首页> 外文期刊>IEEE transactions on dependable and secure computing >BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks
【24h】

BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks

机译:Bimorphing:针对网站指纹攻击的双向爆破防御

获取原文
获取原文并翻译 | 示例

摘要

Network traffic analysis has been increasingly used in various applications to either protect or threaten people, information, and systems. Website fingerprinting is a passive traffic analysis attack which threatens web navigation privacy. It is a set of techniques used to discover patterns from a sequence of network packets generated while a user accesses different websites. Internet users (such as online activists or journalists) may wish to hide their identity and online activity to protect their privacy. Typically, an anonymity network is utilized for this purpose. These anonymity networks such as Tor (The Onion Router) provide layers of data encryption which poses a challenge to the traffic analysis techniques. Although various defenses have been proposed to counteract this passive attack, they have been penetrated by new attacks that proved the ineffectiveness and/or impracticality of such defenses. In this work, we introduce a novel defense algorithm to counteract the website fingerprinting attacks. The proposed defense obfuscates original website traffic patterns through the use of double sampling and mathematical optimization techniques to deform packet sequences and destroy traffic flow dependency characteristics used by attackers to identify websites. We evaluate our defense against state-of-the-art studies and show its effectiveness with minimal overhead and zero-delay transmission to the real traffic.
机译:网络流量分析越来越多地用于各种应用程序,以保护或威胁人的人,信息和系统。网站指纹识别是一种被动的流量分析攻击,威胁到Web导航隐私。它是用于从用户访问不同网站时生成的一系列网络分组的模式的一组技术。互联网用户(如在线活动家或记者)可能希望隐藏他们的身份和在线活动以保护他们的隐私。通常,为此目的使用匿名网络。这些匿名网络(如Tor(洋葱路由器)提供了数据加密层,它对流量分析技术构成挑战。虽然已经提出了各种防御来抵消这种被动攻击,但它们已经被新的攻击渗透,证明了这些防御的无效和/或不切实际。在这项工作中,我们介绍了一种新的防御算法来抵消网站指纹攻击。拟议的防御通过使用双重采样和数学优化技术使原始网站流量模式混淆,以使分组序列变形并破坏攻击者使用的业务流依赖性特性来识别网站。我们评估我们对最先进的研究的防御,并以最小的开销和零延迟传输展示其对实际交通的效力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号