An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks

被引:0
作者
Taher Al-Shehari
Sami Zhioua
机构
[1] King Saud University,Information and Computer Science Department
[2] King Fahd University of Petroleum and Minerals,undefined
来源
Cluster Computing | 2018年 / 21卷
关键词
User privacy; Anonymity system; Traffic analysis; Website fingerprinting; Web browsers;
D O I
暂无
中图分类号
学科分类号
摘要
Anonymity protocols are employed to establish encrypted tunnels to protect the privacy of Internet users from traffic analysis attacks. However, the attackers strive to infer some traffic patterns’ characteristics (e.g. packet directions, packet sizes, inter-packet timing, etc.) in order to expose the identities of Internet users and their activities. A recent and popular traffic analysis attack is called website fingerprinting which reveals the identity of websites visited by target users. Existing work in the literature studied the website fingerprinting attack using a single web browser, namely Firefox. In this paper we propose a unified traffic analysis attack model composed of a sequence of phases that demonstrate the efficiency of website fingerprinting attack using popular web browsers under Tor (The Onion Router). In addition, we reveal the main factors that affect the accuracy of website fingerprinting attack over Tor anonymous system and using different browsers. To the best of our knowledge, no previous study uncovered such factors by deploying real-world traffic analysis attack utilizing the top five web browsers. The outcomes of the research are very relevant to Internet users (individuals/companies/governments) since they allow to assess to which extent their privacy is preserved in presence of traffic analysis attacks, in particular, website fingerprinting over different browsers. A recommendation for future research direction regarding the investigation of website fingerprinting over different scenarios is also provided.
引用
收藏
页码:1917 / 1931
页数:14
相关论文
共 27 条
  • [1] Warren SD(1890)The right to privacy Harvard Law Rev. 4 193-220
  • [2] Brandeis LD(1999)Internet privacy concerns confirm the case for intervention Commun. ACM 42 60-67
  • [3] Clarke R(1993)"How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use MIS Quarterly 17 341-90
  • [4] Culnan Mary J.(2014)Improving Operating system fingerprinting using machine learning techniques Int. J. Comput. Theor. Eng. 6 57-262
  • [5] Al-Shehari T(1981)Untraceable electronic mail, return addresses, and digital pseudonyms Commun. ACM 24 84-4241
  • [6] Shahzad F(2013)Survey on JavaScript security policies and their enforcement mechanisms in a web browser J. Logic Algebr. Progr. 82 243-2093
  • [7] Chaum DL(2015)The web browser factor in traffic analysis attacks Secur. Commun. Netw. 8 4227-1944
  • [8] Bielova N(2014)A combined solution for the Internet access denial caused by malicious Internet service providers Secur. Commun. Netw. 7 2078-88
  • [9] Zhioua S(2014)Privacy-assured substructure similarity query over encrypted graph-structured data in cloud Secur. Commun. Netw. 7 1933-375
  • [10] Abu-Amara M(2001)A guided tour to approximate string matching ACM Comput. Surv. (CSUR) 33 31-1066