[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2815675.2815701acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Ting: Measuring and Exploiting Latencies Between All Tor Nodes

Published: 28 October 2015 Publication History

Abstract

Tor is a peer-to-peer overlay routing network that achieves unlinkable communication between source and destination.Unlike traditional mix-nets, Tor seeks to balance anonymity and performance, particularly with respect to providing low-latency communication. As a result, understanding the latencies between peers in the Tor network could be an extremely powerful tool in understanding and improving Tor's performance and anonymity properties. Unfortunately, there are no practical techniques for inferring accurate latencies between two arbitrary hosts on the Internet, and Tor clients are not instrumented to collect and report on these measurements. In this paper, we present Ting, a technique for measuring latencies between arbitrary Tor nodes from a single vantage point. Through a ground-truth validation, we show that Ting is accurate, even with few samples, and does not require modifications to existing clients. We also apply Ting to the live Tor network, and show that its measurements are stable over time. We demonstrate that the all-pairs latency datasets that Ting permits can be applied in disparate ways, including faster methods of deanonymizing Tor circuits and efficiently finding long circuits with low end-to-end latency.

References

[1]
S. Agarwal and J. R. Lorch. Matchmaking for online games and other latency-sensitive P2P systems. In ACM SIGCOMM, 2009.
[2]
M. Akhoondi, C. Yu, and H. V. Madhyastha. LASTor: A low-latency AS-aware Tor client. In IEEE Symposium on Security and Privacy, 2013.
[3]
E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S. M. Bellovin. PAR: Payment for anonymous routing. In Symposium on Privacy Enhancing Technologies (PETS), 2008.
[4]
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84--88, Nov. 1981.
[5]
Y. Chen, R. Sion, and B. Carbunar. XPay: Practical anonymous payments for Tor routing and other networked services. In Workshop on Privacy in the Electronic Society (WPES), 2009.
[6]
R. Cox, F. Dabek, F. Kaashoek, J. Li, and R. Morris. Practical, distributed network coordinates. In Workshop on Hot Topics in Networks (HotNets), 2003.
[7]
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In USENIX Security Symposium, 2004.
[8]
R. Dingledine and S. J. Murdoch. Performance improvements on Tor or, why Tor is slow and what we're going to do about it. Online: https://www.torproject.org/press/presskit/2009-03--11-performance.pdf, 2009.
[9]
N. S. Evans, R. Dingledine, and C. Grothoff. A practical congestion attack on Tor using long paths. In USENIX Security Symposium, 2009.
[10]
Y. Gilad and A. Herzberg. Spying in the dark: TCP and Tor traffic analysis. In Privacy Enhancing Technologies, pages 100--119. Springer, 2012.
[11]
K. P. Gummadi, S. Saroiu, and S. D. Gribble. King: Estimating latency between arbitrary Internet end hosts. In ACM Internet Measurement Workshop (IMW), 2002.
[12]
N. Hopper, E. Y. Vasserman, and E. Chan-Tin. How much anonymity does network latency leak? ACM Transactions on Information and System Security (TISSEC), 13(2):13, 2010.
[13]
R. Jansen, J. Geddes, C. Wacek, M. Sherr, and P. Syverson. Never been KIST: Tor's congestion management blossoms with kernel-informed socket transport. In USENIX Security Symposium, 2014.
[14]
A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson. Users get routed: Traffic correlation on Tor by realistic adversaries. 2013.
[15]
C. Lumezanu, R. Baden, D. Levin, N. Spring, and B. Bhattacharjee. Symbiotic relationships in Internet routing overlays. In Symposium on Networked Systems Design and Implementation (NSDI), 2009.
[16]
S. J. Murdoch and G. Danezis. Low-cost traffic analysis of Tor. In USENIX Security Symposium, 2005.
[17]
Neustar IP Geolocation.hrefhttps://www.neustar.biz/services/ip-intelligence https://www.neustar.biz/services/ip-intelligence.
[18]
T. E. Ng and H. Zhang. Towards global network positioning. In ACM Internet Measurement Workshop (IMW), 2001.
[19]
T.-W. Ngan, R. Dingledine, and D. S. Wallach. Building incentives into Tor. In Financial Cryptography (FC), 2010.
[20]
A. Panchenko and J. Renner. Path selection metrics for performance-improved onion routing. In Symposium on Applications and the Internet (SAINT), 2009.
[21]
L. Peterson, T. Anderson, D. Culler, and T. Roscoe. A blueprint for introducing disruptive technology into the Internet. In Workshop on Hot Topics in Networks (HotNets), 2002.
[22]
M. K. Reiter and A. D. Rubin. Crowds: Anonymity for web transactions. ACM TISSEC, 1(1):66--92, Nov. 1998.
[23]
Reporters Without Borders. Enemies of the Internet 2013 Report. https://surveillance.rsf.org/en/wp-content/uploads/sites/2/2013/03/enemies-of-the-internet_2013.pdf, Mar. 2013.
[24]
RIPE NCC. RIPE Atlas. https://atlas.ripe.net.
[25]
SamKnows. https://www.samknows.com.
[26]
S. Savage, A. Collins, E. Hoffman, J. Snell, and T. Anderson. The end-to-end effects of Internet path selection. In ACM SIGCOMM, 1999.
[27]
A. Schulman and N. Spring. Pingin' in the rain. In ACM Internet Measurement Conference (IMC), 2011.
[28]
M. Sherr, M. Blaze, and B. T. Loo. Scalable link-based relay selection for anonymous routing. In Privacy Enhancing Technologies Symposium (PETS), 2009.
[29]
R. Sherwood, B. Bhattacharjee, and A. Srinivasan. P5: A protocol for scalable anonymous communication. Journal of Computer Security, 13(6):839--876, 2005.
[30]
Stem Controller Library. https://stem.torproject.org.
[31]
S. Sundaresan, S. Burnett, N. Feamster, and W. De Donato. BISmark: A testbed for deploying measurements and applications in broadband access networks. In USENIX Annual Technical Conference, 2014.
[32]
Tor Metrics. https://metrics.torproject.org.
[33]
B. Wong, I. Stoyanov, and E. G. Sirer. Octant: A comprehensive framework for the geolocalization of Internet hosts. In Symposium on Networked Systems Design and Implementation (NSDI), 2007.

