Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3267323.3268960acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows

Published: 15 January 2018 Publication History

Abstract

Website fingerprinting attacks enable a local adversary to determine which website a Tor user visits. In recent years, several researchers have proposed defenses to counter these attacks. However, these defenses have shortcomings: many do not provide formal guarantees of security, incur high latency and bandwidth overheads, and require a frequently-updated database of website traffic patterns. In this work, we introduce a new countermeasure, DynaFlow, based on dynamically-adjusting flows to protect against website fingerprinting. DynaFlow provides a similar level of security as current state-of-the-art while being over 40% more efficient. At the same time, DynaFlow does not require a pre-established database and extends protection to dynamically-generated websites.

References

[1]
Alexa. 2017. The Top 500 Sites on the Web . https://www.alexa.com/topsites.
[2]
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. 2007. Low-Resource Routing Attacks Against Tor. In WPES. 11--20.
[3]
X. Cai, R. Nithyanand, and R. Johnson. 2014a. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In WPES . 121--130.
[4]
X. Cai, R. Nithyanand, T. Wang, R. Johnson, and I. Goldberg. 2014b. A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses. In ACM CCS . 227--238.
[5]
X. Cai, X. Zhang, B. Joshi, and R. Johnson. 2012. Touching from a Distance: Website Fingerprinting Attacks and Defenses. In ACM CCS . 605--616.
[6]
G. Cherubin. 2017. Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses. In PETS . 215--231.
[7]
G. Cherubin, J. Hayes, and M. Juarez. 2017. Website Fingerprinting Defenses at the Application Layer. In PETS. 186--203.
[8]
R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The Second-Generation Onion Router. In USENIX Security. 303--320.
[9]
K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton. 2012. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In IEEE S&P . 332--346.
[10]
J. Hayes and G. Danezis. 2016. k -fingerprinting: A Robust Scalable Website Fingerprinting Technique. In USENIX Security . 1187--1203.
[11]
M. Juarez, M. Imani, M. Perry, C. Diaz, and M. Wright. 2016. Toward an Efficient Website Fingerprinting Defense. In ESORICS. 27--46.
[12]
S. J. Murdoch and P. Zieli'nski. 2007. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In PETS . 167--183.
[13]
R. Nithyanand, X. Cai, and R. Johnson. 2014. Glove: A Bespoke Website Fingerprinting Defense . WPES. 131--134.
[14]
A. Panchenko, F. Lanze, A. Zinnen, and M. Henze. 2016. Website Fingerprinting at Internet Scale. In NDSS .
[15]
A. Panchenko, L. Niessen, A. Zinnen, and T. Engel. 2011. Website Fingerprinting in Onion Routing Based Anonymization Networks. In WPES . 103--114.
[16]
The Tor Project. 2018. Tor Metrics Portal. https://metrics.torproject.org.
[17]
T. Wang, X. Cai, R. Johnson, and I. Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security . 143--157.
[18]
T. Wang and I. Goldberg. 2017. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In USENIX Security. 1375--1390.

Cited By

View all
  • (2024)Contrastive Fingerprinting: A Novel Website Fingerprinting Attack over Few-shot TracesProceedings of the ACM Web Conference 202410.1145/3589334.3645575(1203-1214)Online publication date: 13-May-2024
  • (2024)ProFi: Scalable and Efficient Website FingerprintingIEEE Transactions on Network and Service Management10.1109/TNSM.2023.331850821:1(1271-1286)Online publication date: Feb-2024
  • (2024)WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.331896619(30-43)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES'18: Proceedings of the 2018 Workshop on Privacy in the Electronic Society
October 2018
190 pages
ISBN:9781450359894
DOI:10.1145/3267323
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 January 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. traffic analysis countermeasures
  3. website fingerprinting

Qualifiers

  • Short-paper

Conference

CCS '18
Sponsor:

Acceptance Rates

WPES'18 Paper Acceptance Rate 11 of 25 submissions, 44%;
Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)33
  • Downloads (Last 6 weeks)1
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Contrastive Fingerprinting: A Novel Website Fingerprinting Attack over Few-shot TracesProceedings of the ACM Web Conference 202410.1145/3589334.3645575(1203-1214)Online publication date: 13-May-2024
  • (2024)ProFi: Scalable and Efficient Website FingerprintingIEEE Transactions on Network and Service Management10.1109/TNSM.2023.331850821:1(1271-1286)Online publication date: Feb-2024
  • (2024)WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.331896619(30-43)Online publication date: 2024
  • (2024)A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and FormalizationIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335000626:3(1775-1829)Online publication date: Nov-2025
  • (2024)A website fingerprinting technology with time-samplingPeer-to-Peer Networking and Applications10.1007/s12083-024-01646-617:2(944-960)Online publication date: 6-Feb-2024
  • (2023)Subverting website fingerprinting defenses with robust traffic representationProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620272(607-624)Online publication date: 9-Aug-2023
  • (2023)TBP: Tree structure Burst-sequence Padding Defense Against Website Fingerprinting2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)10.1109/IPCCC59175.2023.10253867(99-108)Online publication date: 17-Nov-2023
  • (2023)PWR: Path Weighted Random Scheme in Multipath Traffic Splitting Against Website FingerprintingIEEE Access10.1109/ACCESS.2023.331536011(101273-101285)Online publication date: 2023
  • (2023)A Survey on Deep Learning for Website Fingerprinting Attacks and DefensesIEEE Access10.1109/ACCESS.2023.325355911(26033-26047)Online publication date: 2023
  • (2023)The rise of website fingerprinting on TorJournal of Network and Computer Applications10.1016/j.jnca.2023.103582212:COnline publication date: 1-Mar-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media