Back to Search
Start Over
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
- Source :
- INFOCOM
- Publication Year :
- 2020
- Publisher :
- IEEE, 2020.
-
Abstract
- The Onion Router (Tor) is designed to support an anonymous communication through end-to-end encryption. To prevent vulnerability of side channel attacks (e.g. website fingerprinting), dummy packet injection modules have been embedded in Tor to conceal trace patterns that are associated with the individual websites. However, recent study shows that current Website Fingerprinting (WF) defenses still generate patterns that may be captured and recognized by the deep learning technology. In this paper, we conduct in-depth analyses of two state-of-the-art WF defense approaches. Then, based on our new observations and insights, we propose a novel defense mechanism using a per-burst injection technique, called Deep Fingerprinting Defender (DFD), against deep learning-based WF attacks. The DFD has two operation modes, one-way and two-way injection. DFD is designed to break the inherent patterns preserved in Tor user’s traces by carefully injecting dummy packets within every burst. We conducted extensive experiments to evaluate the performance of DFD over both closed-world and open-world settings. Our results demonstrate that these two configurations can successfully break the Tor network traffic pattern and achieve a high evasion rate of 86.02% over one-way client-side injection rate of 100%, a promising improvement in comparison with state-of-the-art adversarial trace’s evasion rate of 60%. Moreover, DFD outperforms the state-of-the-art alternatives by requiring lower bandwidth overhead; 14.26% using client-side injection.
- Subjects :
- Router
Network packet
business.industry
Computer science
Packet injection
Evasion (network security)
020206 networking & telecommunications
Cryptography
02 engineering and technology
Encryption
0202 electrical engineering, electronic engineering, information engineering
Overhead (computing)
020201 artificial intelligence & image processing
Side channel attack
business
Computer network
Vulnerability (computing)
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- IEEE INFOCOM 2020 - IEEE Conference on Computer Communications
- Accession number :
- edsair.doi...........73a378e6294c52a9f64a1d61aa4fab9e
- Full Text :
- https://doi.org/10.1109/infocom41043.2020.9155465