Web Fingerprint Defense with Timing-assistant Traffic Burst Shaping

被引:0
|
作者
Chen, Bo [1 ,2 ]
Yang, Chen [1 ,3 ]
Wang, Can [1 ,2 ]
Wu, Xuangou [1 ,2 ]
机构
[1] Anhui Univ Technol, Sch Comp Sci & Technol, Maanshan, Peoples R China
[2] Anhui Prov Key Lab Digital Twin Technol Met Ind, Maanshan, Peoples R China
[3] Anhui Engn Res Ctr Intelligent Applicat & Secur I, Maanshan, Peoples R China
关键词
Fingerprint defense; Fingerprint attack; Distributed application; Onion routing;
D O I
10.1109/MSN60784.2023.00057
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Website Fingerprinting (WF) is a traffic analysis attack that can identify the encrypted network activities of clients, allowing for the determination of which web pages the clients are accessing. Recently, many WF defense approaches have been proposed, such as WTF-PAD and Walkie-Talkie, which have now become Tors primary deployed defense mechanisms. However, these WF defense approaches have proven less effective when faced with deep learning technology. The identification accuracy of DF-based attack approaches exceeds by over 90%. To address the above problem, we present time-assisted traffic-shaping defense approach. Our approach integrates multi-website traffic based on timestamp information to incorporate all burstlevel features. To create more confusion in website features, we use random time thresholds to segment bursts in different combinations for better shaping. We perform performance evaluations on DApps and find that our approach can significantly decrease the accuracy of DApps fingerprint attacks to less than 50%. Moreover, our approach is also effective in Tor scenarios.
引用
收藏
页码:333 / 340
页数:8
相关论文
共 19 条
  • [1] Burst Assembly Method with Traffic Shaping for the Optical Burst Switching Network
    Du, Ping
    Abe, Shunji
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [2] Study of Token Generation for Burst Traffic Shaping in Optical Burst Switching Networks
    So Won-ho
    Kim Young-chon
    [J]. Wuhan University Journal of Natural Sciences, 2004, (01) : 27 - 30
  • [3] Traffic shaping trends in optical packet/burst switching networks
    Cano, Maria-Dolores
    Pavon-Marino, Pablo
    Ortuno-Manzanera, Alejandro
    Garcia-Haro, Joan
    [J]. ICTON 2008: PROCEEDINGS OF 2008 10TH ANNIVERSARY INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 3, 2008, : 134 - 137
  • [4] Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks
    Zhou, Yanqi
    Wagh, Sameer
    Mittal, Prateek
    Wentzlaff, David
    [J]. 2017 23RD IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2017, : 337 - 348
  • [5] Covert timing channels: analyzing WEB traffic
    Nasseralfoghara, Mehrdad
    Hamidi, Hamid Reza
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (02) : 117 - 126
  • [6] Covert timing channels: analyzing WEB traffic
    Mehrdad Nasseralfoghara
    Hamid Reza Hamidi
    [J]. Journal of Computer Virology and Hacking Techniques, 2022, 18 : 117 - 126
  • [7] An optimal burst assembly approach employing traffic shaping (OBATS) for OBS
    Garg, Amit Kumar
    [J]. OPTIK, 2013, 124 (22): : 5657 - 5659
  • [8] Cost-effective web cluster mechanism for burst traffic
    Pao, Tsang-Long
    Chen, Jian-Bo
    [J]. WSEAS Transactions on Computers, 2007, 6 (04): : 666 - 673
  • [9] A traffic shaping heuristic for congestion control in optical burst-switched networks
    Jin, Mushi
    Yang, Oliver W. W.
    [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 529 - +
  • [10] A Web Traffic Analysis Attack Using Only Timing Information
    Feghhi, Saman
    Leith, Douglas J.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1758 - 1770