IMUX: Managing tor connections from two to infinity, and beyond

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Abstract

We consider proposals to improve the performance of the Tor overlay network by increasing the number of connections between relays, such as Torchestra and PCTCP. We introduce a new class of attacks that can apply to these designs, socket exhaustion, and show that these attacks are effective against PCTCP. We also describe IMUX, a design that generalizes the principles behind these designs while still mitigating against socket exhaustion attacks. We demonstrate empirically that IMUX resists socket exhaustion while finding that web clients can realize up to 25% increase in performance compared to Torchestra. Finally, we empirically evaluate the interaction between these designs and the recently proposed KIST design, which aims to improve performance by intelligently scheduling kernel socket writes.

Original languageEnglish (US)
Title of host publicationWPES 2014 - Proceedings of the 2014 ACM Workshop on Privacy in the Electronic Society, Co-located with CCS 2014
PublisherAssociation for Computing Machinery
Pages181-190
Number of pages10
ISBN (Electronic)9781450331487
DOIs
StatePublished - Nov 3 2014
Event13th Workshop on Privacy in the Electronic Society, WPES 2014, in Conjunction with the ACM Conference on Computer and Communications Security, ACM CCS 2014 - Scottsdale, United States
Duration: Nov 3 2014 → …

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other13th Workshop on Privacy in the Electronic Society, WPES 2014, in Conjunction with the ACM Conference on Computer and Communications Security, ACM CCS 2014
Country/TerritoryUnited States
CityScottsdale
Period11/3/14 → …

Bibliographical note

Publisher Copyright:
Copyright © 2014 ACM.

Keywords

  • Anonymity
  • Attack
  • Performance
  • Privacy
  • Socket exhaustion
  • Tor

Fingerprint

Dive into the research topics of 'IMUX: Managing tor connections from two to infinity, and beyond'. Together they form a unique fingerprint.

Cite this