Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
153 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Realistic Website Fingerprinting By Augmenting Network Trace (2309.10147v1)

Published 18 Sep 2023 in cs.CR and cs.LG

Abstract: Website Fingerprinting (WF) is considered a major threat to the anonymity of Tor users (and other anonymity systems). While state-of-the-art WF techniques have claimed high attack accuracies, e.g., by leveraging Deep Neural Networks (DNN), several recent works have questioned the practicality of such WF attacks in the real world due to the assumptions made in the design and evaluation of these attacks. In this work, we argue that such impracticality issues are mainly due to the attacker's inability in collecting training data in comprehensive network conditions, e.g., a WF classifier may be trained only on samples collected on specific high-bandwidth network links but deployed on connections with different network conditions. We show that augmenting network traces can enhance the performance of WF classifiers in unobserved network conditions. Specifically, we introduce NetAugment, an augmentation technique tailored to the specifications of Tor traces. We instantiate NetAugment through semi-supervised and self-supervised learning techniques. Our extensive open-world and close-world experiments demonstrate that under practical evaluation settings, our WF attacks provide superior performances compared to the state-of-the-art; this is due to their use of augmented network traces for training, which allows them to learn the features of target traffic in unobserved settings. For instance, with a 5-shot learning in a closed-world scenario, our self-supervised WF attack (named NetCLR) reaches up to 80% accuracy when the traces for evaluation are collected in a setting unobserved by the WF adversary. This is compared to an accuracy of 64.4% achieved by the state-of-the-art Triplet Fingerprinting [35]. We believe that the promising results of our work can encourage the use of network trace augmentation in other types of network traffic analysis.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (48)
  1. P. Bachman, O. Alsharif and D. Precup “Learning with pseudo-ensembles” In NIPS, 2014
  2. “ReMixMatch: Semi-Supervised Learning with Distribution Matching and Augmentation Anchoring” In ICLR, 2020
  3. “Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting” In arXiv preprint arXiv:1802.10215, 2018
  4. “Touching from a distance: Website fingerprinting attacks and defenses” In ACM CCS, 2012
  5. “A simple framework for contrastive learning of visual representations” In ICML, 2020
  6. G. Cherubin, J. Hayes and M. Juarez “Website fingerprinting defenses at the application layer” In PETS, 2017
  7. G. Cherubin, R. Jansen and C. Troncoso “Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World” In USENIX Security, 2022
  8. M. Perry “A Critique of Website Fingerprinting Attacks. Tor project Blog”, 2013 URL: https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks
  9. “Autoaugment: Learning augmentation strategies from data” In CVPR, 2019
  10. “Randaugment: Practical automated data augmentation with a reduced search space” In CVPR, 2020
  11. R. Dingledine, N. Mathewson and P. Syverson “Tor: The second-generation onion router” In USENIX Security, 2004
  12. “A Survey on Concept Drift Adaptation” In ACM Comput. Surv. Association for Computing Machinery, 2014 URL: https://doi.org/10.1145/2523813
  13. “k-fingerprinting: A robust scalable website fingerprinting technique” In USENIX Security, 2016
  14. “Batch normalization: Accelerating deep network training by reducing internal covariate shift” In ICML, 2015
  15. “Inside Job: Applying Traffic Analysis to Measure Tor from Within.” In NDSS, 2018
  16. “A critical evaluation of website fingerprinting attacks” In ACM CCS, 2014
  17. “Temporal ensembling for semi-supervised learning” In arXiv preprint arXiv:1610.02242, 2016
  18. D Lee “Pseudo-label: The simple and efficient semi-supervised learning method for deep neural networks” In ICML 2013 Workshop: Challenges in Representation Learning (WREPL), 2013
  19. G. McLachlan “Iterative reclassification procedure for constructing an asymptotically optimal rule of allocation in discriminant analysis” In Journal of the American Statistical Association, 1975
  20. “A unifying view on dataset shift in classification” In Pattern Recognition, 2012 URL: https://sciencedirect.com/science/article/pii/S0031320311002901
  21. M. Nasr, A. Bahramali and A. Houmansadr “Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations” In USENIX Security, 2021
  22. “GANDaLF: GAN for Data-Limited Fingerprinting.” In PETS, 2021
  23. S. Oh, S. Sunkam and N. Hopper “p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning” In PETS, 2019
  24. “Website Fingerprinting at Internet Scale.” In NDSS, 2016
  25. “Website fingerprinting in onion routing based anonymization networks” In WPES, 2011
  26. “Website Fingerprinting with Website Oracles.” In PETS, 2020
  27. “Tik-Tok: The utility of packet timing in website fingerprinting attacks” In PETS, 2020
  28. “Automated website fingerprinting through deep learning” In NDSS, 2018
  29. C. Rosenberg, M. Hebert and H. Schneiderman “Semi-supervised self-training of object detection models” In 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION’05) - Volume 1 1, 2005, pp. 29–36 DOI: 10.1109/ACVMOT.2005.107
  30. M. Sajjadi, M. Javanmardi and T. Tasdizen “Regularization with stochastic transformations and perturbations for deep semi-supervised learning” In Advances in neural information processing systems, 2016
  31. F. Schroff, D. Kalenichenko and J. Philbin “Facenet: A unified embedding for face recognition and clustering” In CVPR, 2015
  32. H. Scudder “Probability of error of some adaptive pattern-recognition machines” In IEEE Transactions on Information Theory 11.3, 1965, pp. 363–371 DOI: 10.1109/TIT.1965.1053799
  33. “Python Language Bindings for Selenium WebDriver”, 2020 URL: https://pypi.org/project/selenium/
  34. “Deep fingerprinting: Undermining website fingerprinting defenses with deep learning” In ACM CCS, 2018
  35. “Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning” In ACM CCS, 2019
  36. “Fixmatch: Simplifying semi-supervised learning with consistency and confidence” In NIPS, 2020
  37. “Stem”, 2022 URL: https://pypi.org/project/stem/1.8.1/
  38. “Tor-browser-selenium”, 2022 URL: https://pypi.org/project/tbselenium/0.6.3/
  39. “Tor Metrics Portal”, 2023 URL: https://metrics.torproject.org/
  40. “Tshark(1) Manual Page”, 2022 URL: https://wireshark.org/docs/man-pages/tshark.html
  41. “Dobbs: Towards a comprehensive dataset to study the browsing behavior of online users” In WI-IAT, 2013
  42. T. Wang “High Precision Open-World Website Fingerprinting” In IEEE S&P, 2020
  43. T. Wang “Website fingerprinting: Attacks and defenses” University of Waterloo, 2016
  44. “Effective Attacks and Provable Defenses for Website Fingerprinting” In USENIX Security, 2014
  45. “Improved website fingerprinting on tor” In WPES, 2013
  46. “On realistically attacking tor with website fingerprinting” In PETS, 2016
  47. “Self-training with noisy student improves imagenet classification” In CVPR, 2020
  48. “A multi-tab website fingerprinting attack” In ACSAC, 2018
Citations (13)

Summary

We haven't generated a summary for this paper yet.