A Web Traffic Analysis Attack Using Only Timing Information

被引:49
|
作者
Feghhi, Saman [1 ]
Leith, Douglas J. [1 ]
机构
[1] Trinity Coll Dublin, Sch Comp Sci & Stat, Dublin 2, Ireland
基金
爱尔兰科学基金会;
关键词
Network privacy; timing-only attacks; traffic analysis; website fingerprinting; IDENTIFICATION;
D O I
10.1109/TIFS.2016.2551203
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defenses. In addition, unlike existing approaches, this timing-only attack does not require the knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the attack against both wired and wireless traffic, achieving mean success rates in excess of 90%. In addition to being of interest in its own right, this timing-only attack serves to highlight deficiencies in existing defenses and so to areas where it would be beneficial for virtual private network (VPN) designers to focus further attention.
引用
下载
收藏
页码:1758 / 1770
页数:13
相关论文
共 50 条
  • [31] Timing Attack Analysis on AES on Modern Processors
    Kaushik, Prakhar
    Majumdar, Rana
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 462 - 465
  • [32] Web attack forensics based on network traffic behavior characteristics and URLs
    Sun, Guozi
    Zhu, Lei
    Li, Huakang
    Li, Wenjun
    2018 15TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS), 2018, : 550 - 555
  • [33] An Active De-anonymizing Attack Against Tor Web Traffic
    Yang, Ming
    Gu, Xiaodan
    Ling, Zhen
    Yin, Changxin
    Luo, Junzhou
    TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 22 (06) : 702 - 713
  • [34] An Active De-anonymizing Attack Against Tor Web Traffic
    Ming Yang
    Xiaodan Gu
    Zhen Ling
    Changxin Yin
    Junzhou Luo
    Tsinghua Science and Technology, 2017, 22 (06) : 702 - 713
  • [35] Fine-Grained Webpage Fingerprinting Using only Packet Length Information of Encrypted Traffic
    Shen, Meng
    Liu, Yiting
    Zhu, Liehuang
    Du, Xiaojiang
    Hu, Jiankun
    IEEE Transactions on Information Forensics and Security, 2021, 16 : 2046 - 2059
  • [36] Peekaboo: A Gray Hole Attack on Encrypted SCADA Communication using Traffic Analysis
    Torrisi, Nunzio Marco
    Vukovic, Ognjen
    Dan, Gyorgy
    Hagdahl, Stefan
    2014 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2014, : 902 - 907
  • [37] SIMPLE AND EFFICIENT PREDICTION OF NEAR FUTURE STATE OF TRAFFIC USING ONLY PAST SPEED INFORMATION
    Kababulut, Fevzi Yasin
    Kuntalp, Damla
    Akay, Olcay
    Duzenli, Timur
    PROMET-TRAFFIC & TRANSPORTATION, 2018, 30 (05): : 589 - 599
  • [38] Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic
    Shen, Meng
    Liu, Yiting
    Zhu, Liehuang
    Du, Xiaojiang
    Hu, Jiankun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2046 - 2059
  • [39] Developing A Web Information System for Traffic Light Waiting Time and Fuel Consumption Analysis
    Cheng, Che-Ju
    Chi, Lo
    Prasad, Shashi
    Yao, Hsiu-Hsen
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2015, : 306 - 307
  • [40] Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic
    Aziz, Adnan
    Hoffstadt, Dirk
    Ganz, Sebastian
    Rathgeb, Erwin
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 675 - 682