• Corpus ID: 231861497

Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation

  title={Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation},
  author={Rob Jansen and Justin Tracey and Ian Goldberg},
  booktitle={USENIX Security Symposium},
Tor is a popular low-latency anonymous communication system that focuses on usability and performance: a faster network will attract more users, which in turn will improve the anonymity of everyone using the system. The standard practice for previous research attempting to enhance Tor performance is to draw conclusions from the observed results of a single simulation for standard Tor and for each research variant. But because the simulations are run in sampled Tor networks, it is possible that… 
From “Onion Not Found” to Guard Discovery
A novel web-based attack that identifies a Tor user’s guard in a matter of seconds and a set of countermeasures against the attack including a defense that is developed based on a token bucket and the recently proposed Vanguards-lite defense in Tor are evaluated.
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges
It is shown that PredicTor is highly effective in reducing latency and realizing fair rate allocations, enabling the development of improved, future congestion control.
Towards Flexible Anonymous Networks
This work proposes FAN for Flexible Anonymous Network, a new software architecture for volunteer-based distributed networks that shifts the dependence away from protocol tolerance without losing the ability for the developers to ensure the continuous evolution of their software.
Towards Reproducible Network Traffic Analysis
PcapML is introduced, an open source system which increases reproducibility of network traffic analysis research by enabling metadata information to be directly encoded into raw traffic captures in a generic manner and is used to create the pcapML benchmarks.


High Performance Tor Experimentation from the Magic of Dynamic ELFs
This paper analyzes Shadow’s design and finds significant performance bottlenecks in its logging and work scheduling systems stemming from its representation of simulated processes and its use of a globally shared process namespace.
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
The design and implementation of Shadow is presented, an architecture for efficiently running accurate Tor experiments on a single machine and circuit scheduling is investigated and it is found that the EWMA circuit scheduler reduces aggregate client performance under certain loads when deployed to the entire Tor network.
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
A case study of measuring two different types of sensitive data in the Tor network: countries of connecting clients, and exiting traffic by port is presented, and general guidelines for safely measuring potentially sensitive data are derived.
An Empirical Evaluation of Relay Selection in Tor
This paper explores the anonymity and performance trade-offs of the proposed relay selection techniques using highly accurate topological models that capture the actual Tor network’s autonomous system (AS) boundaries, points-of-presence, inter-relay latencies, and relay performance characteristics.
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation
The design of ExperimenTor is presented, a large-scale Tor network emulation toolkit and testbed, and the early experiences with prototype testbeds currently deployed at four research institutions are reported.
Tor Experimentation Tools
An overview and discussion of existing techniques and tools used for Tor experimentation by categorizing techniques and highlighting advantages and limitations of each tool to provide researchers with the necessary information for selecting the optimal Tor research tool depending on their specific requirements and possibilities.
Large-Scale Emulation of Anonymous Communication Networks
SNEAC (Scalable Network Emulator for Anonymous Communication; pronounced “sneak”), a large-scale network emulator that allows us to emulate a network with thousands of nodes that can more closely emulate the live Tor network with half a million users.
Methodically Modeling the Tor Network
This paper methodically models the Tor network by exploring and justifying every modeling choice required to produce accurate Tor experimentation environments and finds that this model enables experiments that characterize Tor's load and performance with reasonable accuracy.
Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise
This paper argues the very counterintuitive notion that slowing down traffic on Tor will increase the bandwidth capacity of the network and consequently improve the experience of interactive web users and introduces Tortoise, a system for rate limiting Tor at its ingress points.
Safely Measuring Tor
This work presents PrivCount, a system for measuring the Tor network designed with user privacy as a primary goal, which securely aggregates measurements across Tor relays and over time to produce differentially private outputs.