usenix conference policies
Methodically Modeling the Tor Network
Rob Jansen, U.S. Naval Research Laboratory; Kevin Bauer, University of Waterloo; Nicholas Hopper, University of Minnesota; Roger Dingledine, The Tor Project
Live Tor network experiments are difficult due to Tor’s distributed nature and the privacy requirements of its client base. Alternative experimentation approaches, such as simulation and emulation, must make choices about how to model various aspects of the Internet and Tor that are not possible or not desirable to duplicate or implement directly. This paper methodically models the Tor network by exploring and justifying every modeling choice required to produce accurate Tor experimentation environments. We validate our model using two state-of-the-art Tor experimentation tools and measurements from the live Tor network. We find that our model enables experiments that characterize Tor’s load and performance with reasonable accuracy.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
title = {Methodically Modeling the Tor Network},
booktitle = {5th Workshop on Cyber Security Experimentation and Test (CSET 12)},
year = {2012},
address = {Bellevue, WA},
url = {https://www.usenix.org/conference/cset12/workshop-program/presentation/Jansen},
publisher = {USENIX Association},
month = aug
}
connect with us