Improving security and performance in the tor network through tunable path selection

Robin Snader, Nikita Borisov

Research output: Contribution to journalArticlepeer-review

Abstract

The Tor anonymous communication network uses self-reported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, this allows a malicious router operator to attract tunnels for compromise. Although Tor limits the self-reported bandwidth, it uses a high maximum value, effectively choosing performance over high anonymity for all users. We propose a router selection algorithm that allows users to control the trade-off between performance and anonymity. We also propose an opportunistic bandwidth measurement algorithm to replace self-reported values that is more sensitive to load and more responsive to changing network conditions. Our mechanism effectively blends the traffic from users of different preferences, making partitioning attacks difficult. We implemented the opportunistic measurement and tunable performance extensions and examined their performance both through simulation and in the real Tor network. Our results show that users can get dramatic increases in either performance or anonymity with little to no sacrifice in the other metric, or a more modest improvement in both. Our mechanisms are also invulnerable to the previously published low-resource attacks on Tor.

Original languageEnglish (US)
Article number5560675
Pages (from-to)728-741
Number of pages14
JournalIEEE Transactions on Dependable and Secure Computing
Volume8
Issue number5
DOIs
StatePublished - 2011

Keywords

  • Anonymous communication
  • bandwidth estimation
  • path selection

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Improving security and performance in the tor network through tunable path selection'. Together they form a unique fingerprint.

Cite this