4.5 Article

A comprehensive analysis of website fingerprinting defenses on Tor

期刊

COMPUTERS & SECURITY
卷 136, 期 -, 页码 -

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2023.103577

关键词

Tor; Website fingerprinting; Defense; Anonymity network; Network security

向作者/读者索取更多资源

This paper surveys and analyzes existing website fingerprinting (WF) defense schemes. It categorizes WF defenses into four categories and explains their principles and characteristics. The effectiveness of WF defenses is evaluated on a public dataset using a new experimental setting, finding that many defenses are not as effective as claimed. Deployment issues of WF defenses are discussed, and suggestions are provided for researchers and users.
Website fingerprinting (WF) enables eavesdroppers to identify the website a user is visiting by network surveillance, even if the traffic is protected by anonymous communication technologies such as Tor. To avoid this, several defense schemes have been proposed to protect users from the hazard of website fingerprinting attacks. However, some defenses are defeated by new attacks soon since they can not provide provable security guarantees; some defenses can not be deployed in practice since they incur high bandwidth overhead and latency overhead. In this paper, we survey existing WF defense schemes and make a comprehensive analysis. First, we divide WF defenses into four categories and introduce their principles and characteristics separately. Then, we point out some unreasonable settings in previous works and use a new experimental setting to evaluate WF defenses on a public dataset. We find many WF defenses are not as effective as they claim to be. Besides, we investigate the deployment of WF defenses and discuss some potential problems. Finally, we make some suggestions for researchers to design a feasible WF defense and make suggestions for users to protect their privacy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据