A Web Traffic Analysis Attack Using Only Timing Information

被引:49
|
作者
Feghhi, Saman [1 ]
Leith, Douglas J. [1 ]
机构
[1] Trinity Coll Dublin, Sch Comp Sci & Stat, Dublin 2, Ireland
基金
爱尔兰科学基金会;
关键词
Network privacy; timing-only attacks; traffic analysis; website fingerprinting; IDENTIFICATION;
D O I
10.1109/TIFS.2016.2551203
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defenses. In addition, unlike existing approaches, this timing-only attack does not require the knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the attack against both wired and wireless traffic, achieving mean success rates in excess of 90%. In addition to being of interest in its own right, this timing-only attack serves to highlight deficiencies in existing defenses and so to areas where it would be beneficial for virtual private network (VPN) designers to focus further attention.
引用
下载
收藏
页码:1758 / 1770
页数:13
相关论文
共 50 条
  • [21] Detecting latent attack behavior from aggregated Web traffic
    Xie, Y.
    Tang, S.
    Huang, X.
    Tang, C.
    Liu, X.
    COMPUTER COMMUNICATIONS, 2013, 36 (08) : 895 - 907
  • [22] TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack
    Sharon, Yam
    Berend, David
    Liu, Yang
    Shabtai, Asaf
    Elovici, Yuval
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3225 - 3237
  • [23] A proposal for a multimedia traffic analysis attack
    Bradford, PG
    Gavrylyako, OV
    Ward, CB
    Wiegand, N
    ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 261 - 267
  • [24] Analysis of traffic flow in urban areas using web cameras
    Santini, S
    FIFTH IEEE WORKSHOP ON APPLICATIONS OF COMPUTER VISION, PROCEEDINGS, 2000, : 140 - 145
  • [25] A Graph Theoretical Analysis of the Web Using DNS Traffic Traces
    Sanders, Sean
    Kaur, Jasleen
    2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS 2015), 2015, : 11 - 14
  • [26] Quantifying Information Leaks in Outbound Web Traffic
    Borders, Kevin
    Prakash, Atul
    PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 129 - +
  • [27] Timing Analysis of AVB Traffic in TSN Networks using Network Calculus
    Zhao, Luxi
    Pop, Paul
    Zheng, Zhong
    Li, Qiao
    24TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2018), 2018, : 25 - 36
  • [28] Refining Traffic Information for Analysis using Evidence Theory
    Li, Bing
    Huang, Dijiang
    Wang, Zhijie
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 1181 - 1186
  • [29] TIMING SIDE CHANNELS FOR TRAFFIC ANALYSIS
    Gong, Xun
    Kiyavash, Negar
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 8697 - 8701
  • [30] Machine Learning Based Web-Traffic Analysis for Detection of Fraudulent Resource Consumption Attack in Cloud
    Rustogi, Rishabh
    Agarwal, Abhishek
    Prasad, Ayush
    Saurabh, Samant
    2019 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2019), 2019, : 456 - 460