A Web Traffic Analysis Attack Using Only Timing Information

被引:49
|
作者
Feghhi, Saman [1 ]
Leith, Douglas J. [1 ]
机构
[1] Trinity Coll Dublin, Sch Comp Sci & Stat, Dublin 2, Ireland
基金
爱尔兰科学基金会;
关键词
Network privacy; timing-only attacks; traffic analysis; website fingerprinting; IDENTIFICATION;
D O I
10.1109/TIFS.2016.2551203
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defenses. In addition, unlike existing approaches, this timing-only attack does not require the knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the attack against both wired and wireless traffic, achieving mean success rates in excess of 90%. In addition to being of interest in its own right, this timing-only attack serves to highlight deficiencies in existing defenses and so to areas where it would be beneficial for virtual private network (VPN) designers to focus further attention.
引用
下载
收藏
页码:1758 / 1770
页数:13
相关论文
共 50 条
  • [41] TRAFAN: Road Traffic Analysis Using Social Media Web Pages
    Akilesh, B.
    Kumar, Nagendra
    Reddy, Bharath
    Singh, Manish
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 655 - 659
  • [42] Enterprise Network Traffic Monitoring, Analysis, and Reporting Using Web Technology
    Hong J.W.
    Park S.-U.
    Kang Y.-M.
    Park J.-T.
    Journal of Network and Systems Management, 2001, 9 (1) : 89 - 111
  • [43] Empirical analysis on influence of traffic information by divergence rate using observed traffic data
    Ahn, Y
    Uno, N
    Kurauchi, F
    Iida, Y
    Proceedings of the Eastern Asia Society for Transportation Studies, Vol 5, 2005, 5 : 1484 - 1495
  • [44] Web Fingerprint Defense with Timing-assistant Traffic Burst Shaping
    Chen, Bo
    Yang, Chen
    Wang, Can
    Wu, Xuangou
    2023 19TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN 2023, 2023, : 333 - 340
  • [45] Timing analysis of rate-constrained traffic in TTEthernet using network calculus
    Luxi Zhao
    Paul Pop
    Qiao Li
    Junyan Chen
    Huagang Xiong
    Real-Time Systems, 2017, 53 : 254 - 287
  • [46] Timing analysis of rate-constrained traffic in TTEthernet using network calculus
    Zhao, Luxi
    Pop, Paul
    Li, Qiao
    Chen, Junyan
    Xiong, Huagang
    REAL-TIME SYSTEMS, 2017, 53 (02) : 254 - 287
  • [47] Label-Only Model Inversion Attacks: Attack With the Least Information
    Zhu, Tianqing
    Ye, Dayong
    Zhou, Shuai
    Liu, Bo
    Zhou, Wanlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 991 - 1005
  • [48] GML encoded traffic information web services system
    Lee, E
    Kim, MJ
    Kim, M
    Joo, IH
    Jang, BT
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3090 - 3094
  • [49] Traffic impact analysis by using geographic information system technology
    Sarasua, Wayne
    Simas De Oliveira, Marcelo G.
    Carroll, Bradley
    Troemel, David
    Transportation Research Record, 1999, (1660): : 84 - 91
  • [50] Analysis of the characteristics of expressway traffic information propagation using Twitter
    Hwan Pil Lee
    Doo-Pyo Hong
    Eum Han
    Soo Hee Kim
    Ilsoo Yun
    KSCE Journal of Civil Engineering, 2016, 20 : 2587 - 2597