|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Improving Tor using a TCP-over-DTLS Tunnel
If you have a question about this talk, please contact Andrew Lewis.
The Tor network gives anonymity to Internet users by relaying their traffic through the world over a variety of routers. This incurs undesirable latency, and we explore where this latency occurs. Experiments discount transport latency and computational latency to determine there is a substantial component that is caused by delay. We determine that congestion control is causing the delay.
Tor multiplexes multiple streams of data over a single TCP connection. This is not the proper use of TCP , and as such results in the improper application of congestion control. We illustrate an example of this occurrence on a Tor node in the wild and also illustrate how packet dropping and reordering cause interference between the multiplexed streams.
Our solution is to use a TCP -over-DTLS transport between routers, and give each stream of data its own TCP connection. We give our design for our proposal, and show experiments evidence to illustrate that our proposal has in fact resolved the multiplexing issues discovered in our system performance analysis. The future work gives a number of steps towards optimizing and improving our work.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsMuseum of Zoology Molecular, Structural & Cellular Microbiology DAK Group Meetings
Other talksFrom C to Proton Sea: Bjorken-x Dependence of the Parton Distribution Functions Neutrophil transmigration in vivo: Modes, mechanisms and pathogenesis Britain and the Continent: two thousand years of unpredictability The nucleosome remodeler Mi-2/CHD4 - complexes, regulation and cancer Solar energy with a twist: dynamic disorder in halide perovskites tba