Back to Search Start Over

Website Fingerprinting Attacks Based on Homology Analysis.

Authors :
Guo, Maohua
Fei, Jinlong
Source :
Security & Communication Networks; 10/4/2021, p1-14, 14p
Publication Year :
2021

Abstract

Website fingerprinting attacks allow attackers to determine the websites that users are linked to, by examining the encrypted traffic between the users and the anonymous network portals. Recent research demonstrated the feasibility of website fingerprinting attacks on Tor anonymous networks with only a few samples. Thus, this paper proposes a novel small-sample website fingerprinting attack method for SSH and Shadowsocks single-agent anonymity network systems, which focuses on analyzing homology relationships between website fingerprinting. Based on the latter, we design a Convolutional Neural Network-Bidirectional Long Short-Term Memory (CNN-BiLSTM) attack classification model that achieves 94.8% and 98.1% accuracy in classifying SSH and Shadowsocks anonymous encrypted traffic, respectively, when only 20 samples per site are available. We also highlight that the CNN-BiLSTM model has significantly better migration capabilities than traditional methods, achieving over 90% accuracy when applied on a new set of monitored sites with only five samples per site. Overall, our experiments demonstrate that CNN-BiLSTM is an efficient, flexible, and robust model for website fingerprinting attack classification. [ABSTRACT FROM AUTHOR]

Subjects

Subjects :
WEBSITES
ANONYMITY

Details

Language :
English
ISSN :
19390114
Database :
Complementary Index
Journal :
Security & Communication Networks
Publication Type :
Academic Journal
Accession number :
152795392
Full Text :
https://doi.org/10.1155/2021/6070451