%0 Conference Proceedings %T Analysis of Multi-path Onion Routing-Based Anonymization Networks %+ University of Luxembourg [Luxembourg] %+ Brandenburg University of Technology [Cottbus – Senftenberg] (BTU) %A Cadena, Wladimir, de La %A Kaiser, Daniel %A Mitseva, Asya %A Panchenko, Andriy %A Engel, Thomas %Z Part 4: Security Protocol Practices %< avec comité de lecture %( Lecture Notes in Computer Science %B 33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) %C Charleston, SC, United States %Y Simon N. Foley %I Springer International Publishing %3 Data and Applications Security and Privacy XXXIII %V LNCS-11559 %P 240-258 %8 2019-07-15 %D 2019 %R 10.1007/978-3-030-22479-0_13 %Z Computer Science [cs]Conference papers %X Anonymization networks (e.g., Tor) help in protecting the privacy of Internet users. However, the benefit of privacy protection comes at the cost of severe performance loss. This performance loss degrades the user experience to such an extent that many users do not use anonymization networks and forgo the privacy protection offered. Thus, performance improvements need to be offered in order to build a system much more attractive for both new and existing users, which, in turn, would increase the security of all users as a result of enlarging the anonymity set. A well-known technique for improving performance is establishing multiple communication paths between two entities. In this work, we study the benefits and implications of employing multiple disjoint paths in onion routing-based anonymization systems. We first introduce a taxonomy for designing and classifying onion routing-based approaches, including those with multi-path capabilities. This taxonomy helps in exploring the design space and finding attractive new feature combinations, which may be integrated into running systems such as Tor to improve users’ experience (e.g., in web browsing). We then evaluate existing implementations (together with relevant design variations) of multi-path onion routing-based approaches in terms of performance and anonymity. In the course of our practical evaluation, we identify the design characteristics that result in performance improvements and their impact on anonymity. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-02384590/document %2 https://inria.hal.science/hal-02384590/file/480962_1_En_13_Chapter.pdf %L hal-02384590 %U https://inria.hal.science/hal-02384590 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-11559