An efficient cross-domain few-shot website fingerprinting attack with Brownian distance covariance

被引:5
作者
Zou, Hongcheng [1 ]
Su, Jinshu [1 ]
Wei, Ziling [1 ]
Chen, Shuhui [1 ]
Zhao, Baokang [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyberspace security; Cross-domain; Website fingerprinting; Few-shot learning; BDC; NETWORKS;
D O I
10.1016/j.comnet.2022.109461
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Website fingerprinting (WF) attacks can infer the specific websites from Tor encrypted traffic. However, most existing WF attacks require a large number of training samples (e.g., hundreds) per website to achieve the desirable accuracy. To lessen the training data scale, the low-data WF (LDWF) attacks are proposed. Whereas existing LDWF attacks generally require gathering an auxiliary dataset, which increases the bootstrap time to launch a WF attack. To address this limitation, we present the cross-domain LDWF attack problem and put forward the first cross-domain LDWF attack, namely WFBDC (WF with Brownian Distance Covariance), which can use a historical gathered dataset to be the auxiliary dataset. The primary advantage of WFBDC is the introduction of the BDC metric to measure the similarity between two samples. The key to BDC lies in that it defines the similarity by measuring the discrepancy between joint characteristic functions of embedded features and the product of the marginals. To mitigate the domain deviation, the transfer learning and multi-similarity loss techniques are also adopted. We conduct 10 experiments based on 15 datasets to evaluate the performance and efficiency of WFBDC. Evaluation results show that WFBDC can improve the performance of the state-of-the art LDWF attacks by up to 9% and 19% in the closed-world and open-world scenarios, respectively. Meanwhile, WFBDC can significantly reduce the pre-training time of existing LDWF attacks.
引用
收藏
页数:14
相关论文
共 45 条
[1]  
Abe K., 2016, ASIA PAC ADV NETW
[2]  
Abusnaina A, 2020, IEEE INFOCOM SER, P2459, DOI [10.1109/INFOCOM41043.2020.9155465, 10.1109/infocom41043.2020.9155465]
[3]  
[Anonymous], COMPUT COMMUN
[4]  
[Anonymous], ACM WORKSH CLOUD COM, DOI DOI 10.1145/3650116
[5]  
Bhat Sanjit, 2019, Proceedings on Privacy Enhancing Technologies, V2019, P292, DOI [10.2478/popets-2019-0070, 10.2478/popets-2019-0070]
[6]  
Cai X., 2014, WORKSHOP PRIVACY ELE
[7]  
Chen M., 2021, ARXIV
[8]  
Chen M., 2021, COMPUT NETW, P1
[9]   Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow [J].
Chen, Shuo ;
Wang, Rui ;
Wang, XiaoFeng ;
Zhang, Kehuan .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :191-206
[10]   TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting [J].
De la Cadena, Wladimir ;
Mitseva, Asya ;
Hiller, Jens ;
Pennekamp, Jan ;
Reuter, Sebastian ;
Filter, Julian ;
Engel, Thomas ;
Wehrle, Klaus ;
Panchenko, Andriy .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :1971-1985