谷歌浏览器插件
订阅小程序
在清言上使用

A website fingerprinting technology with time-sampling

Peer-to-Peer Networking and Applications(2024)

引用 0|浏览14
暂无评分
摘要
Website Fingerprinting (WF) attacks allow web eavesdroppers to de-anonymize Tor users’ website traffic, and reveal information about the websites they visit. The state-of-the-art WF attacks based on deep learning have achieved high accuracy. However, they often ignore low-level timing information and use a simple direction-based traffic representation method that only retains the spatial information of website traffic packets. In fact, the timing information of website traffic packets is also one of the essential features of a website, which plays a significant role in the WF attack. In this paper, we propose a sampling-based traffic representation method called Time-Sampling in this paper. Time-Sampling uses a time-based sampling technique, which samples website traffic packets and fills packet gaps with zeros when generating model input sequences. It maintains both the timing and spatial information in traffic. To evaluate the performance of Time-Sampling, we reimplemented the state-of-the-art WF attacks with it against the direction-based methodology under diverse settings. Under the undefended datasets, the sampling-based WF attacks attained higher accuracy on closed-world evaluation. Moreover, on the protected datasets, the accuracy is improved by 20% at most, higher than direction-based attacks. It reveals that time information is facilitated to WF attacks.
更多
查看译文
关键词
Privacy,Tor,Website fingerprinting,Deep learning
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要