|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Improving Tor using a TCP-over-DTLS Tunnel
If you have a question about this talk, please contact Andrew Lewis.
The Tor network gives anonymity to Internet users by relaying their traffic through the world over a variety of routers. This incurs undesirable latency, and we explore where this latency occurs. Experiments discount transport latency and computational latency to determine there is a substantial component that is caused by delay. We determine that congestion control is causing the delay.
Tor multiplexes multiple streams of data over a single TCP connection. This is not the proper use of TCP , and as such results in the improper application of congestion control. We illustrate an example of this occurrence on a Tor node in the wild and also illustrate how packet dropping and reordering cause interference between the multiplexed streams.
Our solution is to use a TCP -over-DTLS transport between routers, and give each stream of data its own TCP connection. We give our design for our proposal, and show experiments evidence to illustrate that our proposal has in fact resolved the multiplexing issues discovered in our system performance analysis. The future work gives a number of steps towards optimizing and improving our work.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsInstitute of Astronomy Extra Talks Economic Epidemiology Seminar Series (supported by CReMic) John Ray Society
Other talksBarrier-Aware Warp Scheduling for Throughput Processors White Dwarf Planetary Systems From Art School to Worms Nuclear fusion Inhibition of phagocytosis by extracellular pathogens enteropathogenic and enterohaemorrhagic Escherichia coli Unlocking the potential of synthetic biology to enhance human health