QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol

作者: Mashael Alsabah , Mohsen Guizani , Amr Mohamed , Aiman Erbad , Noora Fetais

DOI: 10.1109/ACCESS.2021.3059672

关键词:

摘要: In the past decades, internet has emerged as fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy Internet users is at increasing risk advances in surveillance techniques. Users’ online behavior, activities, and even personal are being tracked by ISPs major tech companies. response need for preserving protecting users, anonymity networks were developed. Tor network a low-latency that gained quite good reputation over years adopted thousands users. With great attention Tor’s getting, original design was proven have performance limiting issues. motivation addressing limitation Tor, we present QuicTor, datagram-based solve transport-layer issue. We evaluated QuicTor comparison vanilla well other performance-enhancing proposals. achieved significant improvements interactive applications streaming applications. Running protocol entails careful security analysis. article, assess behavior under side-channel attacks aiming de-anonymize clients. show brought do not reduce clients investigated types attacks.

参考文章(48)
Rob Jansen, Nicholas Hooper, Shadow: Running Tor in a Box for Accurate and Efficient Experimentation network and distributed system security symposium. ,(2011) , 10.21236/ADA559181
Srinivas Devadas, Mashael AlSabah, David Lazar, Marc Dacier, Albert Kwon, Circuit fingerprinting attacks: passive deanonymization of tor hidden services usenix security symposium. pp. 287- 302 ,(2015)
Joel Reardon, Ian Goldberg, Improving tor using a TCP-over-DTLS tunnel usenix security symposium. pp. 119- 134 ,(2009)
Xiaodan Gu, Junzhou Luo, Gaofeng He, Ming Yang, Inferring Application Type Information from Tor Encrypted Traffic international conference on advanced cloud and big data. pp. 220- 227 ,(2014) , 10.1109/.36
Nick Mathewson, Roger Dingledine, Anonymity Loves Company: Usability and the Network Effect. WEIS. ,(2006)
Roger Dingledine, Nicholas Hopper, Kevin Bauer, Rob Jansen, Methodically modeling the Tor network CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test. pp. 8- 8 ,(2012)
David M. Goldschlag, Michael G. Reed, Paul F. Syverson, Hiding Routing Information information hiding. ,vol. 1174, pp. 137- 150 ,(1996) , 10.1007/3-540-61996-8_37
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Janardhan Iyengar, Michael F. Nowlan, Syed Obaid Aminy, Bryan Fordy, Nabin Tiwari, Fitting square pegs through round pipes: unordered delivery wire-compatible with TCP and TLS networked systems design and implementation. pp. 28- 28 ,(2012)
John Geddes, Rob Jansen, Nicholas Hopper, How Low Can You Go: Balancing Performance with Anonymity in Tor Privacy Enhancing Technologies. pp. 164- 184 ,(2013) , 10.1007/978-3-642-39077-7_9