Abstract
Tor, an anonymity network formed by volunteer nodes, uses the estimated bandwidth of the nodes as a central feature of its path selection algorithm. The current load on nodes is not considered in this algorithm, however, and we observe that some nodes persist in being under-utilized or congested. This can degrade the network’s performance, discourage Tor adoption, and consequently reduce the size of Tor’s anonymity set. In an effort to reduce congestion and improve load balancing, we propose a congestion-aware path selection algorithm. Using latency as an indicator of congestion, clients use opportunistic and lightweight active measurements to evaluate the congestion state of nodes, and reject nodes that appear congested. Through experiments conducted on the live Tor network, we verify our hypothesis that clients can infer congestion using latency and show that congestion-aware path selection can improve performance.
An extended version of this paper is available [22].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AlSabah, M., Bauer, K., Goldberg, I., Grunwald, D., McCoy, D., Savage, S., Voelker, G.M.: DefenestraTor: Throwing Out Windows in Tor. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 134–154. Springer, Heidelberg (2011)
Chen, F., Perry, M.: Improving Tor path selection (July 2008), https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/151-path-selection-improvements.txt
Dhungel, P., Steiner, M., Rimac, I., Hilt, V., Ross, K.W.: Waiting for anonymity: Understanding delays in the Tor overlay. In: Peer-to-Peer Computing, pp. 1–4. IEEE (2010)
Dingledine, R., Mathewson, N.: Tor Protocol Specification, https://gitweb.torproject.org/tor.git/blob_plain/HEAD:/doc/spec/tor-spec.txt (accessed August 2011)
Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: WEIS (June 2006)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: USENIX Security (2004)
Dingledine, R., Murdoch, S.: Performance improvements on Tor or, why Tor is slow and what we’re going to do about it (March 2009), http://www.torproject.org/press/presskit/2009-03-11-performance.pdf
Edman, M., Syverson, P.F.: AS-awareness in Tor path selection. In: Proceedings of CCS, pp. 380–389 (2009)
Evans, N., Dingledine, R., Grothoff, C.: A practical congestion attack on Tor using long paths. In: Proceedings of the 18th USENIX Security Symposium (August 2009)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)
Gummadi, K.P., Saroiu, S., Gribble, S.D.: King: Estimating latency between arbitrary Internet end hosts. SIGCOMM Comput. Commun. Rev. 32(3) (2002)
Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak. In: CCS (2007)
Loesing, K.: Measuring the Tor network: Evaluation of client requests to the directories. Tor Project Technical Report (2009)
Mathewson, N.: New paper by Goldberg, Stebila, and Ostaoglu with proposed circuit handshake, https://lists.torproject.org/pipermail/tor-dev/2011-May/002641.html (accessed June 2011)
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63–76. Springer, Heidelberg (2008)
Nah, F.F.-H.: A study on tolerable waiting time: How long are web users willing to wait? Behaviour Information Technology 23(3), 153–163 (2004)
Panchenko, A., Renner, J.: Path selection metrics for performance-improved onion routing. In: Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet, pp. 114–120. IEEE Computer Society, Washington, DC (2009)
Reardon, J., Goldberg, I.: Improving Tor using a TCP-over-DTLS tunnel. In: USENIX Security (2009)
Sherr, M., Blaze, M., Loo, B.T.: Scalable Link-Based Relay Selection for Anonymous Routing. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 73–93. Springer, Heidelberg (2009)
Sherr, M., Mao, A., Marczak, W.R., Zhou, W., Loo, B.T., Blaze, M.: A3: An Extensible Platform for Application-Aware Anonymity. In: 17th Annual Network and Distributed System Security Symposium (NDSS) (February 2010)
Tschorsch, F., Scheuermann, B.: Proposal 182: Credit bucket, https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/182-creditbucket.txt (accessed August 2011)
Wang, T., Bauer, K., Forero, C., Goldberg, I.: Congestion-aware path selection for Tor. Technical Report CACR 2011-20 (December 2011), http://www.cacr.math.uwaterloo.ca/techreports/2011/cacr2011-20.pdf
Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4), 489–522 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, T., Bauer, K., Forero, C., Goldberg, I. (2012). Congestion-Aware Path Selection for Tor. In: Keromytis, A.D. (eds) Financial Cryptography and Data Security. FC 2012. Lecture Notes in Computer Science, vol 7397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32946-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-32946-3_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32945-6
Online ISBN: 978-3-642-32946-3
eBook Packages: Computer ScienceComputer Science (R0)