Deep Nearest Neighbor Website Fingerprinting Attack Technology
نویسندگان
چکیده
By website fingerprinting (WF) technologies, local listeners are enabled to track the specific visited by users through an investigation of encrypted traffic between and Tor network entry node. The current triplet (TF) technique proved possibility small sample WF attacks. Previous research methods only concentrate on extracting overall features while ignoring importance characteristics for Thus, in present paper, a deep nearest neighbor (DNNF) attack technology is proposed. websites extracted via convolutional neural (CNN), then k-nearest (k-NN) classifier utilized classify prediction. When provides 20 samples, accuracy can reach 96.2%. We also found that DNNF method acts well compared traditional coping with transfer learning concept drift problems. In comparison TF method, classification proposed improved 2%–5% it dropped 3% when classifying data collected from same after two months. These experiments revealed more flexible, efficient, robust technology, particularly important
منابع مشابه
Deep Learning Website Fingerprinting Features
Anonymity networks like Tor enable Internet users to browse the web anonymously. This helps citizens circumvent censorship from repressive governments, journalists communicate with anonymous sources or regular users to avoid tracking online. However, adversaries can try to identify anonymous users by deploying several attacks. One of such attacks is website fingerprinting. Website fingerprintin...
متن کاملDeep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we ...
متن کاملAutomated Website Fingerprinting through Deep Learning
Several studies have shown that the network traffic that is generated by a visit to a website over Tor reveals information specific to the website through the timing and sizes of network packets. By capturing traffic traces between users and their Tor entry guard, a network eavesdropper can leverage this meta-data to reveal which website Tor users are visiting. The success of such attacks heavi...
متن کاملAudio fingerprinting: nearest neighbor search in high dimensional binary spaces
Audio fingerprinting is an emerging research field in which a song must be recognized by matching an extracted “fingerprint” to a database of known fingerprints. Audio fingerprinting must solve the two key problems of representation and search. In this paper, we are given an 8192-bit binary representation of each five second interval of a song and therefore focus our attention on the problem of...
متن کاملNearest Neighbor
Over the last decade, an immense amount of data has become available. From collections of photos, to genetic data, and to network traffic statistics, modern technologies and cheap storage have made it possible to accumulate huge datasets. But how can we effectively use all this data? The ever growing sizes of the datasets make it imperative to design new algorithms capable of sifting through th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/5399816