Improving Security and Performance in the Tor Network through Tunable Path Selection

  • Authors:
  • Robin Snader;Nikita Borisov

  • Affiliations:
  • University of Illinois at Urbana-Champaign, Urbana;University of Illinois at Urbana-Chamapign, Urbana

  • Venue:
  • IEEE Transactions on Dependable and Secure Computing
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Tor anonymous communication network uses self-reported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, this allows a malicious router operator to attract tunnels for compromise. Although Tor limits the self-reported bandwidth, it uses a high maximum value, effectively choosing performance over high anonymity for all users. We propose a router selection algorithm that allows users to control the trade-off between performance and anonymity. We also propose an opportunistic bandwidth measurement algorithm to replace self-reported values that is more sensitive to load and more responsive to changing network conditions. Our mechanism effectively blends the traffic from users of different preferences, making partitioning attacks difficult. We implemented the opportunistic measurement and tunable performance extensions and examined their performance both through simulation and in the real Tor network. Our results show that users can get dramatic increases in either performance or anonymity with little to no sacrifice in the other metric, or a more modest improvement in both. Our mechanisms are also invulnerable to the previously published low-resource attacks on Tor.