Skip to main content

2022 | OriginalPaper | Buchkapitel

Evaluation of Circuit Lifetimes in Tor

verfasst von : Kevin Köster, Matthias Marx, Anne Kunstmann, Hannes Federrath

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Tor is a popular anonymity network which achieves its anonymity by constructing paths over three Tor relays, so-called circuits. Multiple streams that correspond to TCP connections can be multiplexed over a single circuit. By default, circuits are used for about ten minutes before switching to new circuits. Once that time limit is reached the circuit cannot be used for any new streams. This time-window is called the maximum circuit dirtiness (MCD). This paper analyzes the consequences of changing the MCD for all clients in the network and provides data on how changing the MCD affects various metrics of the Tor network. Our analysis shows that reducing the MCD to a sane value has almost no impact on the clients. Neither performance nor anonymity of the clients are significantly affected by the MCD. On the relays however halving the default MCD reduces the memory usage by about 20% while maintaining the original throughput and no measurable increase in CPU usage. Raising the MCD shows the opposite effect and increases memory usage. By drastically reducing the MCD, a significant number of extra circuits are created. From a performance point of view, the MCD should be reduced. Building on this work, side effects on specific attacks on Tor should be investigated in future work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Diaz, C.: Anonymity metrics revisited. In: Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum für Informatik (2006) Diaz, C.: Anonymity metrics revisited. In: Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum für Informatik (2006)
5.
Zurück zum Zitat Hanley, H., et al.: DPSelect: a differential privacy based guard relay selection algorithm for Tor. In: PoPETs 2019, no. 2 (2019) Hanley, H., et al.: DPSelect: a differential privacy based guard relay selection algorithm for Tor. In: PoPETs 2019, no. 2 (2019)
8.
Zurück zum Zitat Imani, M., Amirabadi, M., Wright, M.: Modified relay selection and circuit selection for faster tor. IET Commun. 13(17), 2723–2734 (2019)CrossRef Imani, M., Amirabadi, M., Wright, M.: Modified relay selection and circuit selection for faster tor. IET Commun. 13(17), 2723–2734 (2019)CrossRef
11.
Zurück zum Zitat Jansen, R., Hopper, N.: Shadow: running tor in a box for accurate and efficient experimentation (2012) Jansen, R., Hopper, N.: Shadow: running tor in a box for accurate and efficient experimentation (2012)
12.
Zurück zum Zitat Jansen, R., Johnson, A.: Safely measuring tor. In: CCS, pp. 1553–1567. ACM (2016) Jansen, R., Johnson, A.: Safely measuring tor. In: CCS, pp. 1553–1567. ACM (2016)
13.
Zurück zum Zitat Jansen, R., Tracey, J., Goldberg, I.: Once is never enough: foundations for sound statistical inference in tor network experimentation. arXiv preprint arXiv:2102.05196 (2021) Jansen, R., Tracey, J., Goldberg, I.: Once is never enough: foundations for sound statistical inference in tor network experimentation. arXiv preprint arXiv:​2102.​05196 (2021)
15.
Zurück zum Zitat Johnson, A., et al.: Users get routed: traffic correlation on tor by realistic adversaries. In: CCS, pp. 337–348. ACM (2013) Johnson, A., et al.: Users get routed: traffic correlation on tor by realistic adversaries. In: CCS, pp. 337–348. ACM (2013)
17.
Zurück zum Zitat Kiran, K., et al.: Anonymity and performance analysis of stream isolation in tor network. In: ICCCNT, pp. 1–6. IEEE (2019) Kiran, K., et al.: Anonymity and performance analysis of stream isolation in tor network. In: ICCCNT, pp. 1–6. IEEE (2019)
18.
Zurück zum Zitat Koch, R., Golling, M., Rodosek, G.D.: Disequilibrium: tor’s exit node selection under the stereoscope. In: Trustcom/BigDataSE/ISPA, vol. 1, pp. 942–949. IEEE (2015) Koch, R., Golling, M., Rodosek, G.D.: Disequilibrium: tor’s exit node selection under the stereoscope. In: Trustcom/BigDataSE/ISPA, vol. 1, pp. 942–949. IEEE (2015)
19.
Zurück zum Zitat Mani, A., et al.: Understanding tor usage with privacy-preserving measurement. In: IMC, pp. 175–187 (2018) Mani, A., et al.: Understanding tor usage with privacy-preserving measurement. In: IMC, pp. 175–187 (2018)
25.
26.
Zurück zum Zitat Shen, S., Gao, J., Wu, A.: Weakness identification and flow analysis based on tor network. In: CNS, pp. 90–94. IEEE (2018) Shen, S., Gao, J., Wu, A.: Weakness identification and flow analysis based on tor network. In: CNS, pp. 90–94. IEEE (2018)
27.
Zurück zum Zitat Sun, Y., et al.: RAPTOR: routing attacks on privacy in tor. In: Usenix Security, pp. 271–286 (2015) Sun, Y., et al.: RAPTOR: routing attacks on privacy in tor. In: Usenix Security, pp. 271–286 (2015)
28.
Zurück zum Zitat Syverson, P., Dingledine, R., Mathewson, N.: Tor: the second-generation onion router, pp. 303–320 (2004) Syverson, P., Dingledine, R., Mathewson, N.: Tor: the second-generation onion router, pp. 303–320 (2004)
31.
Zurück zum Zitat Wacek, C., et al.: An empirical evaluation of relay selection in tor. In: NDSS (2013) Wacek, C., et al.: An empirical evaluation of relay selection in tor. In: NDSS (2013)
32.
Zurück zum Zitat Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: WPES, pp. 201–212. ACM (2013) Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: WPES, pp. 201–212. ACM (2013)
Metadaten
Titel
Evaluation of Circuit Lifetimes in Tor
verfasst von
Kevin Köster
Matthias Marx
Anne Kunstmann
Hannes Federrath
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-031-06975-8_9

Premium Partner