Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3243734.3243768acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

Published: 15 October 2018 Publication History

Abstract

Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we present Deep Fingerprinting (DF), a new website fingerprinting attack against Tor that leverages a type of deep learning called Convolutional Neural Networks (CNN) with a sophisticated architecture design, and we evaluate this attack against WTF-PAD and Walkie-Talkie. The DF attack attains over 98% accuracy on Tor traffic without defenses, better than all prior attacks, and it is also the only attack that is effective against WTF-PAD with over 90% accuracy. Walkie-Talkie remains effective, holding the attack to just 49.7% accuracy. In the more realistic open-world setting, our attack remains effective, with 0.99 precision and 0.94 recall on undefended traffic. Against traffic defended with WTF-PAD in this setting, the attack still can get 0.96 precision and 0.68 recall. These findings highlight the need for effective defenses that protect against this new attack and that could be deployed in Tor.

Supplementary Material

MP4 File (p1928-sirinam.mp4)

References

[1]
K. Abe and S. Goto. 2016. Fingerprinting attack on Tor anonymity using deep learning in the Asia Pacific Advanced Network (APAN).
[2]
Y. Bengio, P. Simard, and P. Frasconi. 1994. Learning long-term dependencies with gradient descent is difficult. IEEE Transactions on Neural Networks Vol. 5, 2 (Mar. 1994), 157--166.
[3]
Sanjit Bhat, David Lu, Albert Kwon, and Srinivas Devadas. 2018. Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting. "https://arxiv.org/pdf/1802.10215.pdf". (2018). (accessed: August, 2018).
[4]
Xiang Cai, Rishab Nithyanand, and Rob Johnson. 2014 a. CS-BuFLO: A congestion sensitive website fingerprinting defense Workshop on Privacy in the Electronic Society (WPES). ACM, 121--130.
[5]
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, and Ian Goldberg. 2014 b. A systematic approach to developing and evaluating website fingerprinting defenses ACM Conference on Computer and Communications Security (CCS). ACM, 227--238.
[6]
Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. 2012. Touching from a distance: Website fingerprinting attacks and defenses ACM Conference on Computer and Communications Security (CCS). ACM, 605--616.
[7]
N. Carlini and D. Wagner. 2017. Towards evaluating the robustness of neural networks 2017 IEEE Symposium on Security and Privacy (SP). 39--57.
[8]
Heyning Cheng and Ron Avnur. 1998. Traffic analysis of SSL encrypted web browsing. Project paper, University of Berkeley (1998). Available at http://www.cs.berkeley.edu/ daw/teaching/cs261-f98/projects/final-reports/ronathan-heyning.ps
[9]
Djork-Arné Clevert, Thomas Unterthiner, and Sepp Hochreiter. 2015. Fast and accurate deep networks learning by exponential linear units (ELUs) in the International Conference on Computer Vision (ICCV15)).
[10]
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, and Thomas Shrimpton. 2012. Peek-a-Boo, I still see you: Why efficient traffic analysis countermeasures fail IEEE Symposium on Security and Privacy (S&P). IEEE, 332--346.
[11]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2672--2680. http://papers.nips.cc/paper/5423-generative-adversarial-nets.pdf
[12]
Jamie Hayes and George Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique USENIX Security Symposium. USENIX Association, 1--17.
[13]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.
[14]
Dominik Herrmann, Rolf Wendolsky, and Hannes Federrath. 2009. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial Naïve-Bayes classifier. In ACM Workshop on Cloud Computing Security. ACM, 31--42.
[15]
Andrew Hintz. 2003. Fingerprinting websites using traffic analysis. Privacy Enhancing Technologies (PETs). Springer, 171--178.
[16]
Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift International Conference on Machine Learning. 448--456.
[17]
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, and Rachel Greenstadt. 2014. A critical evaluation of website fingerprinting attacks ACM Conference on Computer and Communications Security (CCS). ACM, 263--274.
[18]
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright. 2016. Toward an efficient website fingerprinting defense European Symposium on Research in Computer Security (ESORICS). Springer, 27--46.
[19]
Simonyan Karen and Zisserman Andrew. 2015. Very deep convolutional networks for large-scale image recognition. (2015).
[20]
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. Advances in Neural Information Processing Systems. Curran Associates, Inc., 1097--1105.
[21]
Y. LeCun, Y. Bengio, and G. Hinton. 2015. Deep learning. Nature 4 (2015), 436--444.
[22]
Y. Lecun, L. Bottou, Y. Bengio, and P. Haffner. 1998. Gradient-based learning applied to document recognition. Vol. 86 (1998), 2278--2324. Issue 11.
[23]
Dmytro Mishkin, Nikolay Sergievskiy, and Jiri Matas. 2016. Systematic evaluation of CNN advances on the ImageNet. CoRR Vol. abs/1606.02228 (2016).
[24]
Se Eun Oh, Saikrishna Sunkam, and Nicholas Hopper. 2018. textitp-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning. "https://arxiv.org/abs/1711.03656.pdf". (2018). (accessed: August, 2018).
[25]
Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle, and Thomas Engel. 2016. Website fingerprinting at Internet scale. In Network & Distributed System Security Symposium (NDSS). IEEE Computer Society, 1--15.
[26]
Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel. 2011. Website fingerprinting in onion routing based anonymization networks ACM Workshop on Privacy in the Electronic Society (WPES). ACM, 103--114.
[27]
Mike Perry. 2013. A critique of website traffic fingerprinting attacks. Tor Project Blog. https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks. (2013). (accessed: December, 2015).
[28]
Mike Perry. 2015. Padding Negotiation. Tor Protocol Specification Proposal. https://gitweb.torproject.org/torspec.git/tree/proposals/254-padding-negotiation.txt. (2015). (accessed: October 1, 2017).
[29]
Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. 2018. Automated Website Fingerprinting through Deep Learning Proceedings of the 25nd Network and Distributed System Security Symposium (NDSS 2018). Internet Society.
[30]
Roei Schuster, Vitaly Shmatikov, and Eran Tromer. 2017. Beauty and the Burst: Remote identification of encrypted video streams USENIX Security Symposium. USENIX Association, 1357--1374.
[31]
V. Shmatikov and M. Wang. 2006. Timing analysis in low-latency mix networks: Attacks and defenses European Symposium on Research in Computer Security (ESORIC). Springer, 18--33.
[32]
Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A simple way to prevent neural networks from overfitting. Journal of Machine Learning Research Vol. 15 (2014), 1929--1958. http://jmlr.org/papers/v15/srivastava14a.html
[33]
Q Sun, DR R Simon, and YM M Wang. 2002. Statistical identification of encrypted web browsing traffic IEEE Symposium on Security and Privacy (S&P). IEEE, 19--30.
[34]
Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015. Going deeper with convolutions. (June. 2015).
[35]
P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P. Manzagol. 2010. Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. Journal of Machine Learning Research 11 (2010), 3371--3408.
[36]
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective attacks and provable defenses for website fingerprinting USENIX Security Symposium. USENIX Association, 143--157.
[37]
Tao Wang and Ian Goldberg. 2013. Improved website fingerprinting on Tor. In ACM Workshop on Privacy in the Electronic Society (WPES). ACM, 201--212.
[38]
Tao Wang and Ian Goldberg. 2016. On realistically attacking Tor with website fingerprinting Proceedings on Privacy Enhancing Technologies (PoPETs). De Gruyter Open, 21--36.
[39]
Tao Wang and Ian Goldberg. 2017. Walkie-talkie: An efficient defense against passive website fingerprinting attacks USENIX Security Symposium. USENIX Association, 1375--1390.
[40]
Jason Yosinski, Jeff Clune, Yoshua Bengio, and Hod Lipson. 2014. How Transferable Are Features in Deep Neural Networks? Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'14). MIT Press, Cambridge, MA, USA, 3320--3328. http://dl.acm.org/citation.cfm?id=2969033.2969197