Cited By

View all
  • (2023)PTPerf: On the Performance Evaluation of Tor Pluggable TransportsProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624817(501-525)Online publication date: 24-Oct-2023
  • (2023)Provably Avoiding Geographic Regions for Tor’s Onion ServicesFinancial Cryptography and Data Security10.1007/978-3-031-47754-6_17(289-305)Online publication date: 1-Dec-2023
  • (2022)FlyMonProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544239(486-502)Online publication date: 22-Aug-2022
  • Show More Cited By

Index Terms

  1. Ting: Measuring and Exploiting Latencies Between All Tor Nodes

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        IMC '15: Proceedings of the 2015 Internet Measurement Conference
        October 2015
        550 pages
        ISBN:9781450338486
        DOI:10.1145/2815675
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 28 October 2015

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. deanonymization
        2. latency measurement
        3. tor

        Qualifiers

        • Research-article

        Funding Sources

        • Amazon Web Services in Education
        • National Science Foundation
        • National Security Agency

        Conference

        IMC '15
        Sponsor:
        IMC '15: Internet Measurement Conference
        October 28 - 30, 2015
        Tokyo, Japan

        Acceptance Rates

        IMC '15 Paper Acceptance Rate 31 of 96 submissions, 32%;
        Overall Acceptance Rate 277 of 1,083 submissions, 26%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)21
        • Downloads (Last 6 weeks)4
        Reflects downloads up to 06 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)PTPerf: On the Performance Evaluation of Tor Pluggable TransportsProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624817(501-525)Online publication date: 24-Oct-2023
        • (2023)Provably Avoiding Geographic Regions for Tor’s Onion ServicesFinancial Cryptography and Data Security10.1007/978-3-031-47754-6_17(289-305)Online publication date: 1-Dec-2023
        • (2022)FlyMonProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544239(486-502)Online publication date: 22-Aug-2022
        • (2022)SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent CensorshipsIEEE Transactions on Services Computing10.1109/TSC.2019.294259815:1(346-360)Online publication date: 1-Jan-2022
        • (2022)ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833619(1933-1952)Online publication date: May-2022
        • (2021)Achieving Sender Anonymity in Tor against the Global Passive AdversaryApplied Sciences10.3390/app1201013712:1(137)Online publication date: 23-Dec-2021
        • (2021)uScopeProceedings of the Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing10.1145/3466772.3467046(171-180)Online publication date: 26-Jul-2021
        • (2021)BentoProceedings of the 2021 ACM SIGCOMM 2021 Conference10.1145/3452296.3472919(821-835)Online publication date: 9-Aug-2021
        • (2021)We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor2021 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP51992.2021.00030(319-336)Online publication date: Sep-2021
        • (2021)Extending Routes in Tor to Achieve Recipient Anonymity against the Global Adversary2021 International Conference on Cyberworlds (CW)10.1109/CW52790.2021.00048(238-245)Online publication date: Sep-2021
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media