首页> 外文会议>IEEE Conference on Computer Communications >DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
【24h】

DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting

机译:DFD:基于侵犯学习的方法来防御网站指纹识别

获取原文

摘要

The Onion Router (Tor) is designed to support an anonymous communication through end-to-end encryption. To prevent vulnerability of side channel attacks (e.g. website fingerprinting), dummy packet injection modules have been embedded in Tor to conceal trace patterns that are associated with the individual websites. However, recent study shows that current Website Fingerprinting (WF) defenses still generate patterns that may be captured and recognized by the deep learning technology. In this paper, we conduct in-depth analyses of two state-of-the-art WF defense approaches. Then, based on our new observations and insights, we propose a novel defense mechanism using a per-burst injection technique, called Deep Fingerprinting Defender (DFD), against deep learning-based WF attacks. The DFD has two operation modes, one-way and two-way injection. DFD is designed to break the inherent patterns preserved in Tor user's traces by carefully injecting dummy packets within every burst. We conducted extensive experiments to evaluate the performance of DFD over both closed-world and open-world settings. Our results demonstrate that these two configurations can successfully break the Tor network traffic pattern and achieve a high evasion rate of 86.02% over one-way client-side injection rate of 100%, a promising improvement in comparison with state-of-the-art adversarial trace's evasion rate of 60%. Moreover, DFD outperforms the state-of-the-art alternatives by requiring lower bandwidth overhead; 14.26% using client-side injection.
机译:洋葱路由器(TOR)旨在通过端到端加密支持匿名通信。为了防止侧信机攻击的脆弱性(例如网站指纹识别),嵌入了伪分组喷射模块,以隐藏与各个网站相关联的跟踪模式。然而,最近的研究表明,目前的网站指纹(WF)防御仍然产生可能被深度学习技术捕获和识别的模式。在本文中,我们对两种最先进的WF防御方法进行了深入的分析。然后,根据我们的新观测和见解,我们提出了一种新颖的防御机制,使用每次突发注射技术,称为深指识别后卫(DFD),反对基于深度学习的WF攻击。 DFD具有两种操作模式,单向和双向注射。 DFD旨在通过在每个突发中仔细注入虚拟数据包来打破在Tor用户迹线中保留的固有模式。我们进行了广泛的实验,以评估DFD在封闭世界和开放世界环境中的表现。我们的结果表明,这两种配置可以成功地打破TOR网络流量模式,并在单向客户端注射速率100%的单向客户端注射速度达到86.02%的高逃避率,这是与最先进的有希望的改善对抗痕迹的逃避率为60%。此外,DFD通过需要更低的带宽开销来实现最先进的替代方案; 14.26%使用客户端注射。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号