The web browser factor in traffic analysis attacks

被引:6
|
作者
Zhioua, Sami [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Informat & Comp Sci Dept, Al Dhahran 31261, Saudi Arabia
关键词
online privacy; anonymity protocols; traffic analysis; website fingerprinting; INTERNET; PRIVACY;
D O I
10.1002/sec.1338
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Website fingerprinting is a known type of traffic analysis attacks that aims to identify which websites are visited in encrypted traffic traces. Recent work showed that some classifiers can successfully identify 90% of visited websites. Because web browsers use different rendering engines and networking application program interfaces (APIs), they tend to resist differently to website fingerprinting attacks. In this paper, we study to which extent popular web browsers can resist such attacks by analyzing the shape of their network traffic when fetching websites. To this end, five fine-grained measures are used to point out very subtle differences in the network traffic of each web browser. Empirical analysis showed that, among six studied web browsers (Chrome, Firefox, Internet Explorer, Safari, Opera, and Tor Browser), Opera and Safari offer the highest resistance to website fingerprinting. Because most of existing fingerprinting techniques have been evaluated using Firefox web browser, we expect the accuracy results of existing work to be reduced in case Opera or Safari browser is used. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4227 / 4241
页数:15
相关论文
共 50 条
  • [1] Responding to worsening web browser attacks
    Lee, Jonathan
    [J]. Network Security, 2023, 2023 (01)
  • [2] Scriptless Timing Attacks on Web Browser Privacy
    Liang, Bin
    You, Wei
    Liu, Liangkun
    Shi, Wenchang
    Heiderich, Mario
    [J]. 2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, : 112 - 123
  • [3] CORP: A Browser Policy to Mitigate Web Infiltration Attacks
    Telikicherla, Krishna Chaitanya
    Choppella, Venkatesh
    Bezawada, Bruhadeshwar
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 277 - 297
  • [4] Efficient Anonymous Web Browsing Preventing Traffic Analysis Attacks
    Priyanka, A. R.
    BalaSubramanian, Kannan
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 426 - 431
  • [5] Security of Web browser scripting languages: Vulnerabilities, attacks, and remedies
    Anupam, V
    Mayer, A
    [J]. PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 187 - 199
  • [6] An Efficient Web Traffic Defence Against Timing-Analysis Attacks
    Feghhi, Saman
    Leith, Douglas J.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 525 - 540
  • [7] Protecting Web Browser Extensions from Java']JavaScript Injection Attacks
    Barua, Anton
    Zulkernine, Mohammad
    Weldemariam, Komminist
    [J]. 2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 188 - 197
  • [8] Systematic Analysis of Web Browser Caches
    Hoai Viet Nguyen
    Lo Iacono, Luigi
    Federrath, Hannes
    [J]. WS.2 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON WEB STUDIES, 2018, : 64 - 71
  • [9] Man in the Browser Attacks
    Dougan, Timothy
    Curran, Kevin
    [J]. INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2012, 4 (01) : 29 - 39
  • [10] Predicted Packet Padding for Anonymous Web Browsing Against Traffic Analysis Attacks
    Yu, Shui
    Zhao, Guofeng
    Dou, Wanchun
    James, Simon
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1381 - 1393