PST: a More Practical Adversarial Learning-based Defense Against Website Fingerprinting

被引:1
|
作者
Jiang, Minghao [1 ,2 ]
Wang, Yong [3 ]
Gou, Gaopeng [1 ,2 ]
Cai, Wei [1 ,2 ]
Xiong, Gang [1 ,2 ]
Shi, Junzheng [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Hong Kong, Peoples R China
关键词
Anonymity Communication; Privacy; Website Fingerprinting attack and defense; Deep Learning; Adversarial Machine Learning;
D O I
10.1109/GLOBECOM42002.2020.9322307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To prevent serious privacy leakage from website fingerprinting (WF) attacks, many traditional or adversarial WF defenses have been released. However, traditional WF defenses such as Walkie-Talkie (W-T) still generate patterns that might be captured by the deep learning (DL) based WF attacks, which are not effective. Adversarial perturbation based WF defenses better confuse WF attacks, but their requirements for the entire original traffic trace and perturbating any points including historical packets or cells of the network traffic are not practical. To deal with the effectiveness and practicality issues of existing defenses, we proposed a novel WF defense in this paper. called PST. Given a few past bursts of a trace as input, PST Predicts subsequent fuzzy bursts with a neural network, then Searches small but effective adversarial perturbation directions based on observed and predicted bursts, and finally Transfers the perturbation directions to the remaining bursts. Our experimental results over a public closed-world dataset demonstrate that PST can successfully break the network traffic pattern and achieve a high evasion rate of 87.6%, beating W-T by more than 31.59% at the same bandwidth overhead, with only observing 10 transferred bursts. Moreover, our defense adapts to WF attacks dynamically, which could be retrained or updated.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Adversarial Attacks Against Reinforcement Learning-Based Portfolio Management Strategy
    Chen, Yu-Ying
    Chen, Chiao-Ting
    Sang, Chuan-Yun
    Yang, Yao-Chun
    Huang, Szu-Hao
    IEEE ACCESS, 2021, 9 : 50667 - 50685
  • [42] Adversarial Attacks Against Machine Learning-Based Resource Provisioning Systems
    Nazari, Najmeh
    Makrani, Hosein Mohammadi
    Fang, Chongzhou
    Omidi, Behnam
    Rafatirad, Setareh
    Sayadi, Hossein
    Khasawneh, Khaled N.
    Homayoun, Houman
    IEEE MICRO, 2023, 43 (05) : 35 - 44
  • [43] An Ensemble Learning-Based Cooperative Defensive Architecture Against Adversarial Attacks
    Liu, Tian
    Song, Yunfei
    Hu, Ming
    Xia, Jun
    Zhang, Jianning
    Chen, Mingsong
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (02)
  • [44] QUIC website fingerprinting based on automated machine learning
    Ha, Joonseo
    Roh, Heejun
    ICT EXPRESS, 2024, 10 (03): : 594 - 599
  • [45] Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training
    Qiao, Litao
    Wu, Bang
    Yin, Shuijun
    Li, Heng
    Yuan, Wei
    Luo, Xiapu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5375 - 5386
  • [46] Primary User Adversarial Attacks on Deep Learning-Based Spectrum Sensing and the Defense Method
    Zheng, Shilian
    Ye, Linhui
    Wang, Xuanye
    Chen, Jinyin
    Zhou, Huaji
    Lou, Caiyi
    Zhao, Zhijin
    Yang, Xiaoniu
    CHINA COMMUNICATIONS, 2021, 18 (12) : 94 - 107
  • [47] A Comprehensive Review and Analysis of Deep Learning-Based Medical Image Adversarial Attack and Defense
    Muoka, Gladys W.
    Yi, Ding
    Ukwuoma, Chiagoziem C.
    Mutale, Albert
    Ejiyi, Chukwuebuka J.
    Mzee, Asha Khamis
    Gyarteng, Emmanuel S. A.
    Alqahtani, Ali
    Al-antari, Mugahed A.
    MATHEMATICS, 2023, 11 (20)
  • [48] Primary User Adversarial Attacks on Deep Learning-Based Spectrum Sensing and the Defense Method
    Shilian Zheng
    Linhui Ye
    Xuanye Wang
    Jinyin Chen
    Huaji Zhou
    Caiyi Lou
    Zhijin Zhao
    Xiaoniu Yang
    China Communications, 2021, 18 (12) : 94 - 107
  • [49] When Deep Learning-Based Soft Sensors Encounter Reliability Challenges: A Practical Knowledge-Guided Adversarial Attack and Its Defense
    Guo, Runyuan
    Liu, Han
    Liu, Ding
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) : 2702 - 2714
  • [50] Instance-based defense against adversarial attacks in Deep Reinforcement Learning
    Garcia, Javier
    Sagredo, Ismael
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 107