Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation

Abstract : Evaluating and improving the performance of anonymity systems in a real-world setting is critical to foster their adoption. However, current research in this field mostly employs unrealistic models for evaluation purposes. Moreover, previously documented results are often difficult to reproduce. We propose two complementary workload models that operate on network traces in order to improve the evaluation of anonymity systems. In comparison to other approaches our workload models are more realistic, as they derive characteristics from trace files recorded in real networks and preserve dependencies of the flows of individual hosts. We also describe our ready-to-use open source evaluation suite that implements our models. Given our tools, researchers can easily create and re-use well-defined workload sets for evaluation purposes. Finally, we demonstrate the importance of realistic workload models by evaluating a well-known dummy traffic scheme with our tools.
Document type :
Conference papers
Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. Springer, IFIP Advances in Information and Communication Technology, AICT-405, pp.162-175, 2013, Security and Privacy Protection in Information Processing Systems. 〈10.1007/978-3-642-39218-4_13〉
Liste complète des métadonnées

Cited literature [23 references]  Display  Hide  Download

https://hal.inria.fr/hal-01463825
Contributor : Hal Ifip <>
Submitted on : Thursday, February 9, 2017 - 5:23:43 PM
Last modification on : Thursday, February 9, 2017 - 5:37:20 PM
Document(s) archivé(s) le : Wednesday, May 10, 2017 - 2:48:48 PM

File

978-3-642-39218-4_13_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath. Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation. Lech J. Janczewski; Henry B. Wolfe; Sujeet Shenoi. 28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. Springer, IFIP Advances in Information and Communication Technology, AICT-405, pp.162-175, 2013, Security and Privacy Protection in Information Processing Systems. 〈10.1007/978-3-642-39218-4_13〉. 〈hal-01463825〉

Share

Metrics

Record views

53

Files downloads

50