with collection scripts (GitHub). Potential applications include tunnel peer selection analysis, anonymity network resilience studies, and adversarial modelling.
Problem

Research questions and friction points this paper is trying to address.

Mapping I2P network layer lacking prior research focus
Collecting node and traffic data for anonymity network analysis
Enabling resilience studies and adversarial modeling in I2P
Innovation

Methods, ideas, or system contributions that make the work stand out.

SWARM-I2P framework for I2P network mapping
Dynamic port mapping in 30000-50000 range
Comprehensive dataset with 50,000+ nodes
🔎 Similar Papers
No similar papers found.
Siddique Abubakr Muntaka
Siddique Abubakr Muntaka
University of Cincinnati
CybersecurityCloud ComputingSystems & NetworksCyberwarfareComplex Systems
Jacques Bou Abdo
Jacques Bou Abdo
University of Cincinnati
DarkwebCyberwarfareCyberBioSecurityCybersecurityNetwork Science
Kemi Akanbi
Kemi Akanbi
University of Cincinnati
Applied Machine LearningHealth InformaticsNetwork Science
Sunkanmi Oluwadare
Sunkanmi Oluwadare
Cybersecurity Researcher, University of Cincinnati
Anonymity NetworksDark Web ResearchCyberwarfareCybersecurityAI Security
F
Faiza Hussein
Garden City University College, Computer Science Department, Kumasi, Ashanti, Ghana
O
Oliver Konyo
Kwame Nkrumah University of Science and Technology, Department of Computer Science, Ghana
M
Michael Asante
Kwame Nkrumah University of Science and Technology, Department of Computer Science, Ghana