Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2381966.2381972acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Torchestra: reducing interactive traffic delays over tor

Published: 15 October 2012 Publication History

Abstract

Tor is an onion routing network that protects users' privacy by relaying traffic through a series of nodes that run Tor software. As a consequence of the anonymity that it provides, Tor is used for many purposes. According to several measurement studies, a small fraction of users using Tor for bulk downloads account for the majority of traffic on the Tor network. These bulk downloads cause delays for interactive traffic, as many different circuits share bandwidth across each pair of nodes. The resulting delays discourage people from using Tor for normal web activity.
We propose a potential solution to this problem: separate interactive and bulk traffic onto two different TCP connections between each pair of nodes. Previous proposals to improve Tor's performance for interactive traffic have focused on prioritizing traffic from less active circuits; however, these prioritization approaches are limited in the benefit they can provide, as they can only affect delays due to traffic processing in Tor itself. Our approach provides a simple way to reduce delays due to additional factors external to Tor, such as the effects of TCP congestion control and queuing of interactive traffic behind bulk traffic in buffers. We evaluate our proposal by simulating traffic using several methods and show that Torchestra provides up to 32% reduction in delays for interactive traffic compared to the Tor traffic prioritization scheme of Tang and Goldberg [18] and up to 40% decrease in delays when compared to vanilla Tor.

References

[1]
Maximum socket limit on Windows. http://smallvoid.com/article/winnt-tcpip-max-limit.html.
[2]
K. Bauer, M. Sherr, D. McCoy, and D. Grunwald. ExperimenTor: A testbed for safe and realistic Tor experimentation. In USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2011.
[3]
A. Chaabane, P. Manils, and M. A. Kaafar. Digging into anonymous traffic: A deep analysis of the Tor anonymizing network. In Network and System Security (NSS), 2010 4th International Conference, pages 167--174. IEEE, 2010.
[4]
M. Chowdhury, M. Zaharia, J. Ma, M. I. Jordan, and I. Stoica. Managing data transfers in computer clusters with Orchestra. SIGCOMM-Computer Communication Review, 41(4):98, 2011.
[5]
B. Cohen. The BitTorrent protocol specification, 2008.
[6]
G. Combs et al. Wireshark. http://www.wireshark.org/ last modified, 2007.
[7]
R. Dingledine. Research problem: adaptive throttling of Tor clients by entry guards. https://blog.torproject.org/blog/research-problem-adaptive-throttling-tor-clients-entry-guards.
[8]
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, DTIC Document, 2004.
[9]
R. Dingledine and S. J. Murdoch. Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it. http://www.torproject.org/press/presskit/2009-03-11-performance.pdf, 2009.
[10]
N. S. Evans, R. Dingledine, and C. Grothoff. A practical congestion attack on tor using long paths. In Proceedings of the 18th conference on USENIX security symposium, pages 33--50. USENIX Association, 2009.
[11]
D. Gopal. Torchestra : Reducing interactive traffic delays over Tor, Master's thesis, UC San Diego. Master's thesis.
[12]
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. Shining light in dark places: Understanding the tor network. In Privacy Enhancing Technologies, pages 63--76. Springer, 2008.
[13]
D. McCoy, K. Bauer, D. Grunwald, P. Tabriz, and D. Sicker. Shining light in dark places: A study of anonymous network usage. University of Colorado Technical Report CU-CS-1032-07 (August 2007), 2007.
[14]
S. J. Murdoch and G. Danezis. Low-cost traffic analysis of Tor. In Security and Privacy, 2005 IEEE Symposium, pages 183--195. IEEE, 2005.
[15]
J. Reardon and I. Goldberg. Improving Tor using a TCP-over-DTLS tunnel. In Proceedings of the 18th conference on USENIX security symposium, pages 119--134. USENIX Association, 2009.
[16]
S. W. Roberts. Control chart tests based on geometric moving averages. Technometrics, pages 239--250, 1959.
[17]
P. Syverson, R. Jansen, and N. J. Hopper. Throttling tor bandwidth parasites. Usenix Security, 2012.
[18]
C. Tang and I. Goldberg. An improved algorithm for Tor circuit scheduling. In Proceedings of the 17th ACM conference on Computer and communications security, pages 329--339. ACM, 2010.
[19]
F. Tschorsch and B. Scheuermann. Tor is unfair - And what to do about it. In Local Computer Networks (LCN), 2011 IEEE 36th Conference, pages 432--440. IEEE, 2011.
[20]
A. Vahdat, K. Yocum, K. Walsh, P. Mahadevan, D. Kostić, J. Chase, and D. Becker. Scalability and accuracy in a large-scale network emulator. ACM SIGOPS Operating Systems Review, 36(SI):271--284, 2002.

