Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3576915.3616639acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Realistic Website Fingerprinting By Augmenting Network Traces

Published: 21 November 2023 Publication History

Abstract

Website Fingerprinting (WF) is considered a major threat to the anonymity of Tor users (and other anonymity systems). While state-of-the-art WF techniques have claimed high attack accuracies, e.g., by leveraging Deep Neural Networks (DNN), several recent works have questioned the practicality of such WF attacks in the real world due to the assumptions made in the design and evaluation of these attacks. In this work, we argue that such impracticality issues are mainly due to the attacker's inability in collecting training data in comprehensive network conditions, e.g., a WF classifier may be trained only on high-bandwidth samples collected on specific high-bandwidth network links but deployed on connections with different network conditions. We show that augmenting network traces can enhance the performance of WF classifiers in unobserved network conditions. Specifically, we introduce NetAugment, an augmentation technique tailored to the specifications of Tor traces. We instantiate NetAugment through semi-supervised and self-supervised learning techniques. Our extensive open-world and close-world experiments demonstrate that under practical evaluation settings, our WF attacks provide superior performances compared to the state-of-the-art; this is due to their use of augmented network traces for training, which allows them to learn the features of target traffic in unobserved settings (e.g., unknown bandwidth, Tor circuits, etc.). For instance, with a 5-shot learning in a closed-world scenario, our self-supervised WF attack (named NetCLR) reaches up to 80% accuracy when the traces for evaluation are collected in a setting unobserved by the WF adversary. This is compared to an accuracy of 64.4% achieved by the state-of-the-art Triplet Fingerprinting [34]. We believe that the promising results of our work can encourage the use of network trace augmentation in other types of network traffic analysis.

References

[1]
P. Bachman, O. Alsharif, and D. Precup. 2014. Learning with pseudo-ensembles. In NIPS.
[2]
A. Bahramali, A. Bozorgi, and A. Houmansadr. 2023. Realistic Website Finger-printing By Augmenting Network Traces. https://github.com/SPIN-UMass/Re alistic-Website-Fingerprinting-By-Augmenting-Network-Traces.
[3]
D. Berthelot, N. Carlini, E Cubuk., K. Kurakin A. Sohn, H. Zhang, and C. Raffel. 2020. ReMixMatch: Semi-Supervised Learning with Distribution Matching and Augmentation Anchoring. In ICLR.
[4]
S. Bhat, D. Lu, A. Kwon, and S. Devadas. 2018. Var-CNN and DynaFlow: Improved Attacks and Defenses for Website Fingerprinting. arXiv preprint arXiv:1802.10215.
[5]
X. Cai, X. Zhang, B. Joshi, and R. Johnson. 2012. Touching from a distance: Website fingerprinting attacks and defenses. In ACM CCS.
[6]
T. Chen, S. Kornblith, M. Norouzi, and G. Hinton. 2020. A simple framework for contrastive learning of visual representations. In ICML.
[7]
G. Cherubin, J. Hayes, and M. Juarez. 2017. Website fingerprinting defenses at the application layer. In PETS.
[8]
G. Cherubin, R. Jansen, and C. Troncoso. 2022. Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. In USENIX Security.
[9]
M. Perry. 2013. A Critique of Website Fingerprinting Attacks. Tor project Blog. https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attac ks.
[10]
E. Cubuk, B. Zoph, D. Mane, V. Vasudevan, and Q. Le. 2019. Autoaugment: Learning augmentation strategies from data. In CVPR.
[11]
E. Cubuk, B. Zoph, J. Shlens, and Q. Le. 2020. Randaugment: Practical automated data augmentation with a reduced search space. In CVPR.
[12]
R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The second-generation onion router. In USENIX Security.
[13]
J. Hayes and G. Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique. In USENIX Security.
[14]
S. Ioffe and C. Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In ICML.
[15]
R. Jansen, M. Juarez, R. Galvez, T. Elahi, and C. Diaz. 2018. Inside Job: Applying Traffic Analysis to Measure Tor from Within. In NDSS.
[16]
M. Juarez, S. Afroz, G. Acar, C. Diaz, and R. Greenstadt. 2014. A critical evalua-tion of website fingerprinting attacks. In ACM CCS.
[17]
S. Laine and T. Aila. 2016. Temporal ensembling for semi-supervised learning. arXiv preprint arXiv:1610.02242.
[18]
D Lee. 2013. Pseudo-label: The simple and efficient semi-supervised learning method for deep neural networks. In ICML 2013 Workshop: Challenges in Representation Learning (WREPL).
[19]
G. McLachlan. 1975. Iterative reclassification procedure for constructing an asymptotically optimal rule of allocation in discriminant analysis. Journal of the American Statistical Association.
[20]
M. Nasr, A. Bahramali, and A. Houmansadr. 2021. Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. In USENIX Security.
[21]
S. Oh, N. Mathews, M. Rahman, M. Wright, and N. Hopper. 2021. GANDaLF: GAN for Data-Limited Fingerprinting. In PETS.
[22]
S. Oh, S. Sunkam, and N. Hopper. 2019. p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning. In PETS.
[23]
A. Panchenko, F. Lanze, J. Pennekamp, T. Engel, A. Zinnen, M. Henze, and K. Wehrle. 2016. Website Fingerprinting at Internet Scale. In NDSS.
[24]
A. Panchenko, L. Niessen, A. Zinnen, and T. Engel. 2011. Website fingerprinting in onion routing based anonymization networks. In WPES.
[25]
T. Pulls and R. Dahlberg. 2020. Website Fingerprinting with Website Oracles. In PETS.
[26]
M. Rahman, P. Sirinam, N. Mathews, K. Gangadhara, and M. Wright. 2020. Tik-Tok: The utility of packet timing in website fingerprinting attacks. In PETS.
[27]
V. Rimmer, D. Preuveneers, M. Juarez, T. Van, and W. Joosen. 2018. Automated website fingerprinting through deep learning. In NDSS.
[28]
C. Rosenberg, M. Hebert, and H. Schneiderman. 2005. Semi-supervised self-training of object detection models. In 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION'05) - Volume 1. Vol. 1, 29--36.
[29]
M. Sajjadi, M. Javanmardi, and T. Tasdizen. 2016. Regularization with stochastic transformations and perturbations for deep semi-supervised learning. Advances in neural information processing systems.
[30]
F. Schroff, D. Kalenichenko, and J. Philbin. 2015. Facenet: A unified embedding for face recognition and clustering. In CVPR.
[31]
H. Scudder. 1965. Probability of error of some adaptive pattern-recognition machines. IEEE Transactions on Information Theory, 11, 3, 363--371. 9/TIT.1965.1053799.
[32]
2020. Python Language Bindings for Selenium WebDriver. https://pypi.org/pr oject/selenium/.
[33]
P. Sirinam, M. Imani, M. Juarez, and M. Wright. 2018. Deep fingerprinting: Undermining website fingerprinting defenses with deep learning. In ACM CCS.
[34]
P. Sirinam, N. Mathews, M. Rahman, and M. Wright. 2019. Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. In ACM CCS.
[35]
K. Sohn, D. Berthelot, NN Carlini, Z. Zhang, H. Zhang, C. Raffel, E. Cubuk, A. Kurakin, and C. Li. 2020. Fixmatch: Simplifying semi-supervised learning with consistency and confidence. In NIPS.
[36]
2022. Stem. https://pypi.org/project/stem/1.8.1/.
[37]
2022. Tor-browser-selenium. https://pypi.org/project/tbselenium/0.6.3/.
[38]
2023. Tor Metrics Portal. https://metrics.torproject.org/.
[39]
2022. Tshark(1) Manual Page. https://wireshark.org/docs/man-pages/tshark.ht ml.
[40]
C. von der Weth and M. Hauswirth. 2013. Dobbs: Towards a comprehensive dataset to study the browsing behavior of online users. In WI-IAT.
[41]
T. Wang. 2020. High Precision Open-World Website Fingerprinting. In IEEE S&P.
[42]
T. Wang. 2016. Website fingerprinting: Attacks and defenses. Ph.D. Dissertation.
[43]
T. Wang, X. Cai, R. Nithyanand, R. Johnson, and I. Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security.
[44]
T. Wang and I. Goldberg. 2013. Improved website fingerprinting on tor. In WPES.
[45]
T. Wang and I. Goldberg. 2016. On realistically attacking tor with website fingerprinting. In PETS.
[46]
Q. Xie, M. Luong, E. Hovy, and Q. Le. 2020. Self-training with noisy student improves imagenet classification. In CVPR.
[47]
Y. Xu, T Wang, Q. Li, Q. Gong, Y. Chen, and Y. Jiang. 2018. A multi-tab website fingerprinting attack. In ACSAC.

