• DocumentCode
    2554875
  • Title

    LASTor: A Low-Latency AS-Aware Tor Client

  • Author

    Akhoondi, Masoud ; Yu, Chu ; Madhyastha, Harsha V.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Univ. of California, Riverside, CA, USA
  • fYear
    2012
  • fDate
    20-23 May 2012
  • Firstpage
    476
  • Lastpage
    490
  • Abstract
    The widely used Tor anonymity network is designed to enable low-latency anonymous communication. However, in practice, interactive communication on Tor-which accounts for over 90% of connections in the Tor network [1]-incurs latencies over 5x greater than on the direct Internet path. In addition, since path selection to establish a circuit in Tor is oblivious to Internet routing, anonymity guarantees can breakdown in cases where an autonomous system (AS) can correlate traffic across the entry and exit segments of a circuit. In this paper, we show that both of these shortcomings in Tor can be addressed with only client-side modifications, i.e., without requiring a revamp of the entire Tor architecture. To this end, we design and implement a new Tor client, LASTor. First, we show that LASTor can deliver significant latency gains over the default Tor client by simply accounting for the inferred locations of Tor relays while choosing paths. Second, since the preference for low latency paths reduces the entropy of path selection, we design LASTor´s path selection algorithm to be tunable. A user can choose an appropriate tradeoff between latency and anonymity by specifying a value between 0 (lowest latency) and 1 (highest anonymity) for a single parameter. Lastly, we develop an efficient and accurate algorithm to identify paths on which an AS can correlate traffic between the entry and exit segments. This algorithm enables LASTor to avoid such paths and improve a user´s anonymity, while the low runtime of the algorithm ensures that the impact on end-to-end latency of communication is low. By applying our techniques to measurements of real Internet paths and by using LASTor to visit the top 200 websites from several geographically-distributed end-hosts, we show that, in comparison to the default Tor client, LASTor reduces median latencies by 25% while also reducing the false negative rate of not detecting a potential snooping AS from 57% to 11%.
  • Keywords
    Internet; computer network management; entropy; telecommunication network routing; telecommunication traffic; Internet routing; Tor anonymity network; Tor client design; Tor client implementation; Tor relay inferred location; Websites; algorithm low runtime; circuit entry segment; circuit exit segment; client-side modification; direct Internet path; geographically-distributed end-hosts; interactive communication; latency gain; low latency path; low-latency AS-aware Tor client; low-latency anonymous communication; median latency reduction; path identification; path selection entropy; real Internet path measurement; traffic correlation; tunable LASTor path selection algorithm design; user anonymity improvement; Algorithm design and analysis; Bandwidth; Extraterrestrial measurements; IP networks; Internet; Relays; Routing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy (SP), 2012 IEEE Symposium on
  • Conference_Location
    San Francisco, CA
  • ISSN
    1081-6011
  • Print_ISBN
    978-1-4673-1244-8
  • Electronic_ISBN
    1081-6011
  • Type

    conf

  • DOI
    10.1109/SP.2012.35
  • Filename
    6234431