Website Fingerprinting in the Age of QUIC

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Website Fingerprinting at Internet Scale

The website fingerprinting attack aims to identify the content (i.e., a webpage accessed by a client) of encrypted and anonymized connections by observing patterns of data flows such as packet size and direction. This attack can be performed by a local passive eavesdropper – one of the weakest adversaries in the attacker model of anonymization networks such as Tor. In this paper, we present a n...

متن کامل

Deep Learning Website Fingerprinting Features

Anonymity networks like Tor enable Internet users to browse the web anonymously. This helps citizens circumvent censorship from repressive governments, journalists communicate with anonymous sources or regular users to avoid tracking online. However, adversaries can try to identify anonymous users by deploying several attacks. One of such attacks is website fingerprinting. Website fingerprintin...

متن کامل

Poster: Novel Website Fingerprinting Techniques

Web-browsing clients may choose to browse the web by using proxies with encryption to secure their privacy. An attacker watching the outgoing connection of such a client will not be able to know the content or destination of their packets, unless the attacker uses website fingerprinting. Website fingerprinting is the process by which an attacker identifies which server a client is communicating...

متن کامل

Website Fingerprinting Defenses at the Application Layer

Website Fingerprinting (WF) allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of...

متن کامل

Measuring Information Leakage in Website Fingerprinting Attacks

Tor is a low-latency anonymity system intended to provide low-latency anonymous and uncensored network access against a local or network adversary. Because of the design choice to minimize traffic overhead (and increase the pool of potential users) Tor allows some information about the client’s connections to leak in the form of packet timing. Attacks that use (features extracted from) this inf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2021

ISSN: 2299-0984

DOI: 10.2478/popets-2021-0017