Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor...

35
Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S. Naval Research Laboratory Kevin Bauer – University of Waterloo Nick Hopper – University of Minnesota Roger Dingledine – The Tor Project

Transcript of Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor...

Page 1: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

Methodically Modeling the Tor Network

Workshop on Cyber Security Experimentation and Test

2012

Rob Jansen - U.S. Naval Research LaboratoryKevin Bauer – University of Waterloo

Nick Hopper – University of MinnesotaRoger Dingledine – The Tor Project

Page 2: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

2

Page 3: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

3

Page 4: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

4

Page 5: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

5

Page 6: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

6

Page 7: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

7

Page 8: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

8

Page 9: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

9

Page 10: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

10

Page 11: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

11

Page 12: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

12

Page 13: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

13

Page 14: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

14

Page 15: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

15

Page 16: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

16

Page 17: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

17

Page 18: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 19: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 20: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 21: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 22: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

22

Tor ExperimentationPros Cons

Live Tor Realistic, accurateHard to manage, privacy risks, lengthy deployment

Page 23: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

23

Tor ExperimentationPros Cons

Live Tor Realistic, accurateHard to manage, privacy risks, lengthy deployment

PlanetLab RealisticHard to manage, not scalable, inaccurate

Page 24: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 25: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 26: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 27: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 28: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 29: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.

29

Modeling Decisions

➔ Network topology → clustering by country➔ Network latency → iPlane trace-routes➔ Node bandwidth capacity → Net Index➔ Tor relay sample → bin-median sampling➔ Tor relay bandwidth rates → Tor metrics➔ Tor web clients → 320 KiB, think [1,20] seconds➔ Tor bulk clients → 5 MiB, no thinking➔ Client, server placement → Tor metrics

Page 30: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 31: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 32: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 33: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 34: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.
Page 35: Methodically Modeling the Tor Network - USENIX · 2020. 7. 22. · Methodically Modeling the Tor Network Workshop on Cyber Security Experimentation and Test 2012 Rob Jansen - U.S.