A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning
-
Published:2023-09-26
Issue:19
Volume:11
Page:4078
-
ISSN:2227-7390
-
Container-title:Mathematics
-
language:en
-
Short-container-title:Mathematics
Author:
Pan Tianyao1, Tang Zejia2, Xu Dawei3
Affiliation:
1. School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China 2. School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China 3. College of Cybersecurity, Changchun University, Changchun 130022, China
Abstract
Website fingerprinting attacks attempt to apply deep learning technology to identify websites corresponding to encrypted traffic data. Unfortunately, to the best of our knowledge, once the total number of encrypted traffic data becomes insufficient, the identification accuracy in most existing works will drop dramatically. This phenomenon grows worse because the statistical features of the encrypted traffic data are not always stable but irregularly varying in different time periods. Even a deep learning model requires good performance to capture the statistical features, its accuracy usually diminishes in a short period of time because the changes of the statistical features technically put the training and testing data into two non-identical distributions. In this paper, we first propose a convolutional neural network-based website fingerprinting attack (CWFA) scheme. This scheme integrates packet direction with the timing sequence from the encrypted traffic data to improve the accuracy of analysis as much as possible on few data samples. We then design a new fine-tuning mechanism for the CWFA (FM-CWFA) scheme based on transfer learning. This mechanism enables the proposed FM-CWFA scheme to support the changes in the statistical patterns. The experimental results in closed-world and open-world settings show that the effectiveness of the CWFA scheme is better than previous researches, with the slowest performance degradation when the number of data decreases, and the FM-CWFA scheme can remain effective when the statistical features change.
Funder
National Natural Science Foundation of China National Key Research and Development Program of China
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference28 articles.
1. Dingledine, R., Mathewson, N., and Syverson, P.F. (2004, January 9–13). Tor: The Second-Generation Onion Router. Proceedings of the USENIX Security Symposium, San Diego, CA, USA. 2. Wang, T., Cai, X., Nithyanand, R., Johnson, R., and Goldberg, I. (2014, January 20–22). Effective attacks and provable defenses for website fingerprinting. Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA. 3. Panchenko, A., Lanze, F., Pennekamp, J., Engel, T., Zinnen, A., Henze, M., and Wehrle, K. (2016, January 21–24). Website Fingerprinting at Internet Scale. Proceedings of the NDSS, San Diego, CA, USA. 4. Hayes, J., and Danezis, G. (2016, January 10–12). k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA. 5. Fingerprinting attack on Tor anonymity using deep learning;Abe;Proc. Asia-Pac. Adv. Netw.,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Lightweight Website Fingerprinting Defense Method Based on Distribution Distance Padding;2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2023-12-17
|
|