Abstract
Based on the principle of onion routing, the Tor network achieves anonymity for its users by relaying user data over a series of intermediate relays. This approach makes congestion control in the network a challenging task. As of this writing, this results in higher latencies due to considerable backlog as well as unfair data rate allocation. In this article, we present a concept study of PredicTor, a novel approach to congestion control that tackles clogged overlay networks. Unlike traditional approaches, it is built upon the idea of distributed model predictive control, a recent advancement from the area of control theory. PredicTor is tailored to minimizing latency in the network and achieving max-min fairness. We contribute a thorough evaluation of its behavior in both toy scenarios to assess the optimizer and complex networks to assess its potential. For this, we conduct large-scale simulation studies and compare PredicTor to existing congestion control mechanisms in Tor. We show that PredicTor is highly effective in reducing latency and realizing fair rate allocations. In addition, we strive to bring the ideas of modern control theory to the networking community, enabling the development of improved, future congestion control. Thus, we demonstrate benefits and issues alike with this novel research direction.
- [1] . 2011. DefenestraTor: Throwing out windows in Tor. In PETS’11: Proceedings of the 11th Privacy Enhancing Technologies Symposium. Waterloo, ON, Canada, (2011), 134–154.Google Scholar
Cross Ref
- [2] . 2013. PCTCP: Per-circuit TCP-over-IPsec transport for anonymous communication overlay networks. In CCS’13: Proceedings of the 20th ACM Conference on Computer and Communications Security. Berlin, Germany, 349–360.Google Scholar
Digital Library
- [3] . 2016. Performance and security improvements for Tor: A survey. Computing Surveys 49, 2 (2016), 32:1–32:36.Google Scholar
Digital Library
- [4] . 2003. Reliable communication in overlay networks. In DSN’03: Proceedings of the 33rd International Conference on Dependable Systems and Networks. Lisbon, Portugal, (2003), 511–520.Google Scholar
Cross Ref
- [5] . 2018. CasADi: A software framework for nonlinear optimization and optimal control. Mathematical Programming Computation 11 (2018). Google Scholar
Cross Ref
- [6] . 2006. Congestion control for TCP/AQM networks using state predictive control. Electrical Engineering in Japan 156, 3 (2006), 41–47. Google Scholar
Cross Ref
- [7] . 1992. Data networks (ed.). Prentice-Hall International.Google Scholar
- [8] . 2016. BBR: Congestion-ased congestion control. ACM Queue 14, 5 (2016), 20–53.Google Scholar
Digital Library
- [9] . 2015. HORNET: High-speed onion routing at the network layer. In CCS’15: Proceedings of the 22nd ACM Conference on Computer and Communications Security. Denver, CO, (2015), 1441–1454.Google Scholar
Digital Library
- [10] . 2018. TARANET: Traffic-Analysis resistant anonymity at the network layer. In EuroS&P’18: Proceedings of the 2018 IEEE European Symposium on Security and Privacy. London, United Kingdom, (2018), 137–152.Google Scholar
Cross Ref
- [11] . 2013. Distributed model predictive control: A tutorial review and future research directions. Computers & Chemical Engineering 51 (2013), 21–41.Google Scholar
Cross Ref
- [12] . 2010. Waiting for anonymity: understanding delays in the Tor overlay. In Proceedings of the 10th IEEE Conference on Peer-to-Peer Computing. 1–4.Google Scholar
Cross Ref
- [13] . 2004. Tor: The second-generation onion router. In USENIX Security’04: Proceedings of the 13th USENIX Security Symposium. San Diego, CA, (2004), 303–320.Google Scholar
Cross Ref
- [14] . 2018. Exploring deployment strategies for the Tor network. In LCN’18: Proceedings of the 43rd IEEE International Conference on Local Computer Networks. Chicago, IL, (2018).Google Scholar
Cross Ref
- [15] . 2012. Distributed receding horizon control of vehicle platoons: stability and string stability. IEEE Trans. Automat. Control 57, 3 (2012), 620–633. Google Scholar
Cross Ref
- [16] . 2020. PredicTor: Predictive congestion control for the Tor network. 863–870.Google Scholar
- [17] . 1996. Hiding routing information. In IHW’01: Proceedings of the 1st International Workshop on Information Hiding. Cambridge, UK, (1996), 137–150.Google Scholar
Cross Ref
- [18] . 2007. Towards robust multi-layer traffic engineering: Optimization of congestion control and routing. Journal on Selected Areas in Communications 25, 5 (2007), 868–880.Google Scholar
Digital Library
- [19] . 2012. LAP: Lightweight anonymity and privacy. In SP’12: Proceedings of the 33th IEEE Symposium on Security and Privacy. San Francisco, CA, (2012), 506–520.Google Scholar
Digital Library
- [20] . 1981. Flow control power is nondecentralizable. IEEE Transactions on Communications 29, 9 (1981), 1301–1306.Google Scholar
Cross Ref
- [21] . 1984. A Quantitative Measure of Fairness and Discrimination for Resource Allocation in Shared Computer Systems.
