methodically modeling the tor network - usenix · 2020. 7. 22. · methodically modeling the tor...

35
Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S. Naval Research Laboratory Kevin Bauer – University of Waterloo Nick Hopper – University of Minnesota Roger Dingledine – The Tor Project

Upload: others

Post on 16-Dec-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

Methodically Modeling the Tor Network

Workshop on Cyber Security Experimentation and Test

2012

Rob Jansen - U.S. Naval Research LaboratoryKevin Bauer – University of Waterloo

Nick Hopper – University of MinnesotaRoger Dingledine – The Tor Project

Page 2: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

2

Page 3: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

3

Page 4: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

4

Page 5: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

5

Page 6: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

6

Page 7: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

7

Page 8: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

8

Page 9: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

9

Page 10: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

10

Page 11: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

11

Page 12: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

12

Page 13: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

13

Page 14: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

14

Page 15: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

15

Page 16: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

16

Page 17: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

17

Page 18: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 19: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 20: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 21: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 22: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

22

Tor ExperimentationPros Cons

Live Tor Realistic, accurateHard to manage, privacy risks, lengthy deployment

Page 23: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

23

Tor ExperimentationPros Cons

Live Tor Realistic, accurateHard to manage, privacy risks, lengthy deployment

PlanetLab RealisticHard to manage, not scalable, inaccurate

Page 24: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 25: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 26: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 27: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 28: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 29: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S

29

Modeling Decisions

➔ Network topology → clustering by country➔ Network latency → iPlane trace-routes➔ Node bandwidth capacity → Net Index➔ Tor relay sample → bin-median sampling➔ Tor relay bandwidth rates → Tor metrics➔ Tor web clients → 320 KiB, think [1,20] seconds➔ Tor bulk clients → 5 MiB, no thinking➔ Client, server placement → Tor metrics

Page 30: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 31: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 32: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 33: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 34: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S
Page 35: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S