3.8 Proceedings Paper

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3243734.3243768

关键词

Tor; privacy; website fingerprinting; deep learning

资金

  1. National Science Foundation [CNS-1423163, CNS-1722743]
  2. European Commission through KU Leuven BOF [OT/13/070, H2020-DS-2014-653497 PANORAMIX]
  3. Fund for Scientific Research -Flanders (FWO)
  4. Division Of Computer and Network Systems
  5. Direct For Computer & Info Scie & Enginr [1423163] Funding Source: National Science Foundation

向作者/读者索取更多资源

Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we present Deep Fingerprinting (DF), a new website fingerprinting attack against Tor that leverages a type of deep learning called Convolutional Neural Networks (CNN) with a sophisticated architecture design, and we evaluate this attack against WTF-PAD and Walkie-Talkie. The DF attack attains over 98% accuracy on Tor traffic without defenses, better than all prior attacks, and it is also the only attack that is effective against WTF-PAD with over 90% accuracy. Walkie-Talkie remains effective, holding the attack to just 49.7% accuracy. In the more realistic open-world setting, our attack remains effective, with 0.99 precision and 0.94 recall on undefended traffic. Against traffic defended with WTF-PAD in this setting, the attack still can get 0.96 precision and 0.68 recall. These findings highlight the need for effective defenses that protect against this new attack and that could be deployed in Tor..

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据