Proceedings of the 16th ACM Conference on Computer and Communications Security 2009
DOI: 10.1145/1653662.1653708
|View full text |Cite
|
Sign up to set email alerts
|

As-awareness in Tor path selection

Abstract: Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an anonymity network grows, it becomes more secure against a given observer because the observer will see less of the network. In particular, as the Tor network grows from volunteers operating relays all over the world, it becomes less and less likely for a single autonomous system (AS) to be able to observe both ends of an anonymous conne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
122
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 106 publications
(124 citation statements)
references
References 18 publications
0
122
1
Order By: Relevance
“…Different criteria have been proposed as possible factors in the path selection algorithm, such as autonomous system awareness [11], application awareness [24], or game-theoretic criteria for maximal utility [30]. In this paper, we describe a modification to Tor's existing path selection algorithm to incorporate latency, which reduces congestion and improves load balancing.…”
Section: Related Workmentioning
confidence: 99%
“…Different criteria have been proposed as possible factors in the path selection algorithm, such as autonomous system awareness [11], application awareness [24], or game-theoretic criteria for maximal utility [30]. In this paper, we describe a modification to Tor's existing path selection algorithm to incorporate latency, which reduces congestion and improves load balancing.…”
Section: Related Workmentioning
confidence: 99%
“…Other attacks study the potential threat of a (semi) global adversary (Murdoch and Zieliński [17], Edman and Syverson [6], Chakravarty et al [3]), although this does not fit into Tor's original adversary model. Specific attacks to Tor bridges and Hidden Services have been studied by McLachlan and Hopper [15], and by Murdoch [18], respectively.…”
Section: Related Workmentioning
confidence: 99%
“…Examples include the use of reputation-based strategies [32], opportunistic weighted network heuristics [30,33], game theory [34], and system awareness [35]. Compared to those previous efforts, whose goal mainly aim at reducing overhead via bandwidth measurements while addressing the classical threat model of Tor [4], our approach takes advantage of latency measurements, in order to best balance anonymity and performance.…”
Section: Related Workmentioning
confidence: 99%