2011
DOI: 10.21236/ada559181
|View full text |Cite
|
Sign up to set email alerts
|

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation

Abstract: Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
114
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 106 publications
(115 citation statements)
references
References 25 publications
0
114
0
Order By: Relevance
“…In contrast to real-world implementations, the simplistic workload models used in these studies assume that web pages are retrieved within a single roundtrip or within a single TCP connection. Note that this discrepancy does not necessarily mean that the results obtained in [17,23,25] are wrong (the authors do consider the limitations of their models when drawing conclusions). As we strive for more realistic evaluations and we want to validate and compare the results obtained in previous studies, we have designed a more comprehensive and accurate traffic model which will be described in the next section.…”
Section: Existing Approaches For the Evaluation Of Petsmentioning
confidence: 98%
See 2 more Smart Citations
“…In contrast to real-world implementations, the simplistic workload models used in these studies assume that web pages are retrieved within a single roundtrip or within a single TCP connection. Note that this discrepancy does not necessarily mean that the results obtained in [17,23,25] are wrong (the authors do consider the limitations of their models when drawing conclusions). As we strive for more realistic evaluations and we want to validate and compare the results obtained in previous studies, we have designed a more comprehensive and accurate traffic model which will be described in the next section.…”
Section: Existing Approaches For the Evaluation Of Petsmentioning
confidence: 98%
“…Noticeable examples are the network simulator Shadow [17] and the emulation testbed ExperimenTor [5]. Both systems try to accurately model the topology and routing mechanism (Component C ) of the Tor network [11], which is the most popular anonymity system at the moment.…”
Section: Existing Approaches For the Evaluation Of Petsmentioning
confidence: 99%
See 1 more Smart Citation
“…Shadow enables us to efficiently run accurate Tor Network experiments by modeling live network characteristics such as relay contributed bandwidth, bandwidth distribution from entry, middle, and exit relays, and geographic distributions of relays [16,18]. Shadow runs real Tor software that allows researchers to experiment with modifications to Tor by directly modifying the Tor source code.…”
Section: Network Performancementioning
confidence: 99%
“…The length of the pause is drawn from the UNC think-time distribution [12]. This distribution is also used by Jansen and Hopper [13] when simulating Tor users activity in their Shadow simulator. In our evaluation, we focused only on the time it takes for the HTTP client to connect to the web server hosting the page, as our client puzzle protocol affects solely the creation of the circuits.…”
Section: Testing and Evaluationmentioning
confidence: 99%