ProbFlow: Using Probabilistic Programming in Anonymous Communication Networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

—We present ProbFlow, a probabilistic programming approach for estimating relay capacities in the Tor network. We refine previously derived probabilistic model of the network to take into account more of the complexity of the real-world Tor network. We use this model to perform inference in a probabilistic programming language called NumPyro which allows us to overcome the analytical barrier present in purely analytical approach. We integrate the implementation of ProbFlow to the current implementation of capacity estimation algorithms in the Tor network. We demonstrate the practical benefits of ProbFlow by simulating it in flow-based Python simulator and packet-based Shadow simulations, the highest fidelity simulator available for the Tor network. In both simulators, ProbFlow provides significantly more accurate estimates that results in improved user performance, with average download speeds increasing by 25% in the Shadow simulations.

Original languageEnglish (US)
Title of host publication30th Annual Network and Distributed System Security Symposium, NDSS 2023
PublisherThe Internet Society
ISBN (Electronic)1891562835, 9781891562839
DOIs
StatePublished - 2023
Event30th Annual Network and Distributed System Security Symposium, NDSS 2023 - San Diego, United States
Duration: Feb 27 2023Mar 3 2023

Publication series

Name30th Annual Network and Distributed System Security Symposium, NDSS 2023

Conference

Conference30th Annual Network and Distributed System Security Symposium, NDSS 2023
Country/TerritoryUnited States
CitySan Diego
Period2/27/233/3/23

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'ProbFlow: Using Probabilistic Programming in Anonymous Communication Networks'. Together they form a unique fingerprint.

Cite this