DefenestraTor: Throwing Out Windows in Tor

作者: Mashael AlSabah , Kevin Bauer , Ian Goldberg , Dirk Grunwald , Damon McCoy

DOI: 10.1007/978-3-642-22263-4_8

关键词:

摘要: Tor is one of the most widely used privacy enhancing technologies for achieving online anonymity and resisting censorship. While conventional wisdom dictates that level offered by increases as its user base grows, significant obstacle to adoption continues be slow performance. We seek enhance Tor's performance offering techniques control congestion improve flow control, thereby reducing unnecessary delays. To reduce congestion, we first evaluate small fixed-size circuit windows a dynamic window adaptively re-sizes in response perceived congestion. these solutions web page times require modification only exit routers, they generally offer poor slower downloads relative current design. To while implement N23, an ATM-style per-link algorithm allows routers explicitly cap their queue lengths signal via back-pressure. Our results show N23 offers better resulting improved faster loads compared design other window-based approaches. also argue our proposals do not enable any new attacks on users'

参考文章(37)
Roger Dingledine, Nathan S. Evans, Christian Grothoff, A practical congestion attack on tor using long paths usenix security symposium. pp. 33- 50 ,(2009)
Joel Reardon, Ian Goldberg, Improving tor using a TCP-over-DTLS tunnel usenix security symposium. pp. 119- 134 ,(2009)
Nick Mathewson, Roger Dingledine, Anonymity Loves Company: Usability and the Network Effect. WEIS. ,(2006)
Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker, Shining Light in Dark Places: Understanding the Tor Network Privacy Enhancing Technologies. pp. 63- 76 ,(2008) , 10.1007/978-3-540-70630-4_5
Steven J. Murdoch, Piotr Zieliński, Sampled traffic analysis by internet-exchange-level adversaries privacy enhancing technologies. pp. 167- 183 ,(2007) , 10.1007/978-3-540-75551-7_11
Andrei Serjantov, Peter Sewell, Passive Attack Analysis for Connection-Based Anonymity Systems european symposium on research in computer security. pp. 116- 131 ,(2003) , 10.1007/978-3-540-39650-5_7
David M. Goldschlag, Michael G. Reed, Paul F. Syverson, Hiding Routing Information information hiding. ,vol. 1174, pp. 137- 150 ,(1996) , 10.1007/3-540-61996-8_37
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Stefan Savage, Neal Cardwell, David Wetherall, Tom Anderson, TCP congestion control with a misbehaving receiver ACM SIGCOMM Computer Communication Review. ,vol. 29, pp. 71- 78 ,(1999) , 10.1145/505696.505704