Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3372297.3423351acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting

Published: 02 November 2020 Publication History

Abstract

Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns of data flows based on the size and direction of packets. By collecting traffic traces at a malicious Tor entry node --- one of the weakest adversaries in the attacker model of Tor --- a passive eavesdropper can leverage the captured meta-data to reveal the websites visited by a Tor user. As recently shown, WFP is significantly more effective and realistic than assumed. Concurrently, former WFP defenses are either infeasible for deployment in real-world settings or defend against specific WFP attacks only.
To limit the exposure of Tor users to WFP, we propose novel lightweight WFP defenses, TrafficSliver, which successfully counter today's WFP classifiers with reasonable bandwidth and latency overheads and, thus, make them attractive candidates for adoption in Tor. Through user-controlled splitting of traffic over multiple Tor entry nodes, TrafficSliver limits the data a single entry node can observe and distorts repeatable traffic patterns exploited by WFP attacks. We first propose a network-layer defense, in which we apply the concept of multipathing entirely within the Tor network. We show that our network-layer defense reduces the accuracy from more than 98% to less than 16% for all state-of-the-art WFP attacks without adding any artificial delays or dummy traffic. We further suggest an elegant client-side application-layer defense, which is independent of the underlying anonymization network. By sending single HTTP requests for different web objects over distinct Tor entry nodes, our application-layer defense reduces the detection rate of WFP classifiers by almost 50 percentage points. Although it offers lower protection than our network-layer defense, it provides a security boost at the cost of a very low implementation overhead and is fully compatible with today's Tor network.

Supplementary Material

MOV File (Copy of CCS2020_fpe292_AsyaMitseva - Pat Weeden.mov)
Presentation video

