Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor...
Transcript of Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor...
![Page 1: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/1.jpg)
Methodically Modeling the Tor Network
Workshop on Cyber Security Experimentation and Test
2012
Rob Jansen - U.S. Naval Research LaboratoryKevin Bauer – University of Waterloo
Nick Hopper – University of MinnesotaRoger Dingledine – The Tor Project
![Page 2: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/2.jpg)
2
![Page 3: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/3.jpg)
3
![Page 4: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/4.jpg)
4
![Page 5: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/5.jpg)
5
![Page 6: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/6.jpg)
6
![Page 7: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/7.jpg)
7
![Page 8: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/8.jpg)
8
![Page 9: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/9.jpg)
9
![Page 10: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/10.jpg)
10
![Page 11: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/11.jpg)
11
![Page 12: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/12.jpg)
12
![Page 13: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/13.jpg)
13
![Page 14: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/14.jpg)
14
![Page 15: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/15.jpg)
15
![Page 16: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/16.jpg)
16
![Page 17: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/17.jpg)
17
![Page 18: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/18.jpg)
![Page 19: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/19.jpg)
![Page 20: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/20.jpg)
![Page 21: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/21.jpg)
![Page 22: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/22.jpg)
22
Tor ExperimentationPros Cons
Live Tor Realistic, accurateHard to manage, privacy risks, lengthy deployment
![Page 23: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/23.jpg)
23
Tor ExperimentationPros Cons
Live Tor Realistic, accurateHard to manage, privacy risks, lengthy deployment
PlanetLab RealisticHard to manage, not scalable, inaccurate
![Page 24: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/24.jpg)
![Page 25: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/25.jpg)
![Page 26: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/26.jpg)
![Page 27: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/27.jpg)
![Page 28: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/28.jpg)
![Page 29: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/29.jpg)
29
Modeling Decisions
➔ Network topology → clustering by country➔ Network latency → iPlane trace-routes➔ Node bandwidth capacity → Net Index➔ Tor relay sample → bin-median sampling➔ Tor relay bandwidth rates → Tor metrics➔ Tor web clients → 320 KiB, think [1,20] seconds➔ Tor bulk clients → 5 MiB, no thinking➔ Client, server placement → Tor metrics
![Page 30: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/30.jpg)
![Page 31: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/31.jpg)
![Page 32: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/32.jpg)
![Page 33: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/33.jpg)
![Page 34: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/34.jpg)
![Page 35: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.](https://reader033.fdocuments.in/reader033/viewer/2022060821/6099edfbd9bf2a20bb599c42/html5/thumbnails/35.jpg)