AWA: Adversarial Website Adaptation

نویسندگان

چکیده

One of the most important obligations privacy-enhancing technologies is to bring confidentiality and privacy users’ browsing activities on Internet. The website fingerprinting attack enables a local passive eavesdropper predict target user’s even she uses anonymous technologies, such as VPNs, IPsec, Tor. Recently, growth deep learning empowers adversaries conduct with higher accuracy. In this paper, we propose new defense against using adversarial approaches called Adversarial Website Adaptation (AWA). AWA creates transformer set in each run so that has unique transformer. Each generates traces evade adversary’s classifier. two versions, including Universal (UAWA) Non-Universal (NUAWA). Unlike NUAWA, there no need access entire trace order generate an UAWA. We accommodate secret random elements training phase transformers for various sets run. several times create multiple transformers. If adversary user select different transformers, accuracy classifier almost 19.52% 31.94% 22.28% 26.28% bandwidth overhead UAWA respectively. more powerful through trains them, 49.10% 25.93% 62.52% 64.33% NUAW,

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Conditional Adversarial Domain Adaptation

Adversarial learning has been successfully embedded into deep networks to learn transferable features for domain adaptation, which reduce distribution discrepancy between the source and target domains and improve generalization performance. Prior domain adversarial adaptation methods could not align complex multimode distributions since the discriminative structures and inter-layer interactions...

متن کامل

Incremental Adversarial Domain Adaptation

Continuous appearance shifts such as changes in weather and lighting conditions can impact the performance of deployed machine learning models. Unsupervised domain adaptation aims to address this challenge, though current approaches do not utilise the continuity of the occurring shifts. Many robotic applications exhibit these conditions and thus facilitate the potential to incrementally adapt a...

متن کامل

Few-Shot Adversarial Domain Adaptation

This work provides a framework for addressing the problem of supervised domain adaptation with deep models. The main idea is to exploit adversarial learning to learn an embedded subspace that simultaneously maximizes the confusion between two domains while semantically aligning their embedding. The supervised setting becomes attractive especially when there are only a few target data samples th...

متن کامل

Cycada: Cycle-consistent Adversarial Domain Adaptation

Domain adaptation is critical for success in new, unseen environments. Adversarial adaptation models applied in feature spaces discover domain invariant representations, but are difficult to visualize and sometimes fail to capture pixel-level and low-level domain shifts. Recent work has shown that generative adversarial networks combined with cycle-consistency constraints are surprisingly effec...

متن کامل

A Bandit’s Perspective on Website Adaptation

Ubiquitous access to websites stresses the importance of adaptation for modern websites. The design and management of decisiontaking adaptation engines has become a major research challenge. This paper proposes a bandit-based adaptation decisional model and shows how to describe and manage adaptation policies using a lightweight XML-based description language. The model allows a web marketeer t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3074295