Website fingerprinting in onion routing based anonymization networks

A. Panchenko, L. Niessen, Andreas Zinnen, T. Engel
{"title":"Website fingerprinting in onion routing based anonymization networks","authors":"A. Panchenko, L. Niessen, Andreas Zinnen, T. Engel","doi":"10.1145/2046556.2046570","DOIUrl":null,"url":null,"abstract":"Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and the content of communications from a local observer, i.e., an entity that can eavesdrop the traffic between the user and the first anonymization node. Especially users in totalitarian regimes strongly depend on such networks to freely communicate. For these people, anonymity is particularly important and an analysis of the anonymization methods against various attacks is necessary to ensure adequate protection. In this paper we show that anonymity in Tor and JAP is not as strong as expected so far and cannot resist website fingerprinting attacks under certain circumstances. We first define features for website fingerprinting solely based on volume, time, and direction of the traffic. As a result, the subsequent classification becomes much easier. We apply support vector machines with the introduced features. We are able to improve recognition results of existing works on a given state-of-the-art dataset in Tor from 3% to 55% and in JAP from 20% to 80%. The datasets assume a closed-world with 775 websites only. In a next step, we transfer our findings to a more complex and realistic open-world scenario, i.e., recognition of several websites in a set of thousands of random unknown websites. To the best of our knowledge, this work is the first successful attack in the open-world scenario. We achieve a surprisingly high true positive rate of up to 73% for a false positive rate of 0.05%. Finally, we show preliminary results of a proof-of-concept implementation that applies camouflage as a countermeasure to hamper the fingerprinting attack. For JAP, the detection rate decreases from 80% to 4% and for Tor it drops from 55% to about 3%.","PeriodicalId":384270,"journal":{"name":"Proceedings of the 10th annual ACM workshop on Privacy in the electronic society","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"460","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 10th annual ACM workshop on Privacy in the electronic society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2046556.2046570","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 460

Abstract

Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and the content of communications from a local observer, i.e., an entity that can eavesdrop the traffic between the user and the first anonymization node. Especially users in totalitarian regimes strongly depend on such networks to freely communicate. For these people, anonymity is particularly important and an analysis of the anonymization methods against various attacks is necessary to ensure adequate protection. In this paper we show that anonymity in Tor and JAP is not as strong as expected so far and cannot resist website fingerprinting attacks under certain circumstances. We first define features for website fingerprinting solely based on volume, time, and direction of the traffic. As a result, the subsequent classification becomes much easier. We apply support vector machines with the introduced features. We are able to improve recognition results of existing works on a given state-of-the-art dataset in Tor from 3% to 55% and in JAP from 20% to 80%. The datasets assume a closed-world with 775 websites only. In a next step, we transfer our findings to a more complex and realistic open-world scenario, i.e., recognition of several websites in a set of thousands of random unknown websites. To the best of our knowledge, this work is the first successful attack in the open-world scenario. We achieve a surprisingly high true positive rate of up to 73% for a false positive rate of 0.05%. Finally, we show preliminary results of a proof-of-concept implementation that applies camouflage as a countermeasure to hamper the fingerprinting attack. For JAP, the detection rate decreases from 80% to 4% and for Tor it drops from 55% to about 3%.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于洋葱路由的匿名网络中的网站指纹识别
低延迟匿名化网络,如Tor和JAP,声称对本地观察者隐藏接收方和通信内容,即可以窃听用户和第一个匿名化节点之间的流量的实体。特别是极权主义政权的用户强烈依赖这种网络来自由交流。对于这些人来说,匿名性尤为重要,有必要对各种攻击的匿名化方法进行分析,以确保充分的保护。在本文中,我们证明了Tor和JAP的匿名性并不像目前预期的那样强,在某些情况下无法抵抗网站指纹攻击。我们首先根据流量的数量、时间和方向来定义网站指纹特征。因此,随后的分类变得容易得多。我们利用引入的特征应用支持向量机。在给定的最先进数据集上,我们能够将Tor中现有作品的识别结果从3%提高到55%,在JAP中从20%提高到80%。数据集假设只有775个网站的封闭世界。在下一步中,我们将我们的发现转移到一个更复杂和现实的开放世界场景中,即在数千个随机未知网站中识别几个网站。据我们所知,这项工作是开放世界场景中第一次成功的攻击。我们实现了惊人的高真阳性率高达73%,假阳性率为0.05%。最后,我们展示了概念验证实现的初步结果,该实现将伪装作为阻碍指纹攻击的对策。对于JAP,检出率从80%下降到4%,对于Tor,检出率从55%下降到3%左右。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cover locations: availing location-based services without revealing the location Private searching for single and conjunctive keywords on streaming data Non-interactive distributed encryption: a new primitive for revocable privacy Session details: Network and system privacy Website fingerprinting in onion routing based anonymization networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1