A Critical Evaluation of Website Fingerprinting Attacks

被引:175
作者
Juarez, Marc [1 ]
Afroz, Sadia [2 ]
Acar, Gunes [1 ]
Diaz, Claudia [1 ]
Greenstadt, Rachel [3 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC & iMinds, Leuven, Belgium
[2] Univ Calif Berkeley, Berkeley, CA USA
[3] Drexel Univ, Philadelphia, PA 19104 USA
来源
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2014年
基金
美国国家科学基金会;
关键词
Website fingerprinting; Tor; privacy; IDENTIFICATION;
D O I
10.1145/2660267.2660368
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent studies on Website Fingerprinting (WF) claim to have found highly effective attacks on Tor. However, these studies make assumptions about user settings, adversary capabilities, and the nature of the Web that do not necessarily hold in practical scenarios. The following study critically evaluates these assumptions by conducting the attack where the assumptions do not hold. We show that certain variables, for example, user's browsing habits, differences in location and version of Tor Browser Bundle, that are usually omitted from the current WF model have a significant impact on the efficacy of the attack. We also empirically show how prior work succumbs to the base rate fallacy in the open-world scenario. We address this problem by augmenting our classification method with a verification step. We conclude that even though this approach reduces the number of false positives over 63%, it does not completely solve the problem, which remains an open issue for WF attacks.
引用
收藏
页码:263 / 274
页数:12
相关论文
共 33 条
  • [1] Alexa, 2014, AL TOP 500 GLOB SIT
  • [2] [Anonymous], TEST PIL TAB OP CLOS
  • [3] [Anonymous], 1998, TRAFFIC ANAL SSL ENC
  • [4] Bissias GD, 2006, LECT NOTES COMPUT SC, V3856, P1
  • [5] Cai X., 2012, P 2012 ACM C COMP CO, P605, DOI [DOI 10.1145/2382196.2382260, 10.1145/2382196.2382260]
  • [6] CHOW CK, 1970, IEEE T INFORM THEORY, V16, P41, DOI 10.1109/TIT.1970.1054406
  • [7] Coull SE, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P339
  • [8] Danezis G., 2009, TRAFFIC ANAL HTTP PR
  • [9] Dingledine R., 2004, USENIX SEC S
  • [10] Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
    Dyer, Kevin P.
    Coull, Scott E.
    Ristenpart, Thomas
    Shrimpton, Thomas
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 332 - 346