An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks

被引:11
作者
Al-Shehari, Taher [1 ]
Zhioua, Sami [2 ]
机构
[1] King Saud Univ, Riyadh, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Informat & Comp Sci Dept, Dhahran 31261, Saudi Arabia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2018年 / 21卷 / 04期
关键词
User privacy; Anonymity system; Traffic analysis; Website fingerprinting; Web browsers; TOR;
D O I
10.1007/s10586-018-2817-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymity protocols are employed to establish encrypted tunnels to protect the privacy of Internet users from traffic analysis attacks. However, the attackers strive to infer some traffic patterns' characteristics (e.g. packet directions, packet sizes, inter-packet timing, etc.) in order to expose the identities of Internet users and their activities. A recent and popular traffic analysis attack is called website fingerprinting which reveals the identity of websites visited by target users. Existing work in the literature studied the website fingerprinting attack using a single web browser, namely Firefox. In this paper we propose a unified traffic analysis attack model composed of a sequence of phases that demonstrate the efficiency of website fingerprinting attack using popular web browsers under Tor(The Onion Router). In addition, we reveal the main factors that affect the accuracy of website fingerprinting attack over Tor anonymous system and using different browsers. To the best of our knowledge, no previous study uncovered such factors by deploying real-world traffic analysis attack utilizing the top five web browsers. The outcomes of the research are very relevant to Internet users (individuals/companies/governments) since they allow to assess to which extent their privacy is preserved in presence of traffic analysis attacks, in particular, website fingerprinting over different browsers. A recommendation for future research direction regarding the investigation of website fingerprinting over different scenarios is also provided.
引用
收藏
页码:1917 / 1931
页数:15
相关论文
共 43 条
[2]  
Akhawe Devdatta, 2013, USENIX SEC S
[3]  
Al-Shehari Taher, 2014, International Journal of Computer Theory and Engineering, V6, P57, DOI 10.7763/IJCTE.2014.V6.837
[4]  
[Anonymous], P WORKSH PRIV EL SOC
[5]  
[Anonymous], 2001, LECT NOTECOMPUTER
[6]  
[Anonymous], 2013, Anonymity, privacy, and security online (North America) Report
[7]  
[Anonymous], 2004, TOR 2 GENERATION ONI
[8]  
[Anonymous], 2002, PRIV ENH TECHN 2 INT
[9]  
[Anonymous], 2009, P 2009 ACM WORKSH CL
[10]  
Barker Tom, 2012, PRO JAVASCRIPT PERFO, P1