Defeating deep learning based de-anonymization attacks with adversarial example

被引:0
|
作者
Yin, Haoyu [1 ]
Liu, Yingjian [1 ]
Li, Yue [1 ]
Guo, Zhongwen [1 ]
Wang, Yu [2 ]
机构
[1] Ocean Univ China, Coll Comp Sci & Technol, Qingdao 266100, Shandong, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Website fingerprinting; Adversarial example; Privacy; Deep learning; Anonymity;
D O I
10.1016/j.jnca.2023.103733
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning (DL) technologies bring new threats to network security. Website fingerprinting attacks (WFA) using DL models can distinguish victim's browsing activities protected by anonymity technologies. Unfortunately, traditional countermeasures (website fingerprinting defenses, WFD) fail to preserve privacy against DL models. In this paper, we apply adversarial example technology to implement new WFD with static analyzing (SA) and dynamic perturbation (DP) settings. Although DP setting is close to a real-world scenario, its supervisions are almost unavailable due to the uncertainty of upcoming traffics and the difficulty of dependency analysis over time. SA setting relaxes the real-time constraints in order to implement WFD under a supervised learning perspective. We propose Greedy Injection Attack (GIA), a novel adversarial method for WFD under SA setting based on zero-injection vulnerability test. Furthermore, Sniper is proposed to mitigate the computational cost by using a DL model to approximate zero-injection test. FCNSniper and RNNSniper are designed for SA and DP settings respectively. Experiments show that FCNSniper decreases classification accuracy of the state-of-the-art WFA model by 96.57% with only 2.29% bandwidth overhead. The learned knowledge can be efficiently transferred into RNNSniper. As an indirect adversarial example attack approach, FCNSniper can be well generalized to different target WFA models and datasets without suffering fatal failures from adversarial training.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Leader-based de-anonymization of an anonymous read/write memory
    Godard, Emmanuel
    Imbs, Damien
    Raynal, Michel
    Taubenfeld, Gadi
    THEORETICAL COMPUTER SCIENCE, 2020, 836 : 110 - 123
  • [22] Deeply Understanding Structure-based Social Network De-anonymization
    Tian, Wenqian
    Mao, Jian
    Jiang, Jingbo
    He, Zhaoyuan
    Zhou, Zhihong
    Liu, Jianwei
    2017 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2018, 129 : 52 - 58
  • [23] Mutex-Based De-anonymization of an Anonymous Read/Write Memory
    Godard, Emmanuel
    Imbs, Damien
    Raynal, Michel
    Taubenfeld, Gadi
    NETWORKED SYSTEMS, NETYS 2019, 2019, 11704 : 311 - 326
  • [24] Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning
    Akers, Matthew
    Barton, Armon
    COMPUTER, 2024, 57 (01) : 88 - 99
  • [25] An Enhanced Structure-Based De-anonymization of Online Social Networks
    Li, Hong
    Zhang, Cheng
    He, Yunhua
    Cheng, Xiuzhen
    Liu, Yan
    Sun, Limin
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 331 - 342
  • [26] Structure based data de-anonymization of social networks and mobility traces
    Ji, Shouling
    Li, Weiqing
    Srivatsa, Mudhakar
    He, Jing Selena
    Beyah, Raheem
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8783 : 237 - 254
  • [27] Adversarial attacks and adversarial training for burn image segmentation based on deep learning
    Chen, Luying
    Liang, Jiakai
    Wang, Chao
    Yue, Keqiang
    Li, Wenjun
    Fu, Zhihui
    MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2024, 62 (09) : 2717 - 2735
  • [28] Adversarial Attacks and Defenses in Deep Learning
    Ren, Kui
    Zheng, Tianhang
    Qin, Zhan
    Liu, Xue
    ENGINEERING, 2020, 6 (03) : 346 - 360
  • [29] The De-anonymization Method Based on User Spatio-Temporal Mobility Trace
    Chen, Zhenyu
    Fu, Yanyan
    Zhang, Min
    Zhang, Zhenfeng
    Li, Hao
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 459 - 471
  • [30] Adversarial Attacks in a Deep Reinforcement Learning based Cluster Scheduler
    Zhang, Shaojun
    Wang, Chen
    Zomaya, Albert Y.
    2020 IEEE 28TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS 2020), 2020, : 1 - 8