DEC Research Report TR-301 . Digital Equipment Corporation, 38 pages.Google Scholar - [22] . 2012. Methodically modeling the Tor network. In CSET’12: Proceedings of the 5th Workshop on Cyber Security Experimentation and Test. Bellevue, WA, (2012).Google Scholar
- [23] . 2014. Never been KIST: Tor’s congestion management blossoms with kernel-informed socket transport. In USENIX Security’14: Proceedings of the 23rd USENIX Security Symposium. San Diego, CA, (2014), 127–142.Google Scholar
- [24] Rob Jansen, Justin Tracey, and Ian Goldberg. 2021. Once is never enough: Foundations for sound statistical inference in Tor network experimentation. In Proceedings of the 30th USENIX Security Symposium (USENIX Security’21). 3415–3432.Google Scholar
- [25] . 2017. Tor’s been KIST: A case study of transitioning tor research to practice. CoRR abs/1709.01044 (2017).
arxiv:1709.01044 , http://arxiv.org/abs/1709.01044.Google Scholar - [26] . 2009. Decoupling congestion control from TCP for multi-hop wireless networks: Semi-TCP. In Proceedings of the ACM Workshop on Challenged Networks. Beijing, China, 27–34.Google Scholar
Digital Library
- [27] . 2009. IPsec-based anonymous networking: A working implementation. In Proceedings of the IEEE International Conference on Communications. Dresden, Germany, 1–5.Google Scholar
Cross Ref
- [28] . 1999. Classical control theory for congestion avoidance in high-speed Internet. In Proceedings of the 38th IEEE Conference on Decision and Control (1999). 2709–2714.Google Scholar
Cross Ref
- [29] . 2008. Shining light in dark places: Understanding the Tor network. In PETS’08: Proceedings of the 8th Privacy Enhancing Technologies Symposium. Leuven, Belgium, 63–76.Google Scholar
Digital Library
- [30] . 2012. Distributed ADMM for model predictive control and congestion control. In Proceedings of the 51st IEEE Conference on Decision and Control. 5110–5115. Google Scholar
Cross Ref
- [31] . 2014. Distributed model predictive control: An overview and roadmap of future research opportunities. IEEE Control Systems Magazine 34, 4 (2014), 87–97. Google Scholar
Cross Ref
- [32] . 1998. Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. IETF RFC 2474 (Proposed Standard). Retrieved February 25, 2022 fromGoogle Scholar
Digital Library
- [33] . 2012. Controlling queue delay. ACM Queue 10, 5 (2012), 20.Google Scholar
Digital Library
- [34] . 2016. Distributed economic model predictive control for large-scale building temperature regulation. In 2016 American Control Conference (ACC’16). 895–900. Google Scholar
Cross Ref
- [35] . 2009. Improving Tor using a TCP-over-DTLS tunnel. In USENIX Security’09: Proceedings of the 18th USENIX Security Symposium. Montreal, Canada, 119–134.Google Scholar
- [36] . 2008. Implicit hop-by-hop congestion control in wireless multihop networks. Ad Hoc Networks 6, 2 (2008), 260–286.Google Scholar
Digital Library
- [37] . 2002. Per hop behaviors based on dynamic packet states. IETF Expired Internet Draft. Retrieved February 25, 2022 from https://www.ietf.org/archive/id/draft-stoica-diffserv-dps-02.txt.Google Scholar
- [38] . 2021. Tor Metrics. Retrieved February 25, 2022 from https://metrics.torproject.org/.Google Scholar
- [39] . 2012. How (not) to build a transport layer for anonymity overlays. In PADE’12: Proceedings of the ACM Sigmetrics/Performance Workshop on Privacy and Anonymity for the Digital Economy. London, UK, 101–106.Google Scholar
- [40] . 2016. Mind the gap: Towards a backpressure-based transport protocol for the Tor network. In NSDI’16: Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation. Santa Clara, CA, (2016), 597–610.Google Scholar
- [41] . 2011. Tor is unfair – And what to do about it. In Proceedings of the 36th Annual IEEE International Conference on Local Computer Networks. Bonn, Germany, 432–440.Google Scholar
- [42] . 2008. UDP-OR: A fair onion transport design. In HotPETS’08: 1st Workshop on Hot Topics in Privacy Enhancing Technologies. Leuven, Belgium, (2008).Google Scholar
- [43] . 2013. An empirical evaluation of relay selection in Tor. In NDSS’13: Proceedings of the Network and Distributed System Security Symposium. San Diego, CA, (2013).Google Scholar
- [44] . 2006. On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming. Mathematical Programming 106, 1 (2006), 25–57. Google Scholar
Digital Library
- [45] . 2012. Congestion-aware path selection for Tor. In FC’12: Proceedings of Financial Cryptography and Data Security (2012), 98–113.Google Scholar
Cross Ref
- [46] . 2003. Design a PID controller for active queue management. In Proceedings of the 8th IEEE Symposium on Computers and Communications.985–990.Google Scholar
Cross Ref
- [47] . 2007. Hop-by-hop congestion control over a wireless multi-hop network. IEEE/ACM Transactions on Networking 15, 1 (2007), 133–144.Google Scholar
Digital Library
Index Terms
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges
Recommendations
Adaptive model predictive TCP delay-based congestion control
Adaptive Model Predictive Transmission Control Protocol (AMP-TCP) as a new TCP delay-based congestion control algorithm is introduced. Both aspects of design and implementation of the algorithm are described using simulations on the ns-2 network ...
A Circuit Switching Method for Improving Congestion of Tor Network
BWCCA '14: Proceedings of the 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and ApplicationsThe Tor Network is a low-latency anonymity and censorship resistance network, which relaying traffics through series of onion routers (OR) before being forwarded to the destination. Tor is vulnerable to network congestion and performance problems, due ...
Tor Network Limits
NCIS '11: Proceedings of the 2011 International Conference on Network Computing and Information Security - Volume 01Tor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to ...






Comments