首页> 外文期刊>ACM Transaction on Information and System Security >KIST: Kernel-Informed Socket Transport for Tor
【24h】

KIST: Kernel-Informed Socket Transport for Tor

机译:KIST:用于Tor的内核信息套接字传输

获取原文
获取原文并翻译 | 示例

摘要

Tor's growing popularity and user diversity has resulted in network performance problems that are not well understood, though performance is understood to be a significant factor in Tor's security. A large body of work has attempted to solve performance problems without a complete understanding of where congestion occurs in Tor. In this article, we first study congestion in Tor at individual relays as well as along the entire end-to-end Tor path and find that congestion occurs almost exclusively in egress kernel socket buffers. We then analyze Tor's socket interactions and discover two major contributors to Tor's congestion: Tor writes sockets sequentially, and Tor writes as much as possible to each socket. To improve Tor's performance, we design, implement, and test KIST: a new socket management algorithm that uses real-time kernel information to dynamically compute the amount to write to each socket while considering all circuits of all writable sockets when scheduling cells. We find that, in the medians, KIST reduces circuit congestion by more than 30%, reduces network latency by 18%, and increases network throughput by nearly 10%. We also find that client and relay performance with KIST improves as more relays deploy it and as network load and packet loss rates increase. We analyze the security of KIST and find an acceptable performance and security tradeoff, as it does not significantly affect the outcome of well-known latency, throughput, and traffic correlation attacks. KIST has been merged and configured as the default socket scheduling algorithm in Tor version 0 . 3. 2 .1-alpha (released September 18, 2017) and became stable in Tor version 0.3.2.9 (released January 9, 2018). While our focus is Tor, our techniques and observations should help analyze and improve overlay and application performance, both for security applications and in general.
机译:Tor的日益普及和用户多样性导致了网络性能问题,尽管性能被认为是Tor安全的重要因素,但网络性能问题并未得到很好的理解。大量工作试图解决性能问题,而没有完全了解Tor中发生拥塞的位置。在本文中,我们首先研究了单个中继以及整个端到端Tor路径中Tor的拥塞,发现拥塞几乎只发生在出口内核套接字缓冲区中。然后,我们分析Tor的套接字交互,并发现造成Tor拥塞的两个主要因素:Tor顺序写入套接字,Tor尽可能向每个套接字写入。为了提高Tor的性能,我们设计,实施和测试KIST:一种新的套接字管理算法,该算法使用实时内核信息动态计算写入每个套接字的数量,同时在调度单元时考虑所有可写套接字的所有电路。我们发现,在中间值上,KIST可以将电路拥塞减少30%以上,将网络延迟减少18%,并将网络吞吐量增加近10%。我们还发现,随着更多的中继部署它以及网络负载和丢包率增加,使用KIST的客户端和中继性能会提高。我们分析KIST的安全性并找到可接受的性能和安全性折衷,因为它不会显着影响众所周知的延迟,吞吐量和流量相关攻击的结果。 KIST已被合并并配置为Tor版本0中的默认套接字调度算法。 3. 2 .1-alpha(2017年9月18日发布),并在Tor版本0.3.2.9(2018年1月9日发布)中变得稳定。尽管我们的重点是Tor,但我们的技术和观察应有助于分析和改善安全应用程序和一般应用程序的覆盖和应用程序性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号