DefenestraTor: Throwing out windows in Tor

Mashael Alsabah, Kevin Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, Geoffrey M. Voelker

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

Abstract

Tor is one of the most widely used privacy enhancing technologies for achieving online anonymity and resisting censorship. While conventional wisdom dictates that the level of anonymity offered by Tor increases as its user base grows, the most significant obstacle to Tor adoption continues to be its slow performance. We seek to enhance Tor's performance by offering techniques to control congestion and improve flow control, thereby reducing unnecessary delays. To reduce congestion, we first evaluate small fixed-size circuit windows and a dynamic circuit window that adaptively re-sizes in response to perceived congestion. While these solutions improve web page response times and require modification only to exit routers, they generally offer poor flow control and slower downloads relative to Tor's current design. To improve flow control while reducing congestion, we implement N23, an ATM-style per-link algorithm that allows Tor routers to explicitly cap their queue lengths and signal congestion via back-pressure. Our results show that N23 offers better congestion and flow control, resulting in improved web page response times and faster page loads compared to Tor's current design and other window-based approaches. We also argue that our proposals do not enable any new attacks on Tor users' privacy.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages134-154
Number of pages21
Volume6794 LNCS
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event11th International Symposium on Privacy Enhancing Technologies, PETS 2011 - Waterloo, ON
Duration: 27 Jul 201129 Jul 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6794 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other11th International Symposium on Privacy Enhancing Technologies, PETS 2011
CityWaterloo, ON
Period27/7/1129/7/11

Fingerprint

Flow Control
Flow control
Congestion
Congestion Control
Anonymity
Router
Routers
Response Time
Privacy
Websites
Networks (circuits)
Queue Length
Automatic teller machines
Continue
Attack
Evaluate
Design

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Alsabah, M., Bauer, K., Goldberg, I., Grunwald, D., McCoy, D., Savage, S., & Voelker, G. M. (2011). DefenestraTor: Throwing out windows in Tor. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6794 LNCS, pp. 134-154). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6794 LNCS). https://doi.org/10.1007/978-3-642-22263-4_8

DefenestraTor : Throwing out windows in Tor. / Alsabah, Mashael; Bauer, Kevin; Goldberg, Ian; Grunwald, Dirk; McCoy, Damon; Savage, Stefan; Voelker, Geoffrey M.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6794 LNCS 2011. p. 134-154 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6794 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Alsabah, M, Bauer, K, Goldberg, I, Grunwald, D, McCoy, D, Savage, S & Voelker, GM 2011, DefenestraTor: Throwing out windows in Tor. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 6794 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6794 LNCS, pp. 134-154, 11th International Symposium on Privacy Enhancing Technologies, PETS 2011, Waterloo, ON, 27/7/11. https://doi.org/10.1007/978-3-642-22263-4_8
Alsabah M, Bauer K, Goldberg I, Grunwald D, McCoy D, Savage S et al. DefenestraTor: Throwing out windows in Tor. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6794 LNCS. 2011. p. 134-154. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-22263-4_8
Alsabah, Mashael ; Bauer, Kevin ; Goldberg, Ian ; Grunwald, Dirk ; McCoy, Damon ; Savage, Stefan ; Voelker, Geoffrey M. / DefenestraTor : Throwing out windows in Tor. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6794 LNCS 2011. pp. 134-154 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{9d2344d090fc487fb14e691781a39ce0,
title = "DefenestraTor: Throwing out windows in Tor",
abstract = "Tor is one of the most widely used privacy enhancing technologies for achieving online anonymity and resisting censorship. While conventional wisdom dictates that the level of anonymity offered by Tor increases as its user base grows, the most significant obstacle to Tor adoption continues to be its slow performance. We seek to enhance Tor's performance by offering techniques to control congestion and improve flow control, thereby reducing unnecessary delays. To reduce congestion, we first evaluate small fixed-size circuit windows and a dynamic circuit window that adaptively re-sizes in response to perceived congestion. While these solutions improve web page response times and require modification only to exit routers, they generally offer poor flow control and slower downloads relative to Tor's current design. To improve flow control while reducing congestion, we implement N23, an ATM-style per-link algorithm that allows Tor routers to explicitly cap their queue lengths and signal congestion via back-pressure. Our results show that N23 offers better congestion and flow control, resulting in improved web page response times and faster page loads compared to Tor's current design and other window-based approaches. We also argue that our proposals do not enable any new attacks on Tor users' privacy.",
author = "Mashael Alsabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Voelker, {Geoffrey M.}",
year = "2011",
doi = "10.1007/978-3-642-22263-4_8",
language = "English",
isbn = "9783642222627",
volume = "6794 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "134--154",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - DefenestraTor

T2 - Throwing out windows in Tor

AU - Alsabah, Mashael

AU - Bauer, Kevin

AU - Goldberg, Ian

AU - Grunwald, Dirk

AU - McCoy, Damon

AU - Savage, Stefan

AU - Voelker, Geoffrey M.

PY - 2011

Y1 - 2011

N2 - Tor is one of the most widely used privacy enhancing technologies for achieving online anonymity and resisting censorship. While conventional wisdom dictates that the level of anonymity offered by Tor increases as its user base grows, the most significant obstacle to Tor adoption continues to be its slow performance. We seek to enhance Tor's performance by offering techniques to control congestion and improve flow control, thereby reducing unnecessary delays. To reduce congestion, we first evaluate small fixed-size circuit windows and a dynamic circuit window that adaptively re-sizes in response to perceived congestion. While these solutions improve web page response times and require modification only to exit routers, they generally offer poor flow control and slower downloads relative to Tor's current design. To improve flow control while reducing congestion, we implement N23, an ATM-style per-link algorithm that allows Tor routers to explicitly cap their queue lengths and signal congestion via back-pressure. Our results show that N23 offers better congestion and flow control, resulting in improved web page response times and faster page loads compared to Tor's current design and other window-based approaches. We also argue that our proposals do not enable any new attacks on Tor users' privacy.

AB - Tor is one of the most widely used privacy enhancing technologies for achieving online anonymity and resisting censorship. While conventional wisdom dictates that the level of anonymity offered by Tor increases as its user base grows, the most significant obstacle to Tor adoption continues to be its slow performance. We seek to enhance Tor's performance by offering techniques to control congestion and improve flow control, thereby reducing unnecessary delays. To reduce congestion, we first evaluate small fixed-size circuit windows and a dynamic circuit window that adaptively re-sizes in response to perceived congestion. While these solutions improve web page response times and require modification only to exit routers, they generally offer poor flow control and slower downloads relative to Tor's current design. To improve flow control while reducing congestion, we implement N23, an ATM-style per-link algorithm that allows Tor routers to explicitly cap their queue lengths and signal congestion via back-pressure. Our results show that N23 offers better congestion and flow control, resulting in improved web page response times and faster page loads compared to Tor's current design and other window-based approaches. We also argue that our proposals do not enable any new attacks on Tor users' privacy.

UR - http://www.scopus.com/inward/record.url?scp=79961205200&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79961205200&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-22263-4_8

DO - 10.1007/978-3-642-22263-4_8

M3 - Conference contribution

AN - SCOPUS:79961205200

SN - 9783642222627

VL - 6794 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 134

EP - 154

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -