Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges

Published: 14 November 2022 Publication History

Abstract

Based on the principle of onion routing, the Tor network achieves anonymity for its users by relaying user data over a series of intermediate relays. This approach makes congestion control in the network a challenging task. As of this writing, this results in higher latencies due to considerable backlog as well as unfair data rate allocation. In this article, we present a concept study of PredicTor, a novel approach to congestion control that tackles clogged overlay networks. Unlike traditional approaches, it is built upon the idea of distributed model predictive control, a recent advancement from the area of control theory. PredicTor is tailored to minimizing latency in the network and achieving max-min fairness. We contribute a thorough evaluation of its behavior in both toy scenarios to assess the optimizer and complex networks to assess its potential. For this, we conduct large-scale simulation studies and compare PredicTor to existing congestion control mechanisms in Tor. We show that PredicTor is highly effective in reducing latency and realizing fair rate allocations. In addition, we strive to bring the ideas of modern control theory to the networking community, enabling the development of improved, future congestion control. Thus, we demonstrate benefits and issues alike with this novel research direction.

References

[1]
Mashael AlSabah, Kevin S. Bauer, Ian Goldberg, Dirk Grunwald, Damon McCoy, Stefan Savage, and Geoffrey M. Voelker. 2011. DefenestraTor: Throwing out windows in Tor. In PETS’11: Proceedings of the 11th Privacy Enhancing Technologies Symposium. Waterloo, ON, Canada, (2011), 134–154.
[2]
Mashael AlSabah and Ian Goldberg. 2013. PCTCP: Per-circuit TCP-over-IPsec transport for anonymous communication overlay networks. In CCS’13: Proceedings of the 20th ACM Conference on Computer and Communications Security. Berlin, Germany, 349–360.
[3]
Mashael AlSabah and Ian Goldberg. 2016. Performance and security improvements for Tor: A survey. Computing Surveys 49, 2 (2016), 32:1–32:36.
[4]
Yair Amir and Claudiu Danilov. 2003. Reliable communication in overlay networks. In DSN’03: Proceedings of the 33rd International Conference on Dependable Systems and Networks. Lisbon, Portugal, (2003), 511–520.
[5]
Joel A. E. Andersson, Joris Gillis, Greg Horn, James B. Rawlings, and Moritz Diehl. 2018. CasADi: A software framework for nonlinear optimization and optimal control. Mathematical Programming Computation 11 (2018).
[6]
Takehito Azuma, Tsunetoshi Fujita, and Masayuki Fujita. 2006. Congestion control for TCP/AQM networks using state predictive control. Electrical Engineering in Japan 156, 3 (2006), 41–47.
[7]
Dimitri P. Bertsekas, Robert G. Gallager, and Pierre Humblet. 1992. Data networks (ed.). Prentice-Hall International.
[8]
Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, and Van Jacobson. 2016. BBR: Congestion-ased congestion control. ACM Queue 14, 5 (2016), 20–53.
[9]
Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, and Adrian Perrig. 2015. HORNET: High-speed onion routing at the network layer. In CCS’15: Proceedings of the 22nd ACM Conference on Computer and Communications Security. Denver, CO, (2015), 1441–1454.
[10]
Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, and Carmela Troncoso. 2018. TARANET: Traffic-Analysis resistant anonymity at the network layer. In EuroS&P’18: Proceedings of the 2018 IEEE European Symposium on Security and Privacy. London, United Kingdom, (2018), 137–152.
[11]
Panagiotis D. Christofides, Riccardo Scattolini, David Muñoz de la Peña, and Jinfeng Liu. 2013. Distributed model predictive control: A tutorial review and future research directions. Computers & Chemical Engineering 51 (2013), 21–41.
[12]
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Volker Hilt, and Keith W. Ross. 2010. Waiting for anonymity: understanding delays in the Tor overlay. In Proceedings of the 10th IEEE Conference on Peer-to-Peer Computing. 1–4.
[13]
Roger Dingledine, Nick Mathewson, and Paul F. Syverson. 2004. Tor: The second-generation onion router. In USENIX Security’04: Proceedings of the 13th USENIX Security Symposium. San Diego, CA, (2004), 303–320.
[14]
Christoph Döpmann, Sebastian Rust, and Florian Tschorsch. 2018. Exploring deployment strategies for the Tor network. In LCN’18: Proceedings of the 43rd IEEE International Conference on Local Computer Networks. Chicago, IL, (2018).
[15]
W. B. Dunbar and D. S. Caveney. 2012. Distributed receding horizon control of vehicle platoons: stability and string stability. IEEE Trans. Automat. Control 57, 3 (2012), 620–633.
[16]
Felix Fiedler, Christoph Döpmann, Florian Tschorsch, and Sergio Lucia. 2020. PredicTor: Predictive congestion control for the Tor network. 863–870.
[17]
David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. 1996. Hiding routing information. In IHW’01: Proceedings of the 1st International Workshop on Information Hiding. Cambridge, UK, (1996), 137–150.
[18]
Jiayue He, Ma’ayan Bresler, Mung Chiang, and Jennifer Rexford. 2007. Towards robust multi-layer traffic engineering: Optimization of congestion control and routing. Journal on Selected Areas in Communications 25, 5 (2007), 868–880.
[19]
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, and Wei Meng. 2012. LAP: Lightweight anonymity and privacy. In SP’12: Proceedings of the 33th IEEE Symposium on Security and Privacy. San Francisco, CA, (2012), 506–520.
[20]
Jeffrey M. Jaffe. 1981. Flow control power is nondecentralizable. IEEE Transactions on Communications 29, 9 (1981), 1301–1306.
[21]
Rajendra K. Jain, Dah-Ming W. Chiu, and William R. Hawe. 1984. A Quantitative Measure of Fairness and Discrimination for Resource Allocation in Shared Computer Systems. DEC Research Report TR-301. Digital Equipment Corporation, 38 pages.
[22]
Rob Jansen, Kevin S. Bauer, Nicholas Hopper, and Roger Dingledine. 2012. Methodically modeling the Tor network. In CSET’12: Proceedings of the 5th Workshop on Cyber Security Experimentation and Test. Bellevue, WA, (2012).
[23]
Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, and Paul F. Syverson. 2014. Never been KIST: Tor’s congestion management blossoms with kernel-informed socket transport. In USENIX Security’14: Proceedings of the 23rd USENIX Security Symposium. San Diego, CA, (2014), 127–142.
[24]
Rob Jansen, Justin Tracey, and Ian Goldberg. 2021. Once is never enough: Foundations for sound statistical inference in Tor network experimentation. In Proceedings of the 30th USENIX Security Symposium (USENIX Security’21). 3415–3432.
[25]
Rob Jansen and Matthew Traudt. 2017. Tor’s been KIST: A case study of transitioning tor research to practice. CoRR abs/1709.01044 (2017). arxiv:1709.01044, http://arxiv.org/abs/1709.01044.
[26]
Shengming Jiang, Qin Zuo, and Gang Wei. 2009. Decoupling congestion control from TCP for multi-hop wireless networks: Semi-TCP. In Proceedings of the ACM Workshop on Challenged Networks. Beijing, China, 27–34.
[27]
Csaba Király and Renato Lo Cigno. 2009. IPsec-based anonymous networking: A working implementation. In Proceedings of the IEEE International Conference on Communications. Dresden, Germany, 1–5.
[28]
Saverio Mascolo. 1999. Classical control theory for congestion avoidance in high-speed Internet. In Proceedings of the 38th IEEE Conference on Decision and Control (1999). 2709–2714.
[29]
Damon McCoy, Kevin S. Bauer, Dirk Grunwald, Tadayoshi Kohno, and Douglas C. Sicker. 2008. Shining light in dark places: Understanding the Tor network. In PETS’08: Proceedings of the 8th Privacy Enhancing Technologies Symposium. Leuven, Belgium, 63–76.
[30]
Joao F. C. Mota, Joao M. F. Xavier, Pedro M. Q. Aguiar, and Markus Puschel. 2012. Distributed ADMM for model predictive control and congestion control. In Proceedings of the 51st IEEE Conference on Decision and Control. 5110–5115.
