Few-Shot Website Fingerprinting Attack with Data Augmentation

被引:13
作者
Chen, Mantun [1 ]
Wang, Yongjun [1 ]
Qin, Zhiquan [1 ]
Zhu, Xiatian [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Peoples R China
[2] Univ Surrey, Stag Hill,Univ Campus, Guildford GU2 7XH, Surrey, England
基金
中国国家自然科学基金;
关键词
Websites;
D O I
10.1155/2021/2840289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work introduces a novel data augmentation method for few-shot website fingerprinting (WF) attack where only a handful of training samples per website are available for deep learning model optimization. Moving beyond earlier WF methods relying on manually-engineered feature representations, more advanced deep learning alternatives demonstrate that learning feature representations automatically from training data is superior. Nonetheless, this advantage is subject to an unrealistic assumption that there exist many training samples per website, which otherwise will disappear. To address this, we introduce a model-agnostic, efficient, and harmonious data augmentation (HDA) method that can improve deep WF attacking methods significantly. HDA involves both intrasample and intersample data transformations that can be used in a harmonious manner to expand a tiny training dataset to an arbitrarily large collection, therefore effectively and explicitly addressing the intrinsic data scarcity problem. We conducted expensive experiments to validate our HDA for boosting state-of-the-art deep learning WF attack models in both closed-world and open-world attacking scenarios, at absence and presence of strong defense. For instance, in the more challenging and realistic evaluation scenario with WTF-PAD-based defense, our HDA method surpasses the previous state-of-the-art results by nearly 3% in classification accuracy in the 20-shot learning case. An earlier version of this work Chen et al. (2021) has been presented as preprint in ArXiv (https://arxiv.org/abs/2101.10063).
引用
收藏
页数:13
相关论文
共 56 条
[1]  
Abusnaina A, 2020, IEEE INFOCOM SER, P2459, DOI [10.1109/infocom41043.2020.9155465, 10.1109/INFOCOM41043.2020.9155465]
[2]  
Agarap A.F, 2018, Deep learning using rectified linear units (relu), P2
[3]   BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks [J].
Al-Naami, Khaled ;
El-Ghamry, Amir ;
Islam, Md Shihabul ;
Khan, Latifur ;
Thuraisingham, Bhavani ;
Hamlen, Kevin W. ;
Alrahmawy, Mohammed ;
Rashad, Magdi Z. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) :505-517
[4]  
[Anonymous], 2018, TOR DEV TOR METRICS
[5]  
[Anonymous], 2000, NIPS
[6]  
[Anonymous], 2016, MULTISCALE CONTEXT A
[7]  
Bhat Sanjit, 2019, Proceedings on Privacy Enhancing Technologies, V2019, P292, DOI 10.2478/popets-2019-0070
[8]  
Bissias GD, 2006, LECT NOTES COMPUT SC, V3856, P1
[9]  
Cai X., 2012, P 2012 ACM C COMP CO, P605, DOI DOI 10.1145/2382196.2382260
[10]   A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses [J].
Cai, Xiang ;
Nithyanand, Rishab ;
Wang, Tao ;
Johnson, Rob ;
Goldberg, Ian .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :227-238