Open Access Open Access  Restricted Access Subscription or Fee Access

A Traceback Attack OnFreenet

K. Vanitha, P. Anbumani


Freenet is a popular anonymous peer-to-peer content exchange network, with the goal of providing the anonymity of content editors and retrievers. Despite over a decade of active development and implementation and the adoption of cryptographic algorithms consolidated on Freenet, the degree of anonymity of Freenet initial project remains unanswered. The tracking attack exploited some fine-grained development and design decisions made on Freenet, including the unique identifier-based mechanism (UID) to circumvent the routing loops of the content request message. Develop a traceback attack on Freenet and show that it is possible to identify the source machine of a content request message on Freenet; that is, the anonymity of a content retriever can be broken, even if the retriever has issued a single request message. In this paper present the design of the tracking attack and conducted experimental and simulation studies to confirm the feasibility and effectiveness of the attack.


Freenet, Peer-To-Peer, Anonymity, Traceback Attack, Unique Identifier.

Full Text:



T. Baumeister, Y. Dong, Z. Duan, and G. Tian, “A routing table insertion attack on Freenet,” in Proc. ASE Int. Conf. Cyber Security, Washington D.C., USA, Dec. 2012, pp. 8–15.

C. Callanan, H. Dries-Ziekenheiner, A. Escudero-Pascual, and R. Guerra, “Leaping over the firewall: A review of censorship circumvention tools,” Report by Freedom House, Apr. 2011, Censorship.pdf

I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, “Freenet: A distributed anonymous information storage and retrieval system,” in Proc. Int. Workshop Des. Privacy Enhancing Technol.: Des. Anonymity Unobservability, 2001, pp. 46–56.

Darknet-freenet wiki. [Online]. Available: https://wiki.freenetproject. org/Darknet, Jul. 2015.

Emulab. Network emulation testbed. [Online]. Available: http://, Jul. 2015.

Thwarting Traceback Attack on Freenet

Freenet. [Online]. Available:, Jul. 2015.

Freenet. Opennet attacks. [Online]. Available: https://wiki., Jul. 2015.

J. Huang, X. Pan, X. Fu, and J. Wang, “Long PN code based DSSS watermarking,” in Proc. IEEE INFOCOM, 2011, pp. 2426–2434.

T. Isdal, M. Piatek, A. Krishnamurthy, and T. Anderson, “Privacypreserving P2P data sharing with OneSwarm,” in Proc. ACM SIGCOMM Conf., 2010, pp. 111–122.

X. Wang, S. Chen, and S. Jajodia, “Network flow watermarking attack on low-latency anonymous communication systems,” in Proc. IEEE Symp. Security Privacy, May 2007, pp. 116–130.

W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, “DSSS based flow marking technique for invisible traceback,” in Proc. IEEE Symp. Security Privacy, May 2007, pp. 18–32.

G. Tian, Z. Duan, T. Baumeister, and Y. Dong. A traceback attack onFreenet. In Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013.

Toad. How safe is Freenet anyway? _ogmirror/#20120911-security.

P. Mittal, M. Caesar, and N. Borisov, “X-Vine: Secure and pseudonymous routing using social networks,” in Proc. 19th Annu. Netw. Distrib. Syst. Security Symp. Feb. 2012.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.