Cited By

View all
  • (2025)CD-Net: Robust mobile traffic classification against apps updatingComputers & Security10.1016/j.cose.2024.104214150(104214)Online publication date: Mar-2025
  • (2025)A graph representation framework for encrypted network traffic classificationComputers & Security10.1016/j.cose.2024.104134148(104134)Online publication date: Jan-2025
  • (2024)Analyzing Darknet Traffic: Examining how Tor Modifications Affect Onion Service Traffic ClassificationInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP340(592-599)Online publication date: 21-Sep-2024
  • Show More Cited By

Index Terms

  1. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
      October 2018
      2359 pages
      ISBN:9781450356930
      DOI:10.1145/3243734
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 October 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Tor
      2. deep learning
      3. privacy
      4. website fingerprinting

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CCS '18
      Sponsor:

      Acceptance Rates

      CCS '18 Paper Acceptance Rate 134 of 809 submissions, 17%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2,352
      • Downloads (Last 6 weeks)442
      Reflects downloads up to 25 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)CD-Net: Robust mobile traffic classification against apps updatingComputers & Security10.1016/j.cose.2024.104214150(104214)Online publication date: Mar-2025
      • (2025)A graph representation framework for encrypted network traffic classificationComputers & Security10.1016/j.cose.2024.104134148(104134)Online publication date: Jan-2025
      • (2024)Analyzing Darknet Traffic: Examining how Tor Modifications Affect Onion Service Traffic ClassificationInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP340(592-599)Online publication date: 21-Sep-2024
      • (2024)LAMBERT: Leveraging Attention Mechanisms to Improve the BERT Fine-Tuning Model for Encrypted Traffic ClassificationMathematics10.3390/math1211162412:11(1624)Online publication date: 22-May-2024
      • (2024)Combating Web Tracking: Analyzing Web Tracking Technologies for User PrivacyFuture Internet10.3390/fi1610036316:10(363)Online publication date: 5-Oct-2024
      • (2024)L-GraphSAGE: A Graph Neural Network-Based Approach for IoV Application Encrypted Traffic IdentificationElectronics10.3390/electronics1321422213:21(4222)Online publication date: 28-Oct-2024
      • (2024)An Encrypted Traffic Classification Approach Based on Path Signature Features and LSTMElectronics10.3390/electronics1315306013:15(3060)Online publication date: 2-Aug-2024
      • (2024)Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple PathsCryptography10.3390/cryptography80200228:2(22)Online publication date: 28-May-2024
      • (2024)Fast and Accurate Multi-Task Learning for Encrypted Network Traffic ClassificationApplied Sciences10.3390/app1407307314:7(3073)Online publication date: 5-Apr-2024
      • (2024)Break-Pad: effective padding machines for tor with break burst paddingCybersecurity10.1186/s42400-024-00222-y7:1Online publication date: 1-Oct-2024
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media