PST: a More Practical Adversarial Learning-based Defense Against Website Fingerprinting

被引:1
|
作者
Jiang, Minghao [1 ,2 ]
Wang, Yong [3 ]
Gou, Gaopeng [1 ,2 ]
Cai, Wei [1 ,2 ]
Xiong, Gang [1 ,2 ]
Shi, Junzheng [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Hong Kong, Peoples R China
关键词
Anonymity Communication; Privacy; Website Fingerprinting attack and defense; Deep Learning; Adversarial Machine Learning;
D O I
10.1109/GLOBECOM42002.2020.9322307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To prevent serious privacy leakage from website fingerprinting (WF) attacks, many traditional or adversarial WF defenses have been released. However, traditional WF defenses such as Walkie-Talkie (W-T) still generate patterns that might be captured by the deep learning (DL) based WF attacks, which are not effective. Adversarial perturbation based WF defenses better confuse WF attacks, but their requirements for the entire original traffic trace and perturbating any points including historical packets or cells of the network traffic are not practical. To deal with the effectiveness and practicality issues of existing defenses, we proposed a novel WF defense in this paper. called PST. Given a few past bursts of a trace as input, PST Predicts subsequent fuzzy bursts with a neural network, then Searches small but effective adversarial perturbation directions based on observed and predicted bursts, and finally Transfers the perturbation directions to the remaining bursts. Our experimental results over a public closed-world dataset demonstrate that PST can successfully break the network traffic pattern and achieve a high evasion rate of 87.6%, beating W-T by more than 31.59% at the same bandwidth overhead, with only observing 10 transferred bursts. Moreover, our defense adapts to WF attacks dynamically, which could be retrained or updated.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting
    Abusnaina, Ahmed
    Jang, Rhongho
    Khormali, Aminollah
    Nyang, DaeHun
    Mohaisen, David
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 2459 - 2468
  • [2] Practical and lightweight defense against website fingerprinting
    McGuan, Colman
    Yu, Chansu
    Suh, Kyoungwon
    COMPUTER COMMUNICATIONS, 2024, 228
  • [3] Universal Website Fingerprinting Defense Based on Adversarial Examples
    Hou, Chengshang
    Shi, Junzheng
    Cui, Mingxin
    Liu, Mengyan
    Yu, Jing
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 99 - 106
  • [4] SAD: Website Fingerprinting Defense Based on Adversarial Examples
    Tang, Renzhi
    Shen, Guowei
    Guo, Chun
    Cui, Yunhe
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] Adversarial Traces for Website Fingerprinting Defense
    Imani, Mohsen
    Rahman, Mohammad Saidur
    Wright, Matthew
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2225 - 2227
  • [6] Towards an Efficient Defense against Deep Learning based Website Fingerprinting
    Ling, Zhen
    Xiao, Gui
    Wu, Wenjia
    Gu, Xiaodan
    Yang, Ming
    Fu, Xinwen
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 310 - 319
  • [7] Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning
    Sirinam, Payap
    Mathews, Nate
    Rahman, Mohammad Saidur
    Wright, Matthew
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1131 - 1148
  • [8] Defending Against Deep Learning-Based Traffic Fingerprinting Attacks With Adversarial Examples
    Hayden, Blake
    Walsh, Timothy
    Barton, Armon
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2025, 28 (01)
  • [9] Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces
    Rahman, Mohammad Saidur
    Imani, Mohsen
    Mathews, Nate
    Wright, Matthew
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) : 1594 - 1609
  • [10] An Online Website Fingerprinting Defense Based on the Non-Targeted Adversarial Patch
    Gu, Xiaodan
    Song, Bingchen
    Lan, Wei
    Yang, Ming
    TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (06): : 1148 - 1159