scispace - formally typeset
Open AccessPosted Content

An Efficient Web Traffic Defence Against Timing-Analysis Attacks

Reads0
Chats0
TLDR
In this paper, the authors introduce a new class of lower overhead tunnel that is resistant to traffic analysis, which opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties.
Abstract
We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The tunnel opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. We find that the dummy packet overhead is typically less than 20% on lightly loaded links and falls to zero as the traffic load increases i.e. the tunnel is capacity-achieving. The additional latency incurred is less than 100ms. We build an experimental prototype of the tunnel and carry out an extensive performance evaluation that demonstrates its effectiveness under a range of network conditions and real web page fetches.

read more

References
More filters
Proceedings ArticleDOI

Website fingerprinting in onion routing based anonymization networks

TL;DR: It is shown that anonymity in Tor and JAP is not as strong as expected so far and cannot resist website fingerprinting attacks under certain circumstances, and this work is the first successful attack in the open-world scenario.
Proceedings ArticleDOI

Inferring the source of encrypted HTTP connections

TL;DR: This work examines the effectiveness of two traffic analysis techniques, based upon classification algorithms, for identifying encrypted HTTP streams, and gives evidence that these techniques will exhibit the scalability necessary to be effective on the Internet.
Proceedings ArticleDOI

Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier

TL;DR: A novel method that applies common text mining techniques to the normalised frequency distribution of observable IP packet sizes and outperforms previously known methods like Jaccard's classifier and Naïve Bayes that neglect packet frequencies altogether or rely on absolute frequency values.
Proceedings ArticleDOI

Touching from a distance: website fingerprinting attacks and defenses

TL;DR: A novel web page fingerprinting attack is presented that is able to defeat several recently proposed defenses against traffic analysis attacks, including the application-level defenses HTTPOS and randomized pipelining over Tor.
Proceedings ArticleDOI

Website Fingerprinting at Internet Scale

TL;DR: This paper presents a novel website fingerprinting attack that outperforms all state-of-the-art methods in terms of classification accuracy while being computationally dramatically more efficient and shows that no existing method scales when applied in realistic settings.
Related Papers (5)