Affiliation:
1. College of Computer, National University of Defense Technology, Changsha 410073, China
2. University of Surrey, Stag Hill, University Campus, Guildford GU2 7XH, UK
Abstract
This work introduces a novel data augmentation method for few-shot website fingerprinting (WF) attack where only a handful of training samples per website are available for deep learning model optimization. Moving beyond earlier WF methods relying on manually-engineered feature representations, more advanced deep learning alternatives demonstrate that learning feature representations automatically from training data is superior. Nonetheless, this advantage is subject to an unrealistic assumption that there exist many training samples per website, which otherwise will disappear. To address this, we introduce a model-agnostic, efficient, and harmonious data augmentation (HDA) method that can improve deep WF attacking methods significantly. HDA involves both intrasample and intersample data transformations that can be used in a harmonious manner to expand a tiny training dataset to an arbitrarily large collection, therefore effectively and explicitly addressing the intrinsic data scarcity problem. We conducted expensive experiments to validate our HDA for boosting state-of-the-art deep learning WF attack models in both closed-world and open-world attacking scenarios, at absence and presence of strong defense. For instance, in the more challenging and realistic evaluation scenario with WTF-PAD-based defense, our HDA method surpasses the previous state-of-the-art results by nearly 3% in classification accuracy in the 20-shot learning case. An earlier version of this work Chen et al. (2021) has been presented as preprint in ArXiv (https://arxiv.org/abs/2101.10063).
Funder
Natural Science Foundation of Hunan Province
Subject
Computer Networks and Communications,Information Systems
Reference56 articles.
1. Few-shot website fingerprinting attack;M. Chen,2021
2. Tor: the second-generation onion router;D. Roger
3. Tor metrics portal;Tor Developers,2018
4. Fingerprinting Websites Using Traffic Analysis
5. Inferring the source of encrypted HTTP connections
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A website fingerprinting technology with time-sampling;Peer-to-Peer Networking and Applications;2024-02-06
2. Deanonymize Tor Hidden Services Using Remote Website Fingerprinting;2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2023-11-01
3. A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning;Mathematics;2023-09-26
4. A review of few-shot network traffic classification based on deep learning;International Conference on Mechatronics and Intelligent Control (ICMIC 2023);2023-09-26
5. Few-shot website fingerprinting attack with cluster adaptation;Computer Networks;2023-06