Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
2011-09-23
Loading...
View/Download File
Persistent link to this item
Statistics
View StatisticsJournal Title
Journal ISSN
Volume Title
Title
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
Alternative title
Authors
Published Date
2011-09-23
Publisher
Type
Report
Abstract
Tor is a large and popular overlay network providing both anonymity to its users and a platform for anonymous communication research. New design proposals and attacks on the system are challenging to test in the live network because of deployment issues and the risk of invading users' privacy, while alternative Tor experimentation techniques are limited in scale, are inaccurate, or create results that are difficult to reproduce or verify. We present the design and implementation of Shadow, an architecture for efficiently running accurate Tor experiments on a single machine. We validate Shadow's accuracy with a private Tor deployment on PlanetLab and a comparison to live network performance statistics. To demonstrate Shadow's powerful capabilities, we investigate circuit scheduling and find that the EWMA circuit scheduler reduces aggregate client performance under certain loads when deployed to the entire Tor network. Our software is open source and available for download.
Keywords
Description
Related to
Replaces
License
Series/Report Number
Technical Report; 11-020
Funding information
Isbn identifier
Doi identifier
Previously Published Citation
Other identifiers
Suggested citation
Jansen, Rob; Hopper, Nicholas J.. (2011). Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/215867.
Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.