【24h】

Privacy Illusion: Beware of Unpadded DoH

机译:隐私幻想:小心不包的DOH

获取原文

摘要

DNS over HTTPS (DoH) has been created with ambitions to improve the privacy of users on the internet. Domain names that are being resolved by DoH are transferred via an encrypted channel, ensures nobody should be able to read the content. However, even though the communication is encrypted, we show that it still leaks some private information, which can be misused. Therefore, this paper studies the behavior of the DoH protocol implementation in Firefox and Chrome web-browsers, and the level of detail that can be revealed by observing and analyzing packet-level information. The aim of this paper is to evaluate and highlight discovered privacy weaknesses hidden in DoH. By the trained machine learning classifier, it is possible to infer individual domain names only from the captured encrypted DoH connection. The resulting trained classifier can infer domain name from encrypted DNS traffic with surprisingly high accuracy up to 90% on HTTP 1.1, and up to 70% on HTTP 2 protocol.
机译:通过野心创建了HTTPS(DOH)的DNS,以改善互联网上用户的隐私。由DOH解析的域名通过加密通道传输,确保无法读取内容。但是,即使通信是加密的,我们表明它仍然泄漏了一些可以误用的私人信息。因此,本文研究了Firefox和Chrome Web浏览器中的DOH协议实现的行为,以及通过观察和分析分组级信息可以揭示的详细程度。本文的目的是评估,并突出沃赫隐藏的隐私弱点。通过训练有素的机器学习分类器,可以仅从捕获的加密Doh连接推断各个域名。由此产生的训练有素的分类器可以从加密的DNS流量推断域名,令人惊讶的高精度高达90%,在HTTP 2协议上高达70%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号