Universal Website Fingerprinting Defense Based on Adversarial Examples

被引:1
|
作者
Hou, Chengshang [1 ]
Shi, Junzheng [1 ]
Cui, Mingxin [1 ]
Liu, Mengyan [1 ]
Yu, Jing [1 ]
机构
[1] Chinese Acad Sci, Univ Chinese Acad Sci, Sch Cyber Secur, Inst Informat Engn, Beijing, Peoples R China
关键词
Website Fingerprinting Attack; Website Fingerprinting Defense; Adversarial Machine Learning;
D O I
10.1109/TrustCom53373.2021.00031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Website fingerprinting (WF) attacks pose a threat to privacy of web activity, especially on anonymity networks such as Tor. Recent studies show that the deep neural network (DNN) significantly improves the impact of website fingerprinting attacks. Especially, DNN-based attack undermines the existing defense methods which are mainly rely on the manually designed rule. In this paper, we present a novel defense that generates universal perturbation that can transform original examples to adversarial examples which is effectively defending against a specific WF model. The proposed defense is evaluated on state-of-the-art DNN attack over a public Tor traffic dataset. The experimental results show our adversarial example generation method performs better than the baseline methods. The proposed defense defeats all existing WF attacks based on deep neural networks with a low overhead. Comparing with state-of-the-art defenses such as Walkie-Talkie and WTF-PAD with a lower bound of 31% and 64% overheads, the proposed defense achieves identical defense performance with at least 50% bandwidth overhead saving.
引用
收藏
页码:99 / 106
页数:8
相关论文
共 50 条
  • [1] SAD: Website Fingerprinting Defense Based on Adversarial Examples
    Tang, Renzhi
    Shen, Guowei
    Guo, Chun
    Cui, Yunhe
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [2] Adversarial Traces for Website Fingerprinting Defense
    Imani, Mohsen
    Rahman, Mohammad Saidur
    Wright, Matthew
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2225 - 2227
  • [3] An Online Website Fingerprinting Defense Based on the Non-Targeted Adversarial Patch
    Gu, Xiaodan
    Song, Bingchen
    Lan, Wei
    Yang, Ming
    TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (06): : 1148 - 1159
  • [4] PST: a More Practical Adversarial Learning-based Defense Against Website Fingerprinting
    Jiang, Minghao
    Wang, Yong
    Gou, Gaopeng
    Cai, Wei
    Xiong, Gang
    Shi, Junzheng
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [5] Trace-agnostic and Adversarial Training-resilient Website Fingerprinting Defense
    Qiao, Litao
    Wu, Bang
    Li, Heng
    Gao, Cuiying
    Yuan, Wei
    Luo, Xiapu
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 211 - 220
  • [6] CMAES-WFD: Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy
    Wang, Di
    Zhu, Yuefei
    Fei, Jinlong
    Guo, Maohua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 79 (02): : 2253 - 2276
  • [7] Toward an Efficient Website Fingerprinting Defense
    Juarez, Marc
    Imani, Mohsen
    Perry, Mike
    Diaz, Claudia
    Wright, Matthew
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 27 - 46
  • [8] An Effective Website Fingerprinting Defense Based on Traffic Splitting and Padding
    Huang, Bin
    Du, Yanhui
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2024, 44 (07): : 750 - 760
  • [9] Adversarial Training Defense Based on Second-order Adversarial Examples
    Qian Yaguan
    Zhang Ximin
    Wang Bin
    Gu Zhaoquan
    Li Wei
    Yun Bensheng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (11) : 3367 - 3373
  • [10] Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches
    Li, Ding
    Zhu, Yuefei
    Chen, Minghao
    Wang, Jue
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2437 - 2451