Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2517840.2517851acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Improved website fingerprinting on Tor

Published: 04 November 2013 Publication History

Abstract

In this paper, we propose new website fingerprinting techniques that achieve a higher classification accuracy on Tor than previous works. We describe our novel methodology for gathering data on Tor; this methodology is essential for accurate classifier comparison and analysis. We offer new ways to interpret the data by using the more fundamental Tor cells as a unit of data rather than TCP/IP packets. We demonstrate an experimental method to remove Tor SENDMEs, which are control cells that provide no useful data, in order to improve accuracy. We also propose a new set of metrics to describe the similarity between two traffic instances; they are derived from observations on how a site is loaded. Using our new metrics we achieve a higher success rate than previous authors. We conduct a thorough analysis and comparison between our new algorithms and the previous best algorithm. To identify the potential power of website fingerprinting on Tor, we perform open-world experiments; we achieve a recall rate over 95% and a false positive rate under 0.2% for several potentially monitored sites, which far exceeds previous reported recall rates. In the closed-world experiments, our accuracy is 91%, as compared to 86-87% from the best previous classifier on the same data.

References

[1]
M. AlSabah, K. Bauer, I. Goldberg, D. Grunwald, D. McCoy, S. Savage, and G. Voelker. DefenestraTor: Throwing out windows in Tor. In Proceedings of the 11th Privacy Enhancing Technologies Symposium, pages 134--154. Springer, 2011.
[2]
X. Cai, X. Zhang, B. Joshi, and R. Johnson. Touching from a distance: Website fingerprinting attacks and defenses. In Proceedings of the 2012 ACM conference on Computer and Communications Security, pages 605--616, 2012.
[3]
J. R. Crandall, D. Zinn, M. Byrd, E. Barr, and R. East. Conceptdoppler: a weather tracker for internet censorship. In Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 1--4, 2007.
[4]
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, 2004.
[5]
K. Dyer, S. Coull, T. Ristenpart, and T. Shrimpton. Peek-a-boo, I still see you: Why efficient traffic analysis countermeasures fail. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, pages 332--346, 2012.
[6]
P. Eckersley. How unique is your web browser? In Privacy Enhancing Technologies, pages 1--18, 2010.
[7]
D. Herrmann, R. Wendolsky, and H. Federrath. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 31--42, 2009.
[8]
M. Liberatore and B. Levine. Inferring the source of encrypted HTTP connections. In Proceedings of the 13th ACM conference on Computer and Communications Security, pages 255--263, 2006.
[9]
N. Matthewson. Tor and the BEAST SSL attack. https://blog.torproject.org/blog/tor-and-beast-ssl-attack, September 2011. Accessed Feb. 2013.
[10]
N. Matthewson and M. Perry. Tor Controller. https://svn.torproject.org/svn/blossom/trunk/TorCtl.py, September 2007. Accessed Feb.2013.
[11]
B. J. Oommen and R. K. S. Loke. Pattern recognition of strings with substitutions, insertions, deletions and generalized transpositions. Pattern Recognition, 30(5):789--800, 1997.
[12]
A. Panchenko, L. Niessen, A. Zinnen, and T. Engel. Website fingerprinting in onion routing based anonymization networks. In Proceedings of the 10th ACM Workshop on Privacy in the Electronic Society, pages 103--114, 2011.
[13]
M. Perry. Experimental Defense for Website Traffic Fingerprinting. https://blog.torproject.org/blog/experimental-defense-website-traffic-f%ingerprinting, September 2011. Accessed Feb.\ 2013.
[14]
R. Pries, W. Yu, S. Graham, and X. Fu. On performance bottleneck of anonymous communication networks. In Proceedings of the 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS), pages 1--11, 2008.
[15]
Tor. Tor Metrics Portal. https://metrics.torproject.org/, July 2012. Accessed Feb.\ 2013.
[16]
V. Vapnik and A. Chervonenkis. Theory of pattern recognition. Nauka, 1974.
[17]
R. Wagner and R. Lowrance. An extension of the string-to-string correction problem. Journal of the ACM (JCM), 22(2):177--183, 1975.
[18]
J. Weston and C. Watkins. Support vector machines for multi-class pattern recognition. In Proceedings of the seventh European symposium on artificial neural networks, pages 219--224, 1999.
[19]
C. Wright, S. Coull, and F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In Proceedings of the 16th Network and Distributed Security Symposium, pages 237--250, 2009.

Cited By

View all
  • (2025)Few-Shot Website Fingerprinting With Distribution CalibrationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.341101422:1(632-648)Online publication date: Jan-2025
  • (2025)A Multi-Granularity Features Representation and Dimensionality Reduction Network for Website FingerprintingIEEE Access10.1109/ACCESS.2024.352289213(574-587)Online publication date: 2025
  • (2024)TrafficGPT: An LLM Approach for Open-Set Encrypted Traffic ClassificationProceedings of the Asian Internet Engineering Conference 202410.1145/3674213.3674217(26-35)Online publication date: 9-Aug-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '13: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
November 2013
306 pages
ISBN:9781450324854
DOI:10.1145/2517840
  • General Chair:
  • Ahmad-Reza Sadeghi,
  • Program Chair:
  • Sara Foresti
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. tor
  3. website fingerprinting

Qualifiers

  • Research-article

Conference

CCS'13
Sponsor:

Acceptance Rates

WPES '13 Paper Acceptance Rate 30 of 103 submissions, 29%;
Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)163
  • Downloads (Last 6 weeks)11
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Few-Shot Website Fingerprinting With Distribution CalibrationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.341101422:1(632-648)Online publication date: Jan-2025
  • (2025)A Multi-Granularity Features Representation and Dimensionality Reduction Network for Website FingerprintingIEEE Access10.1109/ACCESS.2024.352289213(574-587)Online publication date: 2025
  • (2024)TrafficGPT: An LLM Approach for Open-Set Encrypted Traffic ClassificationProceedings of the Asian Internet Engineering Conference 202410.1145/3674213.3674217(26-35)Online publication date: 9-Aug-2024
  • (2024)WhisperVoiceTrace: A Comprehensive Analysis of Voice Command FingerprintingProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657017(667-683)Online publication date: 1-Jul-2024
  • (2024)ProFi: Scalable and Efficient Website FingerprintingIEEE Transactions on Network and Service Management10.1109/TNSM.2023.331850821:1(1271-1286)Online publication date: Feb-2024
  • (2024)Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and CountermeasuresIEEE/ACM Transactions on Networking10.1109/TNET.2023.333727032:3(1904-1919)Online publication date: Jun-2024
  • (2024)Interface-Based Side Channel in TEE-Assisted Networked ServicesIEEE/ACM Transactions on Networking10.1109/TNET.2023.329401932:1(613-626)Online publication date: Feb-2024
  • (2024)Enhancing Resilience in Website Fingerprinting: Novel Adversary Strategies for Noisy Traffic EnvironmentsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.343240419(7216-7231)Online publication date: 2024
  • (2024)Exploring the Capabilities and Limitations of Video Stream Fingerprinting2024 IEEE Security and Privacy Workshops (SPW)10.1109/SPW63631.2024.00008(28-39)Online publication date: 23-May-2024
  • (2024)TrafficSiam: More Realistic Few-shot Website Fingerprinting Attack with Contrastive LearningNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575874(1-9)Online publication date: 6-May-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media