Methodically Modeling the Tor Network.

CSET'12: Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test(2012)

引用 13|浏览75
暂无评分
摘要
Live Tor network experiments are difficult due to Tor's distributed nature and the privacy requirements of its client base. Alternative experimentation approaches, such as simulation and emulation, must make choices about how to model various aspects of the Internet and Tor that are not possible or not desirable to duplicate or implement directly. This paper methodically models the Tor network by exploring and justifying every modeling choice required to produce accurate Tor experimentation environments. We validate our model using two state-of-the-art Tor experimentation tools and measurements from the live Tor network. We find that our model enables experiments that characterize Tor's load and performance with reasonable accuracy.
更多
查看译文
关键词
Live Tor network experiment,Tor network,accurate Tor experimentation environment,live Tor network,state-of-the-art Tor experimentation tool,alternative experimentation approach,client base,modeling choice,privacy requirement,reasonable accuracy
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要