Privacy Vulnerabilities in Encrypted HTTP Streams

نویسندگان

  • George Dean Bissias
  • Marc Liberatore
  • David D. Jensen
  • Brian Neil Levine
چکیده

Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HTTP streams that is surprisingly effective in identifying the source of the traffic. An attacker starts by creating a profile of the statistical characteristics of web requests from interesting sites, including distributions of packet sizes and inter-arrival times. Later, candidate encrypted streams are compared against these profiles. In our evaluations using real traffic, we find that many web sites are subject to this attack. With a training period of 24 hours and a 1 hour delay afterwards, the attack achieves only 23% accuracy. However, an attacker can easily pre-determine which of trained sites are easily identifiable. Accordingly, against 25 such sites, the attack achieves 40% accuracy; with three guesses, the attack achieves 100% accuracy for our data. Longer delays after training decrease accuracy, but not substantially. We also propose some countermeasures and improvements to our current method. Previous work analyzed SSL traffic to a proxy, taking advantage of a known flaw in SSL that reveals the length of each web object. In contrast, we exploit the statistical characteristics of web streams that are encrypted as a single flow, which is the case with WEP/WPA, IPsec, and SSH tunnels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-preserving Semantic Interoperation of Heterogeneous Databases

Two major challenges to enabling secure interoperation among web-information sources are resolving semantic heterogeneity across websites and maintaining the privacy of the data and metadata of organizations owning the websites. In this paper, we propose SACE, a novel, implemented middleware toolkit that enables privacy-preserving secure semantic access control and allows queries to be answered...

متن کامل

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important issue. Many researchers have proposed...

متن کامل

I Know What You Saw Last Minute - The Chrome Browser Case

Previous research has shown that information can be extracted from encrypted multimedia streams. This includes video titles classification of non-HTTP adaptive streams (nonHAS). This paper presents an algorithm for encrypted HTTP adaptive video streaming title classification. We evaluated our algorithm on a new YouTube popular videos dataset that was collected from the Internet under real-world...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

I Know What You Saw Last Minute - Encrypted HTTP Adaptive Video Streaming Title Classification

Previous research has shown that information can be extracted from encrypted multimedia streams. This includes video titles classification of non HTTP adaptive streams (nonHAS). This paper presents an algorithm for encrypted HTTP adaptive video streaming title classification. We evaluated our algorithm on a new YouTube popular videos dataset that was collected from the internet under real-world...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005