Access the full text.
Sign up today, get DeepDyve free for 14 days.
David Lu, Sanjit Bhat, Albert Kwon, S. Devadas (2018)
DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting FlowsProceedings of the 2018 Workshop on Privacy in the Electronic Society
A. Panchenko, Fabian Lanze, J. Pennekamp, T. Engel, Andreas Zinnen, Martin Henze, Klaus Wehrle (2016)
Website Fingerprinting at Internet Scale
M. Liberatore, B. Levine (2006)
Inferring the source of encrypted HTTP connections
K. Simonyan, Andrew Zisserman (2014)
Very Deep Convolutional Networks for Large-Scale Image RecognitionCoRR, abs/1409.1556
Yann LeCun, L. Bottou, Yoshua Bengio, P. Haffner (1998)
Gradient-based learning applied to document recognitionProc. IEEE, 86
Marc Juárez, Sadia Afroz, Gunes Acar, Claudia Díaz, R. Greenstadt (2014)
A Critical Evaluation of Website Fingerprinting AttacksProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Christian Szegedy, Sergey Ioffe, Vincent Vanhoucke, Alexander Alemi (2016)
Inception-v4, Inception-ResNet and the Impact of Residual Connections on LearningArXiv, abs/1602.07261
Jamie Hayes, G. Danezis (2015)
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
Liming Lu, E. Chang, M. Chan (2010)
Website Fingerprinting and Identification Using Ordered Feature Sequences
Andrew Hintz (2002)
Fingerprinting Websites Using Traffic Analysis
A. Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, Adrian Vladu (2017)
Towards Deep Learning Models Resistant to Adversarial AttacksArXiv, abs/1706.06083
Thomas Dietterich (2000)
Ensemble Methods in Machine Learning
Martín Abadi, Ashish Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G. Corrado, Andy Davis, J. Dean, M. Devin, S. Ghemawat, I. Goodfellow, A. Harp, G. Irving, M. Isard, Yangqing Jia, R. Józefowicz, Lukasz Kaiser, M. Kudlur, J. Levenberg, Dandelion Mané, R. Monga, Sherry Moore, D. Murray, C. Olah, M. Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, P. Tucker, Vincent Vanhoucke, Vijay Vasudevan, F. Viégas, O. Vinyals, P. Warden, M. Wattenberg, M. Wicke, Yuan Yu, Xiaoqiang Zheng (2016)
TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed SystemsArXiv, abs/1603.04467
Roger Dingledine, Nick Mathewson, P. Syverson (2004)
Tor: The Second-Generation Onion Router
Marc Juárez, M. Imani, Mike Perry, Claudia Díaz, M. Wright (2015)
Toward an Efficient Website Fingerprinting Defense
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, I. Goldberg (2014)
Effective Attacks and Provable Defenses for Website Fingerprinting
(2018)
Tor metrics portal
Diederik Kingma, Jimmy Ba (2014)
Adam: A Method for Stochastic OptimizationCoRR, abs/1412.6980
Tao Wang, I. Goldberg (2016)
On Realistically Attacking Tor with Website FingerprintingProceedings on Privacy Enhancing Technologies, 2016
Max Jaderberg, Wojciech Czarnecki, Simon Osindero, O. Vinyals, Alex Graves, David Silver, K. Kavukcuoglu (2016)
Decoupled Neural Interfaces using Synthetic Gradients
Tao Wang, I. Goldberg (2013)
Improved website fingerprinting on TorProceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Tao Wang, I. Goldberg (2017)
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks
I. Goodfellow, Jonathon Shlens, Christian Szegedy (2014)
Explaining and Harnessing Adversarial ExamplesCoRR, abs/1412.6572
Payap Sirinam, M. Imani, Marc Juárez, M. Wright (2018)
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep LearningProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
Nitish Srivastava, Geoffrey Hinton, A. Krizhevsky, Ilya Sutskever, R. Salakhutdinov (2014)
Dropout: a simple way to prevent neural networks from overfittingJ. Mach. Learn. Res., 15
Chiyuan Zhang, Samy Bengio, Moritz Hardt, B. Recht, O. Vinyals (2016)
Understanding deep learning requires rethinking generalizationArXiv, abs/1611.03530
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, I. Goldberg (2014)
A Systematic Approach to Developing and Evaluating Website Fingerprinting DefensesProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
