首页> 外文期刊>Computer Communications >AdaWFPA: Adaptive Online Website Fingerprinting Attack for Tor Anonymous Network: A Stream-wise Paradigm
【24h】

AdaWFPA: Adaptive Online Website Fingerprinting Attack for Tor Anonymous Network: A Stream-wise Paradigm

机译:AdaWFPA:针对Tor匿名网络的自适应在线网站指纹攻击:一种流式范例

获取原文
获取原文并翻译 | 示例
           

摘要

Nowadays, network traffic analysis is quite pervasive in human practice. Website fingerprinting attack, which is a new variant of traffic analysis attacks, identifies the websites visited by clients in encrypted and anonymized Tor connections by observing patterns in packet flows. Previous website fingerprinting attacks focus on static models in which the classifier is trained within a time period and then it is utilized to identify targeted websites. Static attacks cannot handle the time effect on the accuracy since their classifiers are not trained on the newest versions of the websites. Consequently, their accuracy drops drastically when tested on captured traffic traces of websites, days after training. This time effect is known as concept drift.In order to maintain the performance of the classifier, the classifier must be updated over time. In static attacks, updating the classifier includes updating the whole dataset again along with retraining the classifier. Recollecting, maintaining, and updating datasets as well as updating and retraining the classifier are very time and memory consuming. To deal with the emerging issues arising from concept drift and expensive retraining phases, this paper proposes AdaWFPA; an adaptive online website fingerprinting attack which is based on adaptive stream mining algorithms. AdaWFPA avoids concept drift by updating its model over time. Our empirical analyses and experiments over real world datasets indicate the superiority of our approach; as it offers better accuracy, precision, and recall in comparison with other state-of-the-art methods in the literature.
机译:如今,网络流量分析在人类实践中已经非常普遍。网站指纹攻击是流量分析攻击的一种新形式,它通过观察数据包流中的模式来识别客户端在加密和匿名Tor连接中访问的网站。先前的网站指纹攻击主要针对静态模型,在该模型中对分类器进行一段时间训练,然后将其用于识别目标网站。静态攻击无法处理时间对准确性的影响,因为静态分类器未在最新版本的网站上进行训练。因此,在训练后数天,如果对捕获的网站流量跟踪进行测试,其准确性将急剧下降。这种时间效应称为概念漂移。为了维持分类器的性能,分类器必须随时间更新。在静态攻击中,更新分类器包括重新更新整个数据集以及重新训练分类器。重新收集,维护和更新数据集以及更新和重新训练分类器非常耗时且消耗内存。为了解决由于概念漂移和昂贵的再培训阶段而产生的新问题,本文提出了AdaWFPA。基于自适应流挖掘算法的自适应在线网站指纹攻击。 AdaWFPA通过随时间更新其模型来避免概念漂移。我们对现实世界数据集的经验分析和实验表明了我们方法的优越性。与其他文献中的最新技术相比,它提供了更好的准确性,准确性和召回率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号