Skip to main content
Top

2022 | OriginalPaper | Chapter

Evaluation of Circuit Lifetimes in Tor

Authors : Kevin Köster, Matthias Marx, Anne Kunstmann, Hannes Federrath

Published in: ICT Systems Security and Privacy Protection

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Tor is a popular anonymity network which achieves its anonymity by constructing paths over three Tor relays, so-called circuits. Multiple streams that correspond to TCP connections can be multiplexed over a single circuit. By default, circuits are used for about ten minutes before switching to new circuits. Once that time limit is reached the circuit cannot be used for any new streams. This time-window is called the maximum circuit dirtiness (MCD). This paper analyzes the consequences of changing the MCD for all clients in the network and provides data on how changing the MCD affects various metrics of the Tor network. Our analysis shows that reducing the MCD to a sane value has almost no impact on the clients. Neither performance nor anonymity of the clients are significantly affected by the MCD. On the relays however halving the default MCD reduces the memory usage by about 20% while maintaining the original throughput and no measurable increase in CPU usage. Raising the MCD shows the opposite effect and increases memory usage. By drastically reducing the MCD, a significant number of extra circuits are created. From a performance point of view, the MCD should be reduced. Building on this work, side effects on specific attacks on Tor should be investigated in future work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Diaz, C.: Anonymity metrics revisited. In: Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum für Informatik (2006) Diaz, C.: Anonymity metrics revisited. In: Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum für Informatik (2006)
5.
go back to reference Hanley, H., et al.: DPSelect: a differential privacy based guard relay selection algorithm for Tor. In: PoPETs 2019, no. 2 (2019) Hanley, H., et al.: DPSelect: a differential privacy based guard relay selection algorithm for Tor. In: PoPETs 2019, no. 2 (2019)
8.
go back to reference Imani, M., Amirabadi, M., Wright, M.: Modified relay selection and circuit selection for faster tor. IET Commun. 13(17), 2723–2734 (2019)CrossRef Imani, M., Amirabadi, M., Wright, M.: Modified relay selection and circuit selection for faster tor. IET Commun. 13(17), 2723–2734 (2019)CrossRef
11.
go back to reference Jansen, R., Hopper, N.: Shadow: running tor in a box for accurate and efficient experimentation (2012) Jansen, R., Hopper, N.: Shadow: running tor in a box for accurate and efficient experimentation (2012)
12.
go back to reference Jansen, R., Johnson, A.: Safely measuring tor. In: CCS, pp. 1553–1567. ACM (2016) Jansen, R., Johnson, A.: Safely measuring tor. In: CCS, pp. 1553–1567. ACM (2016)
13.
go back to reference Jansen, R., Tracey, J., Goldberg, I.: Once is never enough: foundations for sound statistical inference in tor network experimentation. arXiv preprint arXiv:2102.05196 (2021) Jansen, R., Tracey, J., Goldberg, I.: Once is never enough: foundations for sound statistical inference in tor network experimentation. arXiv preprint arXiv:​2102.​05196 (2021)
15.
go back to reference Johnson, A., et al.: Users get routed: traffic correlation on tor by realistic adversaries. In: CCS, pp. 337–348. ACM (2013) Johnson, A., et al.: Users get routed: traffic correlation on tor by realistic adversaries. In: CCS, pp. 337–348. ACM (2013)
17.
go back to reference Kiran, K., et al.: Anonymity and performance analysis of stream isolation in tor network. In: ICCCNT, pp. 1–6. IEEE (2019) Kiran, K., et al.: Anonymity and performance analysis of stream isolation in tor network. In: ICCCNT, pp. 1–6. IEEE (2019)
18.
go back to reference Koch, R., Golling, M., Rodosek, G.D.: Disequilibrium: tor’s exit node selection under the stereoscope. In: Trustcom/BigDataSE/ISPA, vol. 1, pp. 942–949. IEEE (2015) Koch, R., Golling, M., Rodosek, G.D.: Disequilibrium: tor’s exit node selection under the stereoscope. In: Trustcom/BigDataSE/ISPA, vol. 1, pp. 942–949. IEEE (2015)
19.
go back to reference Mani, A., et al.: Understanding tor usage with privacy-preserving measurement. In: IMC, pp. 175–187 (2018) Mani, A., et al.: Understanding tor usage with privacy-preserving measurement. In: IMC, pp. 175–187 (2018)
26.
go back to reference Shen, S., Gao, J., Wu, A.: Weakness identification and flow analysis based on tor network. In: CNS, pp. 90–94. IEEE (2018) Shen, S., Gao, J., Wu, A.: Weakness identification and flow analysis based on tor network. In: CNS, pp. 90–94. IEEE (2018)
27.
go back to reference Sun, Y., et al.: RAPTOR: routing attacks on privacy in tor. In: Usenix Security, pp. 271–286 (2015) Sun, Y., et al.: RAPTOR: routing attacks on privacy in tor. In: Usenix Security, pp. 271–286 (2015)
28.
go back to reference Syverson, P., Dingledine, R., Mathewson, N.: Tor: the second-generation onion router, pp. 303–320 (2004) Syverson, P., Dingledine, R., Mathewson, N.: Tor: the second-generation onion router, pp. 303–320 (2004)
31.
go back to reference Wacek, C., et al.: An empirical evaluation of relay selection in tor. In: NDSS (2013) Wacek, C., et al.: An empirical evaluation of relay selection in tor. In: NDSS (2013)
32.
go back to reference Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: WPES, pp. 201–212. ACM (2013) Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: WPES, pp. 201–212. ACM (2013)
Metadata
Title
Evaluation of Circuit Lifetimes in Tor
Authors
Kevin Köster
Matthias Marx
Anne Kunstmann
Hannes Federrath
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-06975-8_9

Premium Partner