Lab Home | Phone | Search
Center for Nonlinear Studies  Center for Nonlinear Studies
 Home 
 People 
 Current 
 Affiliates 
 Visitors 
 Students 
 Research 
 ICAM-LANL 
 Publications 
 Conferences 
 Workshops 
 Sponsorship 
 Talks 
 Colloquia 
 Colloquia Archive 
 Seminars 
 Postdoc Seminars Archive 
 Quantum Lunch 
 Quantum Lunch Archive 
 CMS Colloquia 
 Q-Mat Seminars 
 Q-Mat Seminars Archive 
 P/T Colloquia 
 Archive 
 Kac Lectures 
 Kac Fellows 
 Dist. Quant. Lecture 
 Ulam Scholar 
 Colloquia 
 
 Jobs 
 Postdocs 
 CNLS Fellowship Application 
 Students 
 Student Program 
 Visitors 
 Description 
 Past Visitors 
 Services 
 General 
 
 History of CNLS 
 
 Maps, Directions 
 CNLS Office 
 T-Division 
 LANL 
 
Thursday, October 27, 2011
4:00 PM - 5:00 PM
CNLS Conference Room (TA-3, Bldg 1690)

Seminar

Improving Security and Performance in Low-Latency Anonymity Networks

Kevin Bauer
University of Waterloo

Tor is a popular overlay network providing low-latency anonymous communications on the Internet. Tor provides source and destination anonymity for TCP-based applications by routing the user's traffic through a group of volunteer-operated relays located around the world. In this talk, we present an overview of our research from over the past five years to improve Tor's security and anonymity, understand how Tor is used and misused in practice, and diagnose the sources of Tor's slow performance and develop solutions.

First, we show that Tor is vulnerable to attacks launched by resource-constrained adversaries who inflate their perceived bandwidth capacities to attract traffic. We develop a novel low-cost traffic analysis technique that utilizes only limited information from circuit establishment messages to link senders and receivers, thereby compromising the system's anonymity. We highlight partial solutions to this attack, but argue that Tor still remains vulnerable today.

Next, we present the findings of a measurement study aimed at better understanding how Tor is used (and mis-used) and who uses Tor. We find that interactive web traffic comprises the majority of Tor's traffic by number of TCP connections and aggregate volume, but non-interactive peer-to-peer file sharing traffic consumes a disproportionate and unfair amount of the network's scarce bandwidth. We also present evidence that Tor is used throughout the world, yet volunteer routers are generally hosted in only a few countries.

Lastly, we highlight our efforts to understand the sources of Tor's slow performance. To facilitate large-scale experimentation with Tor, we developed a network emulation-based testbed that replicates the salient features of the live Tor network such as Tor's overlay topology and the clients' traffic characteristics in isolation. Using this testbed, we observe that Tor's end-to-end flow control mechanism allows significant congestion which degrades the network's performance, particularly for delay-sensitive interactive web users. To control this congestion and offer a better quality of service to interactive users, we design and evaluate improved congestion control and flow control algorithms inspired by techniques from ATM networks.

Host: Mike Fisk