BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks

被引:25
作者
Al-Naami, Khaled [1 ]
El-Ghamry, Amir [1 ,2 ]
Islam, Md Shihabul [1 ]
Khan, Latifur [1 ]
Thuraisingham, Bhavani [1 ]
Hamlen, Kevin W. [1 ]
Alrahmawy, Mohammed [2 ]
Rashad, Magdi Z. [2 ]
机构
[1] Univ Texas Dallas, Comp Sci Dept, Richardson, TX 75080 USA
[2] Mansoura Univ, Dept Comp Sci, Fac Comp & Informat, Mansoura 35516, Egypt
关键词
Servers; Feature extraction; Privacy; Uplink; Monitoring; Encryption; Traffic analysis; website fingerprinting defenses;
D O I
10.1109/TDSC.2019.2907240
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network traffic analysis has been increasingly used in various applications to either protect or threaten people, information, and systems. Website fingerprinting is a passive traffic analysis attack which threatens web navigation privacy. It is a set of techniques used to discover patterns from a sequence of network packets generated while a user accesses different websites. Internet users (such as online activists or journalists) may wish to hide their identity and online activity to protect their privacy. Typically, an anonymity network is utilized for this purpose. These anonymity networks such as Tor (The Onion Router) provide layers of data encryption which poses a challenge to the traffic analysis techniques. Although various defenses have been proposed to counteract this passive attack, they have been penetrated by new attacks that proved the ineffectiveness and/or impracticality of such defenses. In this work, we introduce a novel defense algorithm to counteract the website fingerprinting attacks. The proposed defense obfuscates original website traffic patterns through the use of double sampling and mathematical optimization techniques to deform packet sequences and destroy traffic flow dependency characteristics used by attackers to identify websites. We evaluate our defense against state-of-the-art studies and show its effectiveness with minimal overhead and zero-delay transmission to the real traffic.
引用
收藏
页码:505 / 517
页数:13
相关论文
共 27 条
[1]  
Al-Naami K., 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications, P177, DOI DOI 10.1145/2991079.2991123
[2]  
Alexa, TOP VIS SIT WEB
[3]  
[Anonymous], 2001, IPSEC SECURING VPNS
[4]  
[Anonymous], APACHE SPARK
[5]  
Cai X., 2012, P 2012 ACM C COMP CO, P605, DOI DOI 10.1145/2382196.2382260
[6]   A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses [J].
Cai, Xiang ;
Nithyanand, Rishab ;
Wang, Tao ;
Johnson, Rob ;
Goldberg, Ian .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :227-238
[7]  
Dingledine R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P303
[8]   Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail [J].
Dyer, Kevin P. ;
Coull, Scott E. ;
Ristenpart, Thomas ;
Shrimpton, Thomas .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :332-346
[9]  
Gu XD, 2015, INT C COMP SUPP COOP, P234, DOI 10.1109/CSCWD.2015.7230964
[10]  
Hayes J, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P1187