计算机科学 ›› 2025, Vol. 52 ›› Issue (11A): 241200080-6.doi: 10.11896/jsjkx.241200080

• 计算机网络 • 上一篇    下一篇

基于Tor Over QUIC的多维度性能评估方法

齐建设1, 杨晓晗2, 周大成2   

  1. 1 郑州大学网络空间安全学院 郑州 450002
    2 信息工程大学信息技术研究所 郑州 450001
  • 出版日期:2025-11-15 发布日期:2025-11-10
  • 通讯作者: 周大成(dachengzhousjtu@hotmail.com)
  • 作者简介:a1347300431@163.com
  • 基金资助:
    国家自然科学基金区域创新发展联合基金(U22A2001);车联网内生安全威胁感知与弹性测评关键技术(一期)(241110210100)

Multi-dimensional Performance Evaluation Approach Based on Tor Over QUIC

QI Jianshe1, YANG Xiaohan2, ZHOU Dacheng2   

  1. 1 School of Cyber Science and Engineering,Zhengzhou University,Zhengzhou 450002,China
    2 Institute of Information Technology,University of Information Engineering,Zhengzhou 450001,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    Joint Fund for Regional Innovation and Development of the National Natural Science Foundation of China(U22A2001)and Key Technologies for the Perception and Resilience Assessment of Endogenous Security Threats in the Internet of Vehicles (Phase I)(241110210100).

摘要: Tor网络作为最受欢迎的匿名网络之一,使用TCP协议作为传输层协议,这一选择导致了行首阻塞、带宽分配不公平以及低效的拥塞控制等问题,严重影响了Tor网络的性能和扩展性。目前有研究使用QUIC协议的Tor Over QUIC模式来解决这些问题。然而,Tor Over QUIC模式下性能评估指标单一,仅聚焦在时延和安全性评估,难以全面反映协议升级对匿名网络核心特性的综合影响,导致协议优化方向不明确且部署决策缺乏数据支撑。这种评估维度缺失不仅制约了QUIC协议优势的充分发挥,更可能因性能短板影响用户采用意愿,容易影响Tor Over QUIC的推广与使用。因此,提出了一种基于Tor Over QUIC的多维度性能评估方法,从时延、匿名性、安全性、鲁棒性和可用性等多个维度对Tor Over QUIC模式下的性能进行综合评估,以指导Tor Over QUIC的部署与使用。对Tor网络和Tor Over QUIC网络进行的对比实验表明,所提评估方法是有效且实用的。

关键词: Tor网络, QUIC协议, 评估, 指标, 匿名网络

Abstract: Tor network,as one of the most popular anonymity networks,uses TCP protocol as the transport layer protocol,and this choice leads to problems such as head-of-line blocking,unfair bandwidth allocation,and inefficient congestion control,which seriously affects the performance and scalability of the Tor network,and there are researches on Tor Over QUIC mode using QUIC protocol to solve these problems.However,the single performance evaluation index in Tor Over QUIC mode focuses only on delay and security evaluation,which is difficult to reflect the comprehensive impact of protocol upgrade on the core characteristics of anonymity network,resulting in unclear direction of protocol optimization and lack of data support for deployment decisions.This lack of evaluation dimension not only restricts the full play of the advantages of QUIC protocol,but also affects the user’s willingness to adopt the protocol due to the performance shortcomings,which easily affects the promotion and use of Tor Over QUIC.Therefore,this paper proposes a multi-dimensional performance evaluation method based on Tor Over QUIC,which comprehensively evaluates the performance of Tor Over QUIC mode from multiple dimensions such as latency,anonymity,security,robustness,and usability,in order to guide the deployment and use of Tor Over QUIC.Comparative experiments on Tor network and Tor Over QUIC network show that the evaluation method is effective and practical.

