Browsing by Author "Jansen, Rob"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item Appendices to Accompany "Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport"(2014-06-06) Jansen, Rob; Geddes, John; Wacek, Chris; Sherr, Micah; Syverson, PaulThis document provides appendices to accompany the publication entitled “Never Been KIST: Tor’s Con- gestion Management Blossoms with Kernel-Informed Socket Transport” to appear in the Proceedings of the 23rd USENIX Security Symposium, 2014.Item Shadow: Running Tor in a Box for Accurate and Efficient Experimentation(2011-09-23) Jansen, Rob; Hopper, Nicholas J.Tor is a large and popular overlay network providing both anonymity to its users and a platform for anonymous communication research. New design proposals and attacks on the system are challenging to test in the live network because of deployment issues and the risk of invading users' privacy, while alternative Tor experimentation techniques are limited in scale, are inaccurate, or create results that are difficult to reproduce or verify. We present the design and implementation of Shadow, an architecture for efficiently running accurate Tor experiments on a single machine. We validate Shadow's accuracy with a private Tor deployment on PlanetLab and a comparison to live network performance statistics. To demonstrate Shadow's powerful capabilities, we investigate circuit scheduling and find that the EWMA circuit scheduler reduces aggregate client performance under certain loads when deployed to the entire Tor network. Our software is open source and available for download.Item Throttling Tor Bandwidth Parasites(2011-09-23) Jansen, Rob; Syverson, Paul; Hopper, Nicholas J.Tor's network congestion and performance problems stem from a small percentage of users that consume a large fraction of available relay bandwidth. These users continuously drain relays of excess bandwidth, creating new network bottlenecks and exacerbating the effects of existing ones. Attacking the problem at its source, we present the design of three new algorithms that throttle clients to reduce network congestion and increase interactive client performance. Unlike existing techniques, our algorithms adaptively adjust throttling parameters given only information local to a relay. We implement our algorithms in Tor and compare significant client performance benefits using network-wide deployments of our algorithms under a variety of network loads. We also analyze the effects of throttling on anonymity and compare the security of our algorithms under adversarial attack. Software patches for our algorithms will be submitted to Tor.