Cited By

View all
  • (2025)CD-Net: Robust mobile traffic classification against apps updatingComputers & Security10.1016/j.cose.2024.104214150(104214)Online publication date: Mar-2025
  • (2024)Repositioning Real-World Website Fingerprinting on TorProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695047(124-140)Online publication date: 20-Nov-2024
  • (2024)Understanding and Improving Video Fingerprinting Attack Accuracy under Challenging ConditionsProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695045(141-154)Online publication date: 20-Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
November 2023
3722 pages
ISBN:9798400700507
DOI:10.1145/3576915
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 November 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymous communications
  2. flow correlation attacks
  3. tor
  4. traffic analysis
  5. website fingerprinting

Qualifiers

  • Research-article

Funding Sources

Conference

CCS '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)596
  • Downloads (Last 6 weeks)124
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)CD-Net: Robust mobile traffic classification against apps updatingComputers & Security10.1016/j.cose.2024.104214150(104214)Online publication date: Mar-2025
  • (2024)Repositioning Real-World Website Fingerprinting on TorProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695047(124-140)Online publication date: 20-Nov-2024
  • (2024)Understanding and Improving Video Fingerprinting Attack Accuracy under Challenging ConditionsProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695045(141-154)Online publication date: 20-Nov-2024
  • (2024)Towards Fine-Grained Webpage Fingerprinting at ScaleProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690211(423-436)Online publication date: 2-Dec-2024
  • (2024)Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution AnalysisProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670272(1997-2011)Online publication date: 2-Dec-2024
  • (2024)WhisperVoiceTrace: A Comprehensive Analysis of Voice Command FingerprintingProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657017(667-683)Online publication date: 1-Jul-2024
  • (2024)TrafCL: Robust Encrypted Malicious Traffic Detection via Contrastive LearningProceedings of the 33rd ACM International Conference on Information and Knowledge Management10.1145/3627673.3679839(2910-2919)Online publication date: 21-Oct-2024
  • (2024)Exploring the Capabilities and Limitations of Video Stream Fingerprinting2024 IEEE Security and Privacy Workshops (SPW)10.1109/SPW63631.2024.00008(28-39)Online publication date: 23-May-2024
  • (2024)Website Fingerprinting Attacks with Advanced Features on Tor Networks2024 Cyber Awareness and Research Symposium (CARS)10.1109/CARS61786.2024.10778686(1-6)Online publication date: 28-Oct-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media