Cited By

View all
  • (2023)B-Tor: Anonymous communication system based on consortium blockchainPeer-to-Peer Networking and Applications10.1007/s12083-023-01514-916:5(2218-2241)Online publication date: 12-Jul-2023
  • (2022)QDRL: QoS-Aware Deep Reinforcement Learning Approach for Tor's Circuit SchedulingIEEE Transactions on Network Science and Engineering10.1109/TNSE.2022.31795699:5(3396-3410)Online publication date: 1-Sep-2022
  • (2021)QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport ProtocolIEEE Access10.1109/ACCESS.2021.30596729(28769-28784)Online publication date: 2021
  • Show More Cited By

Index Terms

  1. Torchestra: reducing interactive traffic delays over tor

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WPES '12: Proceedings of the 2012 ACM workshop on Privacy in the electronic society
      October 2012
      150 pages
      ISBN:9781450316637
      DOI:10.1145/2381966
      • General Chair:
      • Ting Yu,
      • Program Chair:
      • Nikita Borisov
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 October 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. bittorrent
      2. privacy
      3. tor

      Qualifiers

      • Research-article

      Conference

      CCS'12
      Sponsor:
      CCS'12: the ACM Conference on Computer and Communications Security
      October 15, 2012
      North Carolina, Raleigh, USA

      Acceptance Rates

      Overall Acceptance Rate 106 of 355 submissions, 30%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)B-Tor: Anonymous communication system based on consortium blockchainPeer-to-Peer Networking and Applications10.1007/s12083-023-01514-916:5(2218-2241)Online publication date: 12-Jul-2023
      • (2022)QDRL: QoS-Aware Deep Reinforcement Learning Approach for Tor's Circuit SchedulingIEEE Transactions on Network Science and Engineering10.1109/TNSE.2022.31795699:5(3396-3410)Online publication date: 1-Sep-2022
      • (2021)QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport ProtocolIEEE Access10.1109/ACCESS.2021.30596729(28769-28784)Online publication date: 2021
      • (2020)Out-of-the-box Multipath TCP as a Tor Transport Protocol: Performance and Privacy Implications2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)10.1109/NCA51143.2020.9306702(1-6)Online publication date: 24-Nov-2020
      • (2019)Point breakProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361465(1823-1840)Online publication date: 14-Aug-2019
      • (2019)Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)10.1109/IWCMC.2019.8766609(635-642)Online publication date: Jun-2019
      • (2018)KISTACM Transactions on Privacy and Security10.1145/327812122:1(1-37)Online publication date: 10-Dec-2018
      • (2018)Privacy-Preserving Dynamic Learning of Tor Network TrafficProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243815(1944-1961)Online publication date: 15-Oct-2018
      • (2018)A Survey on Routing in Anonymous Communication ProtocolsACM Computing Surveys10.1145/318265851:3(1-39)Online publication date: 12-Jun-2018
      • (2017)Traffic optimization in anonymous networks2017 13th International Conference on Network and Service Management (CNSM)10.23919/CNSM.2017.8255976(1-5)Online publication date: Nov-2017
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media