Deep Learning Website Fingerprinting Features

نویسنده

  • Vera Rimmer
چکیده

Anonymity networks like Tor enable Internet users to browse the web anonymously. This helps citizens circumvent censorship from repressive governments, journalists communicate with anonymous sources or regular users to avoid tracking online. However, adversaries can try to identify anonymous users by deploying several attacks. One of such attacks is website fingerprinting. Website fingerprinting exploits the ability of an adversary to generate anonymized (encrypted) traffic to a number of websites and then compare it —based on traffic metadata such as packet timing, size and direction—, to the traffic metadata of the users the adversary wishes to de-anonymize. When a user’s traffic metadata matches the metadata the adversary had previously generated, the website the user visits may be revealed to the adversary, thus breaking the user’s anonymity. In prior works, authors have identified several features that allow an adversary to fingerprint the websites visited by a user. Examples of such features include packet length counts or the timing and volume of traffic bursts. These features were however manually identified, e.g., using heuristics, leaving open the question of whether there are more identifying features or methods to fingerprint the websites visited by the anonymous users. In this thesis we depart from prior work and design a website fingerprinting attack with automated feature extraction, this is, we do not manually select the identifying features to fingerprint the websites but rely on machine learning methods to do so. Specifically, we use deep learning techniques to learn the best fingerprinting features and demonstrate the viability of our attack by deploying it on a closed-world scenario of 100 webpages. Our results show that, with 71% website identification accuracy, adversaries can use machine learning methods to de-anonymize Tor traffic instead of having to rely on the manual selection of fingerprinting features. This is a first and promising step on a new avenue of website fingerprinting attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we ...

متن کامل

Automated Website Fingerprinting through Deep Learning

Several studies have shown that the network traffic that is generated by a visit to a website over Tor reveals information specific to the website through the timing and sizes of network packets. By capturing traffic traces between users and their Tor entry guard, a network eavesdropper can leverage this meta-data to reveal which website Tor users are visiting. The success of such attacks heavi...

متن کامل

Traffic Analysis with Deep Learning

Recent advances in learning Deep Neural Network (DNN) architectures have received a great deal of attention due to their ability to outperform state-of-the-art classifiers across a wide range of applications, with little or no feature engineering. In this paper, we broadly study the applicability of deep learning to website fingerprinting. We show that unsupervised DNNs can be used to extract l...

متن کامل

Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting

In recent years, there have been many works that use website fingerprinting techniques to enable a local adversary to determine which website a Tor user is visiting. However, most of these works rely on manually extracted features, and thus are fragile: a small change in the protocol or a simple defense often renders these attacks useless. In this work, we leverage deep learning techniques to c...

متن کامل

Optimizing Precision for Open-World Website Fingerprinting

Traffic analysis attacks to identify which web page a client is browsing, using only her packet metadata — known as website fingerprinting — has been proven effective in closed-world experiments against privacy technologies like Tor. However, due to the base rate fallacy, these attacks have failed in large open-world settings against clients that visit sensitive pages with a low base rate. We f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016