IMUX: Managing tor connections from two to infinity, and beyond

John Geddes, Rob Jansen, Nicholas Hopper

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

We consider proposals to improve the performance of the Tor overlay network by increasing the number of connections between relays, such as Torchestra and PCTCP. We introduce a new class of attacks that can apply to these designs, socket exhaustion, and show that these attacks are effective against PCTCP. We also describe IMUX, a design that generalizes the principles behind these designs while still mitigating against socket exhaustion attacks. We demonstrate empirically that IMUX resists socket exhaustion while finding that web clients can realize up to 25% increase in performance compared to Torchestra. Finally, we empirically evaluate the interaction between these designs and the recently proposed KIST design, which aims to improve performance by intelligently scheduling kernel socket writes.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages181-190
Number of pages10
ISBN (Electronic)9781450331487
DOIs
StatePublished - Nov 3 2014
Event13th Workshop on Privacy in the Electronic Society, WPES 2014, in Conjunction with the ACM Conference on Computer and Communications Security, ACM CCS 2014 - Scottsdale, United States
Duration: Nov 3 2014 → …

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other13th Workshop on Privacy in the Electronic Society, WPES 2014, in Conjunction with the ACM Conference on Computer and Communications Security, ACM CCS 2014
CountryUnited States
CityScottsdale
Period11/3/14 → …

Keywords

  • Anonymity
  • Attack
  • Performance
  • Privacy
  • Socket exhaustion
  • Tor

Fingerprint Dive into the research topics of 'IMUX: Managing tor connections from two to infinity, and beyond'. Together they form a unique fingerprint.

Cite this