[31]
R. R. Negenborn and J. M. Maestre. 2014. Distributed model predictive control: An overview and roadmap of future research opportunities. IEEE Control Systems Magazine 34, 4 (2014), 87–97.
[32]
K. Nichols, S. Blake, F. Baker, and D. Black. 1998. Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. IETF RFC 2474 (Proposed Standard). Retrieved February 25, 2022 from
[33]
Kathleen M. Nichols and Van Jacobson. 2012. Controlling queue delay. ACM Queue 10, 5 (2012), 20.
[34]
N. R. Patel, M. J. Risbeck, J. B. Rawlings, M. J. Wenzel, and R. D. Turney. 2016. Distributed economic model predictive control for large-scale building temperature regulation. In 2016 American Control Conference (ACC’16). 895–900.
[35]
Joel Reardon and Ian Goldberg. 2009. Improving Tor using a TCP-over-DTLS tunnel. In USENIX Security’09: Proceedings of the 18th USENIX Security Symposium. Montreal, Canada, 119–134.
[36]
Björn Scheuermann, Christian Lochert, and Martin Mauve. 2008. Implicit hop-by-hop congestion control in wireless multihop networks. Ad Hoc Networks 6, 2 (2008), 260–286.
[37]
Ion Stoica, Hui Zhang, Fred Baker, and Yoram Bernet. 2002. Per hop behaviors based on dynamic packet states. IETF Expired Internet Draft. Retrieved February 25, 2022 from https://www.ietf.org/archive/id/draft-stoica-diffserv-dps-02.txt.
[38]
The Tor Project. 2021. Tor Metrics. Retrieved February 25, 2022 from https://metrics.torproject.org/.
[39]
Florian Tschorsch and Björn Scheuermann. 2012. How (not) to build a transport layer for anonymity overlays. In PADE’12: Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy. London, UK, 101–106.
[40]
Florian Tschorsch and Björn Scheuermann. 2016. Mind the gap: Towards a backpressure-based transport protocol for the Tor network. In NSDI’16: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation. Santa Clara, CA, (2016), 597–610.
[41]
Florian Tschorsch and Björn Scheuermann. 2011. Tor is unfair – And what to do about it. In Proceedings of the 36th Annual IEEE International Conference on Local Computer Networks. Bonn, Germany, 432–440.
[42]
Camilo Viecco. 2008. UDP-OR: A fair onion transport design. In HotPETS’08: 1st Workshop on Hot Topics in Privacy Enhancing Technologies. Leuven, Belgium, (2008).
[43]
Chris Wacek, Henry Tan, Kevin S. Bauer, and Micah Sherr. 2013. An empirical evaluation of relay selection in Tor. In NDSS’13: Proceedings of the Network and Distributed System Security Symposium. San Diego, CA, (2013).
[44]
Andreas Wächter and Lorenz T. Biegler. 2006. On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming. Mathematical Programming 106, 1 (2006), 25–57.
[45]
Tao Wang, Kevin Bauer, Clara Forero, and Ian Goldberg. 2012. Congestion-aware path selection for Tor. In FC’12: Proceedings of Financial Cryptography and Data Security (2012), 98–113.
[46]
Fan Yanfie, Ren Fengyuan, and Lin Chuang. 2003. Design a PID controller for active queue management. In Proceedings of the 8th IEEE Symposium on Computers and Communications.985–990.
[47]
Y. Yi and S. Shakkottai. 2007. Hop-by-hop congestion control over a wireless multi-hop network. IEEE/ACM Transactions on Networking 15, 1 (2007), 133–144.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 22, Issue 4
November 2022
642 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3561988
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 November 2022
Online AM: 04 March 2022
Accepted: 27 September 2021
Revised: 13 August 2021
Received: 31 March 2021
Published in TOIT Volume 22, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Tor network
  2. multi-hop congestion control
  3. model predictive control

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • Deutsche Forschungsgemeinschaft

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 373
    Total Downloads
  • Downloads (Last 12 months)80
  • Downloads (Last 6 weeks)7
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media