References

[1]
2020. https://github.com/TrafficSliver.
[2]
Kota Abe and Shigeki Goto. 2016. Fingerprinting Attack on Tor Anonymity using Deep Learning. In Proceedings of the Asia Pacific Advanced Network Workshop (APAN).
[3]
Alexa. 2020. Alexa Tor 100 most popular websites. https://www.alexa.com/. (Accessed: September 2018).
[4]
Mashael AlSabah, Kevin Bauer, Tariq Elahi, and Ian Goldberg. 2013. The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting. In Proceedings on Privacy Enhancing Technologies (PoPETS). Springer, Bloomington, IND, USA.
[5]
Sanjit Bhat, David Lu, Albert Kwon, and Srinivas Devadas. 2019. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. In Proceedings on Privacy Enhancing Technologies (PoPETS). Sciendo, Stockolm, Sweden.
[6]
Xiang Cai, Rishab Nithyanand, and Rob Johnson. 2014a. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In Proceedings of the 13th Workshop on Privacy in the Electronic Society (WPES). ACM, Scottsdale, AZ, USA.
[7]
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, and Ian Goldberg. 2014b. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. In Proceedings of the 21st ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, Scottsdale, Arizona, USA.
[8]
Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. 2012. Touching from a distance: website fingerprinting attacks and defenses. In 19th Conference on Computer and communications security (CCS). ACM, Raleigh, NC, USA, 605--616.
[9]
Giovanni Cherubin, Jamie Hayes, and Marc Juarez. 2017. Website Fingerprinting Defenses at the Application Layer. In 17th Privacy Enhancing Technologies Symposium (PETS). DE GRUYTER, Minneapolis, USA, 186--203.
[10]
Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva, Andriy Panchenko, and Thomas Engel. 2019. Analysis of Multi-path Onion Routing-Based Anonymization Networks. In Proceedings of the 33rd Anual IFIP Conference on Data and Applications Security and Privacy (DBSec). Springer, Charleston, SC, USA.
[11]
Roger Dingledine and Nick Mathewson. 2019. Tor Protocol Specification. https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt. (Accessed: January 2020).
[12]
Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The Second-Generation Onion Router. In 13th Conference on USENIX Security Symposium. USENIX Association, San Diego, CA, USA, 303--320.
[13]
Kevin Dyer, Scott Coull, Thomas Ristenpart, and Thomas Shrimpton. 2012. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (S&P). IEEE, San Francisco, CA, USA.
[14]
Roy T. Fielding, Yves Lafon, and Julian F. Reschke. 2014. Hypertext Transfer Protocol (HTTP/1.1): Range Requests. https://tools.ietf.org/html/rfc7233.
[15]
Roy T. Fielding and Julian F. Reschke. 2014. Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content. https://tools.ietf.org/html/rfc7231.
[16]
OpenJS Foundation. 2020. Node.js. https://nodejs.org/en/. (Accessed: March 2020).
[17]
Ian Goldberg. 2019. Network-Based Website Fingerprinting. https://tools.ietf.org/html/draft-wood-privsec-wfattacks-00. (Accessed: August 2019).
[18]
Jiajun Gong and Tao Wang. 2020. Zero-delay Lightweight Defenses against Website Fingerprinting. In 29th USENIX Security Symposium. USENIX Association, Boston, MA, USA.
[19]
Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In Proceedings of the 25th USENIX conference on Security Symposium. USENIX Association, Austin, TX, USA.
[20]
Sébastien Henri, Ginés García-Avilés, Pablo Serrano, Albert Banchs, and Patrick Thiran. 2020. Protecting against Website Fingerprinting with Multihoming. In Proceedings on Privacy Enhancing Technologies (PoPETS). Sciendo, Montreal, Canada.
[21]
Rob Jansen, Tavish Vaidya, and Micah Sherr. 2019. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. In Proceedings of the 28th USENIX conference on Security Symposium. USENIX Association, Santa Clara, CA.
[22]
Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, and Rachel Greenstadt. 2014. A Critical Evaluation of Website Fingerprinting Attacks. In Proceedings of the 21st ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, Scottsdale, AZ, USA.
[23]
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright. 2016. Toward an Efficient Website Fingerprinting Defense. In Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS). Springer, Heraklion, Greece.
[24]
Sheharbano Khattak, Taria Elahi, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg. 2016. SoK: Making Sense of Censorship Resistance Systems. In 16th Privacy Enhancing Technologies Symposium (PETS). DE GRUYTER, Darmstadt, Germany, 37--61.
[25]
Wladimir De la Cadena, Asya Mitseva, Jan Pennekamp, Jens Hiller, Fabian Lanze, Thomas Engel, Klaus Wehrle, and Andriy Panchenko. 2019. POSTER: Traffic Splitting to Counter Website Fingerprinting. In 26th Conference on Computer and Communications Security (CCS). ACM, London, UK, 2533--2535.
[26]
Shuai Li, Huajun Guo, and Nicholas Hopper. 2018. Measuring Information Leakage in Website Fingerprinting Attacks and Defenses. In 25th Conference on Computer and Communications Security (CCS). ACM, Toronto, Canada, 1977--1992.
[27]
Marc Liberatore and Brian Levine. 2006. Inferring the Source of Encrypted HTTP Connections. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). ACM, Alexandria, VA, USA.
[28]
Isis Lovecruft, George Kadianakis, Ola Bini, and Nick Mathewson. 2019. Tor Guard Specification. https://gitweb.torproject.org/torspec.git/tree/guard-spec.txt. (Accessed: January 2020).
[29]
David Lu, Sanjit Bhat, Albert Kwon, and Srinivas Devadas. 2018. DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows. In 17th Workshop on Privacy in the Electronic Society (WPES). ACM, Toronto, Canada, 109--113.
[30]
Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci. 2011. HTTPOS: Sealing information leaks with browser-side obfuscation of encrypted flows. In Proceedings of the 18th Anual Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, CA, USA.
[31]
Nick Mathewson. 2019. New Release: Tor 0.4.0.5. https://blog.torproject.org/new-release-tor-0405. (Accessed: January 2020).
[32]
Rishab Nithyanand, Xiang Cai, and Rob Johnson. 2014. Glove: A Bespoke Website Fingerprinting Defense. In Proceedings of the 13th Workshop on Privacy in the Electronic Society (WPES). ACM, Scottsdale, Arizona, USA.
[33]
Se Eun Oh, Saikrishna Sunkam, and Nicholas Hopper. 2019. $p^1$-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning. In 19th Privacy Enhancing Technologies Symposium (PETS). DE GRUYTER, Stockholm, Sweden, 191--209.
[34]
Andriy Panchenko, Fabian Lanze, Andreas Zinnen, Martin Henze, Jan Pennekamp, Klaus Wehrle, and Thomas Engel. 2016. Website Fingerprinting at Internet Scale. In 23rd Annual Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, CA, USA.
[35]
Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel. 2011. Website Fingerprinting in Onion Routing Based Anonymization Networks. In Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society (WPES) (Chicago, Illinois, USA). ACM.
[36]
Andriy Panchenko and Johannes Renner. 2009. Path Selection Metrics for Performance-Improved Onion Routing. In Proceedings of the 9th IEEE/IPSJ Symposium on Applications and the Internet (SAINT). IEEE, Seattle, Washington, USA.
[37]
Jan Pennekamp, Jens Hiller, Sebastian Reuter, Wladimir De la Cadena, Asya Mitseva, Martin Henze, Thomas Engel, Klaus Wehrle, and Andriy Panchenko. 2019. Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing. In Proceedings of the 27th annual IEEE International Conference on Network Protocols (ICNP). IEEE, Chicago, IL, USA.
[38]
Mike Perry. 2011. Experimental Defense for Website Traffic Fingerprinting. https://blog.torproject.org/experimental-defense-website-traffic-fingerprinting. (Accessed: January 2020).
[39]
The Tor Project. 2020 a. Tor Browser. https://www.torproject.org/projects/torbrowser.html.en. (Accessed: March 2020).
[40]
The Tor Project. 2020 b. Tor Metrics. https://metrics.torproject.org/. (Accessed: March 2020).
[41]
The Tor Project. 2020 c. Tor Rendezvous Specification -- Version 3. https://gitweb.torproject.org/torspec.git/tree/rend-spec-v3.txt.
[42]
Tobias Pulls and Rasmus Dahlberg. 2020. Website Fingerprinting with Website Oracles. In Proceedings on Privacy Enhancing Technologies (PoPETS). Sciendo, Montreal, Canada.
[43]
Vera Rimmer, Davy Preuveneers, Marc Juárez, Tom van Goethem, and Wouter Joosen. 2018. Automated Website Fingerprinting through Deep Learning. In Proceedings of the 25th Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, CA, USA.
[44]
Payap Sirinam, Mohsen Imani, Marc Juarez, and Matthew Wright. 2018. Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. In Proceedings of the 25th ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, Toronto, ON, Canada.
[45]
Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, and Matthew Wright. 2019. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-Shot Learning. In Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM, London, United Kingdom.
[46]
Michael Carl Tschantz, Sadia Afroz, Anonymous, and Vern Paxson. 2016. SoK: Towards Grounding Censorship Circumvention in Empiricism. In Symposium on Security and Privacy (S&P). IEEE, San Jose, CA, USA, 914--933.
[47]
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In Proceedings of the 24th USENIX conference on Security Symposium. USENIX Association, San Diego, CA, USA.
[48]
Tao Wang and Ian Goldberg. 2013. Improved Website Fingerprinting on Tor. In Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society (WPES). ACM, Berlin, Germany.
[49]
Tao Wang and Ian Goldberg. 2015. On Realistically Attacking Tor with Website Fingerprinting. In Proceedings on Privacy Enhancing Technologies (PoPETs). Philadelphia, PA, USA.
[50]
Tao Wang and Ian Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In Proceedings of the 26th USENIX conference on Security Symposium. USENIX Association, Vancouver, BC, Canada.
[51]
Charles Wright, Scott Coull, and Fabian Monrose. 2009. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. In Proceedings of the 16th Anual Network and Distributed System Security Symposium (NDSS). Internet Society, San Diego, CA, USA.
[52]
Junhua Yan and Jasleen Kaur. 2018. Feature Selection for Website Fingerprinting. In 18th Privacy Enhancing Technologies Symposium (PETS). DE GRUYTER, Barcelona, Spain, 200--219.
[53]
L. Yang and F. Li. 2015. mTor: A Multipath Tor Routing Beyond Bandwidth Throttling. In IEEE Conference on Communications and Network Security (CNS). IEEE, Florence, Italy.

