Few-shot website fingerprinting attack with cluster adaptation

被引:10
作者
Zhou, Qiang [1 ]
Wang, Liangmin [2 ]
Zhu, Huijuan [1 ]
Lu, Tong [1 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Xuefu St, Zhenjiang 212013, Jiangsu, Peoples R China
[2] Southeast Univ, Sch Cyber Sci & Engn, Moling St, Nanjing 211102, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
User privacy; Anonymous network; Website fingerprinting; Few-shot learning; Feature alignment;
D O I
10.1016/j.comnet.2023.109780
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Website fingerprinting attacks can destroy users' privacy on the Internet, even when the communication is through an anonymous system, such as Tor. Deep learning-based website fingerprinting attacks have made great progress in anonymous traffic classification, and obtained high classification accuracy. However, deep website fingerprinting attacks require a large amount of training data with annotations. With the version update of anonymous network systems or network condition changing, previously collected traffic traces cannot be used for the classification of the newly collected traces, and recollecting traffic traces is time-consuming and labor-intensive. To address the above problems, this paper proposes Cluster Website Fingerprinting Attack (CWFA) for the few-shot website fingerprinting attack, which is based on the clustering assumption: samples belonging to the same cluster have the same category. CWFA utilizes deep neural networks to extract the trace features, and aligns the labeled category centers with unlabeled target cluster centers in the feature space. CWFA can preserve the category-level structure and facilitates the classification of the newly collected traffic traces. We conduct extensive experiments on public datasets in both closed-world and open-world scenarios, and we test the performance of the defended traces. Compared with the state-of-the-art WF methods, experiment results demonstrate the effectiveness and superiority of our proposed method.
引用
收藏
页数:11
相关论文
共 40 条
[1]  
Abe K., 2016, P ASIA PACIFIC ADV N, V42, P15
[2]  
[Anonymous], 2022, US TOR METR
[3]  
Bhat Sanjit, 2019, Proceedings on Privacy Enhancing Technologies, V2019, P292, DOI 10.2478/popets-2019-0070
[4]  
Cai X., 2012, P ACM C COMP COMM SE, P605, DOI DOI 10.1145/2382196.2382260
[5]   A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses [J].
Cai, Xiang ;
Nithyanand, Rishab ;
Wang, Tao ;
Johnson, Rob ;
Goldberg, Ian .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :227-238
[6]  
Chapelle O., 2005, AISTATS, P57
[7]   Few-Shot Website Fingerprinting Attack with Data Augmentation [J].
Chen, Mantun ;
Wang, Yongjun ;
Qin, Zhiquan ;
Zhu, Xiatian .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[8]   Few-shot website fingerprinting attack [J].
Chen, Mantun ;
Wang, Yongjun ;
Xu, Hongzuo ;
Zhu, Xiatian .
COMPUTER NETWORKS, 2021, 198
[9]  
Cherubin G, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P753
[10]   TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting [J].
De la Cadena, Wladimir ;
Mitseva, Asya ;
Hiller, Jens ;
Pennekamp, Jan ;
Reuter, Sebastian ;
Filter, Julian ;
Engel, Thomas ;
Wehrle, Klaus ;
Panchenko, Andriy .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :1971-1985