Universal Website Fingerprinting Defense Based on Adversarial Examples

被引:1
|
作者
Hou, Chengshang [1 ]
Shi, Junzheng [1 ]
Cui, Mingxin [1 ]
Liu, Mengyan [1 ]
Yu, Jing [1 ]
机构
[1] Chinese Acad Sci, Univ Chinese Acad Sci, Sch Cyber Secur, Inst Informat Engn, Beijing, Peoples R China
关键词
Website Fingerprinting Attack; Website Fingerprinting Defense; Adversarial Machine Learning;
D O I
10.1109/TrustCom53373.2021.00031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Website fingerprinting (WF) attacks pose a threat to privacy of web activity, especially on anonymity networks such as Tor. Recent studies show that the deep neural network (DNN) significantly improves the impact of website fingerprinting attacks. Especially, DNN-based attack undermines the existing defense methods which are mainly rely on the manually designed rule. In this paper, we present a novel defense that generates universal perturbation that can transform original examples to adversarial examples which is effectively defending against a specific WF model. The proposed defense is evaluated on state-of-the-art DNN attack over a public Tor traffic dataset. The experimental results show our adversarial example generation method performs better than the baseline methods. The proposed defense defeats all existing WF attacks based on deep neural networks with a low overhead. Comparing with state-of-the-art defenses such as Walkie-Talkie and WTF-PAD with a lower bound of 31% and 64% overheads, the proposed defense achieves identical defense performance with at least 50% bandwidth overhead saving.
引用
收藏
页码:99 / 106
页数:8
相关论文
共 50 条
  • [41] Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding
    Ozbulak, Utku
    Van Messem, Arnout
    De Neve, Wesley
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [42] Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View
    Liu, Jiayang
    Zhang, Weiming
    Zhang, Yiwei
    Hou, Dongdong
    Liu, Yujia
    Zha, Hongyue
    Yu, Nenghai
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 4820 - 4829
  • [43] On the Limitation of MagNet Defense against L1-based Adversarial Examples
    Lu, Pei-Hsuan
    Chen, Pin-Yu
    Chen, Kang-Cheng
    Yu, Chia-Mu
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 200 - 214
  • [44] Markov Chain Based Efficient Defense Against Adversarial Examples in Computer Vision
    Zhou, Yue
    Hu, Xiaofang
    Wang, Lidan
    Duan, Shukai
    Chen, Yiran
    IEEE ACCESS, 2019, 7 : 5695 - 5706
  • [45] WFGUARD: an Effective Fuzzing-testing-based Traffic Morphing Defense against Website Fingerprinting
    Ling, Zhen
    Xiao, Gui
    Luo, Lan
    Wang, Rong
    Xu, Xiangyu
    Liu, Guangchi
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 441 - 450
  • [46] Understanding Universal Adversarial Attack and Defense on Graph
    Wang, Tianfeng
    Pan, Zhisong
    Hu, Guyu
    Duan, Yexin
    Pan, Yu
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2022, 18 (01)
  • [47] Attack as Defense: Characterizing Adversarial Examples using Robustness
    Zhao, Zhe
    Chen, Guangke
    Wang, Jingyi
    Yang, Yiwei
    Song, Fu
    Sun, Jun
    ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2021, : 42 - 55
  • [48] Advocating for Multiple Defense Strategies Against Adversarial Examples
    Araujo, Alexandre
    Meunier, Laurent
    Pinot, Rafael
    Negrevergne, Benjamin
    ECML PKDD 2020 WORKSHOPS, 2020, 1323 : 165 - 177
  • [49] AuxBlocks: Defense Adversarial Examples via Auxiliary Blocks
    Yu, Yueyao
    Yu, Pengfei
    Li, Wenye
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [50] Defense Against Adversarial Examples Using Beneficial Noise
    Raval, Param
    Khakhi, Harin
    Kuribayashi, Minoru
    Raval, Mehul S.
    PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1842 - 1848