计算机科学 ›› 2025, Vol. 52 ›› Issue (11A): 241200080-6.doi: 10.11896/jsjkx.241200080
齐建设1, 杨晓晗2, 周大成2
QI Jianshe1, YANG Xiaohan2, ZHOU Dacheng2
摘要: Tor网络作为最受欢迎的匿名网络之一,使用TCP协议作为传输层协议,这一选择导致了行首阻塞、带宽分配不公平以及低效的拥塞控制等问题,严重影响了Tor网络的性能和扩展性。目前有研究使用QUIC协议的Tor Over QUIC模式来解决这些问题。然而,Tor Over QUIC模式下性能评估指标单一,仅聚焦在时延和安全性评估,难以全面反映协议升级对匿名网络核心特性的综合影响,导致协议优化方向不明确且部署决策缺乏数据支撑。这种评估维度缺失不仅制约了QUIC协议优势的充分发挥,更可能因性能短板影响用户采用意愿,容易影响Tor Over QUIC的推广与使用。因此,提出了一种基于Tor Over QUIC的多维度性能评估方法,从时延、匿名性、安全性、鲁棒性和可用性等多个维度对Tor Over QUIC模式下的性能进行综合评估,以指导Tor Over QUIC的部署与使用。对Tor网络和Tor Over QUIC网络进行的对比实验表明,所提评估方法是有效且实用的。
中图分类号:
| [1]Welcome to Tor Metrics[EB/OL].(2023-05-30).https://metrics.torproject.org. [2]DINGLEDINE R,MURDOCH S J.Performance Improvements on Tor or,Why Tor is slow and what we’re going to do about it[EB/OL].http://www.torproject.org/press/presskit/2009-03-11-performance.pdf,2009:68. [3]ALSABAH M,GOLDBERG I.Performance and security im-provements for tor:A survey[J].ACM Computing Surveys(CSUR),2016,49(2):1-36. [4]BASYONI L,ERBAD A,ALSABAH M,et al.QuicTor:Enhancing tor for real-time communication using QUIC transport protocol[J].IEEE Access,2021,9:28769-28784. [5]BASYONI L,ERBAD A,ALSABAH M,et al.Empirical per-formance evaluation of QUIC protocol for Tor anonymity network[C]//2019 15th International Wireless Communications & Mobile Computing Conference(IWCMC).IEEE,2019:635-642. [6]HEIJLIGERS J.Tor over QUIC[Z].2021. [7]TRAP C H.Impact of replacing TCP by QUIC in Tor on website fingerprinting resistance[EB/OL].https://resolver.tudelft.nl/uuid:aae440ca-a787-4f61-8730-67a1d3cdd508. [8]KYLE H.Security analysis of Tor over QUIC.PhD Thesis.Massachusetts Institute of Technology[EB/OL].https://dspace.mit.edu/handle/1721.1/128590. [9]DINGLEDINE R,MATHEWSON N.Tor Protocol Specification[EB/OL].(28-05-2023).https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt. [10]LANGLEY A,RIDDOCH A,WILK A,et al.The quic transport protocol:Design and internet-scale deployment[C]//Procee-dings of the Conference of the ACM Special Interest Group on Data Communication.2017:183-196. [11]WANG Z,ZHANG J,LIU Q,et al.Practical metrics for evaluating anonymous networks[C]//Science of Cyber Security:First International Conference,SciSec 2018,Beijing,China,Revised Selected Papers 1.Springer International Publishing,2018:3-18. [12]HOPPER N,VASSERMAN E Y,CHAN-TIN E.How muchanonymity does network latency leak?[J].ACM Transactions on Information and System Security(TISSEC),2010,13(2):1-28. [13]PFITZMANN A,HANSEN M.A terminology for talking about privacy by data minimization:Anonymity,unlinkability,undetectability,unobservability,pseudonymity,and identity management[EB/OL].https://www.researchgate.net/publication/234720523. [14]Robustness[OL].https://en.wikipedia.org/wiki/Robustness. [15]SHIRAZI F,DIAZ C,WRIGHT J.Towards measuring resili-ence in anonymous communication networks[C]//Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society.2015:95-99. [16]PENG T,LECKIE C,RAMAMOHANARAO K.Survey of network-based defense mechanisms countering the DoS and DDoS problems[J].ACM Computing Surveys(CSUR),2007,39(1):3-es. [17]ABOOD O G,GUIRGUIS S K.A survey on cryptography algorithms[J].International Journal of Scientific and Research Publications,2018,8(7):495-516. [18]CHAO D,XU D,GAO F,et al.A Systematic Survey On Security in Anonymity Networks:Vulnerabilities,Attacks,Defenses,and Formalization[J].IEEE Communications Surveys & Tuto-rials,2024,26(3):1775-1829. [19]BASYONI L,FETAIS N,ERBAD A,et al.Traffic analysis attacks on Tor:A survey[C]//2020 IEEE International Confe-rence on Informatics,IoT,and Enabling Technologies(ICIoT).IEEE,2020:183-188. [20]W3Techs[EB/OL].https://w3techs.com/technologies/details/cehttp3. [21]SANDERS C.Practical packet analysis:Using Wireshark tosolve real-world network problems[M].No Starch Press,2017. [22]DINGLEDINE R,MATHEWSON N.Anonymity loves company:Usability and the network effect[C]//WEIS.2006. |
|
||