Subverting Website Fingerprinting Defenses with Robust Traffic Representation

Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu

科研成果: 书/报告/会议事项章节会议稿件同行评审

30 引用 (Scopus)

摘要

Anonymity networks, e.g., Tor, are vulnerable to various website fingerprinting (WF) attacks, which allows attackers to perceive user privacy on these networks. However, the defenses developed recently can effectively interfere with WF attacks, e.g., by simply injecting dummy packets. In this paper, we propose a novel WF attack called Robust Fingerprinting (RF), which enables an attacker to fingerprint the Tor traffic under various defenses. Specifically, we develop a robust traffic representation method that generates Traffic Aggregation Matrix (TAM) to fully capture key informative features leaked from Tor traces. By utilizing TAM, an attacker can train a CNN-based classifier that learns common high-level traffic features uncovered by different defenses. We conduct extensive experiments with public real-world datasets to compare RF with state-of-the-art (SOTA) WF attacks. The closed- and open-world evaluation results demonstrate that RF significantly outperforms the SOTA attacks. In particular, RF can effectively fingerprint Tor traffic under the SOTA defenses with an average accuracy improvement of 8.9% over the best existing attack (i.e., Tik-Tok).

源语言英语
主期刊名32nd USENIX Security Symposium, USENIX Security 2023
出版商USENIX Association
607-624
页数18
ISBN(电子版)9781713879497
出版状态已出版 - 2023
活动32nd USENIX Security Symposium, USENIX Security 2023 - Anaheim, 美国
期限: 9 8月 202311 8月 2023

出版系列

姓名32nd USENIX Security Symposium, USENIX Security 2023
1

会议

会议32nd USENIX Security Symposium, USENIX Security 2023
国家/地区美国
Anaheim
时期9/08/2311/08/23

指纹

探究 'Subverting Website Fingerprinting Defenses with Robust Traffic Representation' 的科研主题。它们共同构成独一无二的指纹。

引用此