Abstract | ||
---|---|---|
We consider proposals to improve the performance of the Tor overlay network by increasing the number of connections between re- lays, such as Torchestra and PCTCP. We introduce a new class of attacks that can apply to these designs, socket exhaustion, and show that these attacks are effective against PCTCP. We also describe IMUX, a design that generalizes the principles behind these designs while still mitigating against socket exhaustion attacks. We demonstrate empirically that IMUX resists socket exhaustion while finding that web clients can realize up to 25% increase in performance compared to Torchestra. Finally, we empirically evaluate the interaction between these designs and the recently proposed KIST design, which aims to improve performance by intelligently scheduling kernel socket writes. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1145/2665943.2665948 | WPES |
Keywords | Field | DocType |
security and protection,anonymity,tor,attack,socket exhaustion,performance,scheduling,cryptography,communications protocols,network architecture,performance engineering,computer network security,internet | Internet privacy,Computer security,Cryptography,Computer science,Scheduling (computing),Network security,Computer network,Network architecture,Anonymity,Overlay network,The Internet,Communications protocol | Conference |
Citations | PageRank | References |
6 | 0.46 | 20 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
John Geddes | 1 | 14 | 0.92 |
Rob Jansen | 2 | 283 | 16.78 |
Nicholas Hopper | 3 | 1469 | 95.76 |