Universal Website Fingerprinting Defense Based on Adversarial Examples

被引:1
作者
Hou, Chengshang [1 ]
Shi, Junzheng [1 ]
Cui, Mingxin [1 ]
Liu, Mengyan [1 ]
Yu, Jing [1 ]
机构
[1] Chinese Acad Sci, Univ Chinese Acad Sci, Sch Cyber Secur, Inst Informat Engn, Beijing, Peoples R China
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
关键词
Website Fingerprinting Attack; Website Fingerprinting Defense; Adversarial Machine Learning;
D O I
10.1109/TrustCom53373.2021.00031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Website fingerprinting (WF) attacks pose a threat to privacy of web activity, especially on anonymity networks such as Tor. Recent studies show that the deep neural network (DNN) significantly improves the impact of website fingerprinting attacks. Especially, DNN-based attack undermines the existing defense methods which are mainly rely on the manually designed rule. In this paper, we present a novel defense that generates universal perturbation that can transform original examples to adversarial examples which is effectively defending against a specific WF model. The proposed defense is evaluated on state-of-the-art DNN attack over a public Tor traffic dataset. The experimental results show our adversarial example generation method performs better than the baseline methods. The proposed defense defeats all existing WF attacks based on deep neural networks with a low overhead. Comparing with state-of-the-art defenses such as Walkie-Talkie and WTF-PAD with a lower bound of 31% and 64% overheads, the proposed defense achieves identical defense performance with at least 50% bandwidth overhead saving.
引用
收藏
页码:99 / 106
页数:8
相关论文
共 34 条
[1]  
Abusnaina A, 2020, IEEE INFOCOM SER, P2459, DOI [10.1109/infocom41043.2020.9155465, 10.1109/INFOCOM41043.2020.9155465]
[2]  
[Anonymous], ALEXA TOP SITES
[3]  
[Anonymous], 2018, 6 INT C LEARNING REP
[4]  
[Anonymous], TOR PROJECT
[5]  
[Anonymous], P INT C LEARN REPR
[6]  
[Anonymous], 2009, P 2009 ACM WORKSH CL
[7]   A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses [J].
Cai, Xiang ;
Nithyanand, Rishab ;
Wang, Tao ;
Johnson, Rob ;
Goldberg, Ian .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :227-238
[8]  
Cai Xiang, 2012, P 2012 ACM C COMP CO, P605, DOI DOI 10.1145/2382196.2382260
[9]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[10]   Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail [J].
Dyer, Kevin P. ;
Coull, Scott E. ;
Ristenpart, Thomas ;
Shrimpton, Thomas .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :332-346