Key words: Tor network, QUIC protocol, Evaluation, Metrics, Anonymous networks

中图分类号: 

  • TP393
[1]Welcome to Tor Metrics[EB/OL].(2023-05-30).https://metrics.torproject.org.
[2]DINGLEDINE R,MURDOCH S J.Performance Improvements on Tor or,Why Tor is slow and what we’re going to do about it[EB/OL].http://www.torproject.org/press/presskit/2009-03-11-performance.pdf,2009:68.
[3]ALSABAH M,GOLDBERG I.Performance and security im-provements for tor:A survey[J].ACM Computing Surveys(CSUR),2016,49(2):1-36.
[4]BASYONI L,ERBAD A,ALSABAH M,et al.QuicTor:Enhancing tor for real-time communication using QUIC transport protocol[J].IEEE Access,2021,9:28769-28784.
[5]BASYONI L,ERBAD A,ALSABAH M,et al.Empirical per-formance evaluation of QUIC protocol for Tor anonymity network[C]//2019 15th International Wireless Communications & Mobile Computing Conference(IWCMC).IEEE,2019:635-642.
[6]HEIJLIGERS J.Tor over QUIC[Z].2021.
[7]TRAP C H.Impact of replacing TCP by QUIC in Tor on website fingerprinting resistance[EB/OL].https://resolver.tudelft.nl/uuid:aae440ca-a787-4f61-8730-67a1d3cdd508.
[8]KYLE H.Security analysis of Tor over QUIC.PhD Thesis.Massachusetts Institute of Technology[EB/OL].https://dspace.mit.edu/handle/1721.1/128590.
[9]DINGLEDINE R,MATHEWSON N.Tor Protocol Specification[EB/OL].(28-05-2023).https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt.
[10]LANGLEY A,RIDDOCH A,WILK A,et al.The quic transport protocol:Design and internet-scale deployment[C]//Procee-dings of the Conference of the ACM Special Interest Group on Data Communication.2017:183-196.
[11]WANG Z,ZHANG J,LIU Q,et al.Practical metrics for evaluating anonymous networks[C]//Science of Cyber Security:First International Conference,SciSec 2018,Beijing,China,Revised Selected Papers 1.Springer International Publishing,2018:3-18.
[12]HOPPER N,VASSERMAN E Y,CHAN-TIN E.How muchanonymity does network latency leak?[J].ACM Transactions on Information and System Security(TISSEC),2010,13(2):1-28.
[13]PFITZMANN A,HANSEN M.A terminology for talking about privacy by data minimization:Anonymity,unlinkability,undetectability,unobservability,pseudonymity,and identity management[EB/OL].https://www.researchgate.net/publication/234720523.
[14]Robustness[OL].https://en.wikipedia.org/wiki/Robustness.
[15]SHIRAZI F,DIAZ C,WRIGHT J.Towards measuring resili-ence in anonymous communication networks[C]//Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society.2015:95-99.
[16]PENG T,LECKIE C,RAMAMOHANARAO K.Survey of network-based defense mechanisms countering the DoS and DDoS problems[J].ACM Computing Surveys(CSUR),2007,39(1):3-es.
[17]ABOOD O G,GUIRGUIS S K.A survey on cryptography algorithms[J].International Journal of Scientific and Research Publications,2018,8(7):495-516.
[18]CHAO D,XU D,GAO F,et al.A Systematic Survey On Security in Anonymity Networks:Vulnerabilities,Attacks,Defenses,and Formalization[J].IEEE Communications Surveys & Tuto-rials,2024,26(3):1775-1829.
[19]BASYONI L,FETAIS N,ERBAD A,et al.Traffic analysis attacks on Tor:A survey[C]//2020 IEEE International Confe-rence on Informatics,IoT,and Enabling Technologies(ICIoT).IEEE,2020:183-188.
[20]W3Techs[EB/OL].https://w3techs.com/technologies/details/cehttp3.
[21]SANDERS C.Practical packet analysis:Using Wireshark tosolve real-world network problems[M].No Starch Press,2017.
[22]DINGLEDINE R,MATHEWSON N.Anonymity loves company:Usability and the network effect[C]//WEIS.2006.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!