Cited By

View all
  • (2024)Darknet Traffic Analysis Investigating the Impact of Modified Tor Traffic on Onion Service Traffic ClassificationInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-18077(467-476)Online publication date: 6-May-2024
  • (2024)Analyzing Darknet Traffic: Examining how Tor Modifications Affect Onion Service Traffic ClassificationInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP340(592-599)Online publication date: 21-Sep-2024
  • (2024)Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple PathsCryptography10.3390/cryptography80200228:2(22)Online publication date: 28-May-2024
  • Show More Cited By

Index Terms

  1. TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
      October 2020
      2180 pages
      ISBN:9781450370899
      DOI:10.1145/3372297
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 November 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. anonymous communication
      2. onion routing
      3. privacy
      4. traffic analysis
      5. web privacy
      6. website fingerprinting

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CCS '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)246
      • Downloads (Last 6 weeks)28
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Darknet Traffic Analysis Investigating the Impact of Modified Tor Traffic on Onion Service Traffic ClassificationInternational Journal of Advanced Research in Science, Communication and Technology10.48175/IJARSCT-18077(467-476)Online publication date: 6-May-2024
      • (2024)Analyzing Darknet Traffic: Examining how Tor Modifications Affect Onion Service Traffic ClassificationInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24SEP340(592-599)Online publication date: 21-Sep-2024
      • (2024)Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple PathsCryptography10.3390/cryptography80200228:2(22)Online publication date: 28-May-2024
      • (2024)Break-Pad: effective padding machines for tor with break burst paddingCybersecurity10.1186/s42400-024-00222-y7:1Online publication date: 1-Oct-2024
      • (2024)Understanding Web Fingerprinting with a Protocol-Centric ApproachProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678910(17-34)Online publication date: 30-Sep-2024
      • (2024)Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and CountermeasuresIEEE/ACM Transactions on Networking10.1109/TNET.2023.333727032:3(1904-1919)Online publication date: Jun-2024
      • (2024)Laserbeak: Evolving Website Fingerprinting Attacks With Attention and Multi-Channel Feature RepresentationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346817119(9285-9300)Online publication date: 2024
      • (2024)Exploring Uncharted Waters of Website FingerprintingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334260719(1840-1854)Online publication date: 1-Jan-2024
      • (2024)WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting DefensesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332766219(1357-1371)Online publication date: 1-Jan-2024
      • (2024)WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.331896619(30-43)Online publication date: 1-Jan-2024
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media