Open AccessPosted Content
An Efficient Web Traffic Defence Against Timing-Analysis Attacks
Saman Feghhi,Douglas J. Leith +1 more
Reads0
Chats0
TLDR
In this paper, the authors introduce a new class of lower overhead tunnel that is resistant to traffic analysis, which opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties.Abstract:
We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The tunnel opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. We find that the dummy packet overhead is typically less than 20% on lightly loaded links and falls to zero as the traffic load increases i.e. the tunnel is capacity-achieving. The additional latency incurred is less than 100ms. We build an experimental prototype of the tunnel and carry out an extensive performance evaluation that demonstrates its effectiveness under a range of network conditions and real web page fetches.read more
References
More filters
Proceedings ArticleDOI
Website fingerprinting in onion routing based anonymization networks
TL;DR: It is shown that anonymity in Tor and JAP is not as strong as expected so far and cannot resist website fingerprinting attacks under certain circumstances, and this work is the first successful attack in the open-world scenario.
Proceedings ArticleDOI
Inferring the source of encrypted HTTP connections
TL;DR: This work examines the effectiveness of two traffic analysis techniques, based upon classification algorithms, for identifying encrypted HTTP streams, and gives evidence that these techniques will exhibit the scalability necessary to be effective on the Internet.
Proceedings ArticleDOI
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
TL;DR: A novel method that applies common text mining techniques to the normalised frequency distribution of observable IP packet sizes and outperforms previously known methods like Jaccard's classifier and Naïve Bayes that neglect packet frequencies altogether or rely on absolute frequency values.
Proceedings ArticleDOI
Touching from a distance: website fingerprinting attacks and defenses
TL;DR: A novel web page fingerprinting attack is presented that is able to defeat several recently proposed defenses against traffic analysis attacks, including the application-level defenses HTTPOS and randomized pipelining over Tor.
Proceedings ArticleDOI
Website Fingerprinting at Internet Scale
Andriy Panchenko,Fabian Lanze,Andreas Zinnen,Martin Henze,Jan Pennekamp,Klaus Wehrle,Thomas Engel +6 more
TL;DR: This paper presents a novel website fingerprinting attack that outperforms all state-of-the-art methods in terms of classification accuracy while being computationally dramatically more efficient and shows that no existing method scales when applied in realistic settings.