Affiliation:
1. Concordia University ,
2. King Fahd University of Petroleum and Minerals ,
3. Imam Abdulrahman Bin Faisal University ,
Abstract
Abstract
Traffic analysis is the process of extracting useful/sensitive information from observed network traffic. Typical use cases include malware detection and website fingerprinting attacks. High accuracy traffic analysis techniques use machine learning algorithms (e.g. SVM, kNN) and require to split the traffic into correctly separated blocks. Inspired by digital forensics techniques, we propose a new network traffic analysis approach based on similarity digest. The approach features several advantages compared to existing techniques, namely, fast signature generation, compact signature representation using Bloom filters, efficient similarity detection between packet traces of arbitrary sizes, and in particular dropping the traffic splitting requirement altogether. Experimental results show very promising results on VPN and malware traffic, but low results on Tor traffic due mainly to the single-size cells feature.
Reference49 articles.
1. [1] D. Herrmann, R. Wendolsky, and H. Federrath, “Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier,” in Proceedings of the 2009 ACM workshop on Cloud computing security, ser. CCSW ’09. New York, NY, USA: ACM, 2009, pp. 31–42.
2. [2] A. Panchenko, L. Niessen, A. Zinnen, and T. Engel, “Website fingerprinting in onion routing based anonymization networks,” in Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, ser. WPES ’11. New York, NY, USA: ACM, 2011, pp. 103–114.
3. [3] X. Cai, X. C. Zhang, B. Joshi, and R. Johnson, “Touching from a distance: website fingerprinting attacks and defenses,” in Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS ’12. New York, NY, USA: ACM, 2012, pp. 605–616.
4. [4] T. Wang and I. Goldberg, “Improved website fingerprinting on tor,” in 12th ACM Workshop on Privacy in the Electronic Society, ser. WPES’13. ACM, 2013.
5. [5] T. Wang, X. Cai, R. Nithyanand, R. Johnson, and I. Gold-berg, “Effective attacks and provable defenses for website fingerprinting.” in USENIX Security, 2014, pp. 143–157.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献