Dominik Herrmann, Rolf Wendolsky, H. Federrath (2009)
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
Yann LeCun, Yoshua Bengio, Geoffrey Hinton (2015)
Deep LearningNature, 521
Ankit Gupta, Alexander Rush (2017)
Dilated Convolutions for Modeling Long-Distance Genomic DependenciesbioRxiv
G. Bissias, M. Liberatore, David Jensen, B. Levine (2005)
Privacy Vulnerabilities in Encrypted HTTP Streams
H. Cheng (1998)
Traffic Analysis of SSL Encrypted Web Browsing
Kotaro Abe, Shigeki Goto (2016)
Fingerprinting Attack on Tor Anonymity using Deep Learning, 42
Xiang Cai, Xin Zhang, Brijesh Joshi, Rob Johnson (2012)
Touching from a distance: website fingerprinting attacks and defensesProceedings of the 2012 ACM conference on Computer and communications security
Kevin Dyer, Scott Coull, T. Ristenpart, Thomas Shrimpton (2012)
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail2012 IEEE Symposium on Security and Privacy
S. Hochreiter, J. Schmidhuber (1997)
Long Short-Term MemoryNeural Computation, 9
Kaiming He, X. Zhang, Shaoqing Ren, Jian Sun (2015)
Deep Residual Learning for Image Recognition2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
F. Yu, V. Koltun (2015)
Multi-Scale Context Aggregation by Dilated ConvolutionsCoRR, abs/1511.07122
Sergey Ioffe, Christian Szegedy (2015)
Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate ShiftArXiv, abs/1502.03167
Qixiang Sun, Daniel Simon, Yi-Min Wang, W. Russell, V. Padmanabhan, L. Qiu (2002)
Statistical identification of encrypted Web browsing trafficProceedings 2002 IEEE Symposium on Security and Privacy
Vera Rimmer, D. Preuveneers, Marc Juarez, Tom Goethem, W. Joosen (2017)
Automated Website Fingerprinting through Deep LearningArXiv, abs/1708.06376
A. Panchenko, L. Niessen, Andreas Zinnen, T. Engel (2011)
Website fingerprinting in onion routing based anonymization networksProceedings of the 10th annual ACM workshop on Privacy in the electronic society
Priya Goyal, Piotr Dollár, Ross Girshick, P. Noordhuis, Lukasz Wesolowski, Aapo Kyrola, Andrew Tulloch, Yangqing Jia, Kaiming He (2017)
Accurate, Large Minibatch SGD: Training ImageNet in 1 HourArXiv, abs/1706.02677
Aäron Oord, S. Dieleman, H. Zen, K. Simonyan, O. Vinyals, Alex Graves, Nal Kalchbrenner, A. Senior, K. Kavukcuoglu (2016)
WaveNet: A Generative Model for Raw AudioArXiv, abs/1609.03499
A. Krizhevsky, Ilya Sutskever, Geoffrey Hinton (2012)
ImageNet classification with deep convolutional neural networksCommunications of the ACM, 60
Gao Huang, Zhuang Liu, Kilian Weinberger (2016)
Densely Connected Convolutional Networks2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
AbstractIn recent years, there have been several works that use website fingerprinting techniques to enable a local adversary to determine which website a Tor user visits. While the current state-of-the-art attack, which uses deep learning, outperforms prior art with medium to large amounts of data, it attains marginal to no accuracy improvements when both use small amounts of training data. In this work, we propose Var-CNN, a website fingerprinting attack that leverages deep learning techniques along with novel insights specific to packet sequence classification. In open-world settings with large amounts of data, Var-CNN attains over 1% higher true positive rate (TPR) than state-of-the-art attacks while achieving 4× lower false positive rate (FPR). Var-CNN’s improvements are especially notable in low-data scenarios, where it reduces the FPR of prior art by 3.12% while increasing the TPR by 13%. Overall, insights used to develop Var-CNN can be applied to future deep learning based attacks, and substantially reduce the amount of training data needed to perform a successful website fingerprinting attack. This shortens the time needed for data collection and lowers the likelihood of having data staleness issues.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Oct 1, 2019
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.