Statistical Privacy for Streaming Traffic

@inproceedings{Zhang2019StatisticalPF,
  title={Statistical Privacy for Streaming Traffic},
  author={Xiaokuan Zhang and Jihun Hamm and M. Reiter and Yinqian Zhang},
  booktitle={NDSS},
  year={2019}
}
Machine learning empowers traffic-analysis attacks that breach users’ privacy from their encrypted traffic. Recent advances in deep learning drastically escalate such threats. One prominent example demonstrated recently is a traffic-analysis attack against video streaming by using convolutional neural networks. In this paper, we explore the adaption of techniques previously used in the domains of adversarial machine learning and differential privacy to mitigate the machine-learning-powered… Expand
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations
Deep neural networks (DNNs) are commonly used for various traffic analysis problems, such as website fingerprinting and flow correlation, as they outperform traditional (e.g., statistical) techniquesExpand
Fingerprinting encrypted voice traffic on smart speakers with deep learning
TLDR
This paper built an automatic voice traffic collection tool and collected two large-scale datasets on two smart speakers, Amazon Echo and Google Home, and implemented proof-of-concept attacks by leveraging deep learning, which indicate disturbing privacy concerns. Expand
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
TLDR
This work proposes MemGuard, the first defense with formal utility-loss guarantees against black-box membership inference attacks and is the first one to show that adversarial examples can be used as defensive mechanisms to defend against membership inference attack. Expand
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
TLDR
This work proposes the use of adversarial learning as a defensive tool to obfuscate and mask private information and investigates whether an attacker can protect her classifier model by employing adversarial defense methods, namely adversarial re-training and defensive distillation. Expand
Blind Adversarial Network Perturbations
TLDR
For the first time, it is shown that an adversary can defeat DNN-based traffic analysis techniques by applying adversarial perturbations on the patterns of network traffic. Expand
Detection Defense Against Adversarial Attacks with Saliency Map
TLDR
This paper discusses the saliency map method from the view of enhancing model interpretability, it is similar to introducing the mechanism of the attention to the model, so as to comprehend the progress of object identification by the deep networks, and proposes a novel method combined with additional noises and utilize the inconsistency strategy to detect adversarial examples. Expand
Optimally Hiding Object Sizes with Constrained Padding
TLDR
This paper gives algorithms to compute privacy-optimal padding schemes—specifically that minimize the network observer's information gain from a downloaded object’s padded size—in several scenarios of interest, comparing them to recent contenders in the research literature, and evaluating their performance on practical datasets. Expand
Security and Privacy in Communication Networks: 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I
TLDR
A novel proactive defense technique using sender email address mutation to protect a group of related users against lateral spear-phishing and a real-world implementation of the Email mutation technique that works with any email service providers such as Gmail, Apple iCloud, Yahoo Mail, and seamlessly integrates with standard email clients. Expand
ADTM: an Anonymous Data Transmission Model based on Multiple Oblivious Internet Channels
TLDR
ADTM, a novel asynchronous model for massive data transmission, which builds multiple anonymous transmission channels based on Internet file storage services, has high performance and can be used for anonymous transmission of massive data. Expand
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark
TLDR
A purpose-aware access control (PAAC) model is proposed, which introduces new concepts of data processing/operation purposes to conventional purpose-based access control and develops an access control mechanism in Spark Catalyst, which provides unified PAAC enforcement for heterogeneous data sources and upper-layer applications. Expand
...
1
2
...

References

SHOWING 1-10 OF 76 REFERENCES
MACHINE VS MACHINE: MINIMAX-OPTIMAL DEFENSE AGAINST ADVERSARIAL EXAMPLES
TLDR
It is demonstrated that the defense found by numerical minimax optimization is indeed more robust than non-minimax defenses, and directions for improving the result toward achieving robustness against multiple types of attack classes are discussed. Expand
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
TLDR
Deep Fingerprinting is presented, a new website fingerprinting attack against Tor that leverages a type of deep learning called Convolutional Neural Networks with a sophisticated architecture design and is the only attack that is effective against WTF-PAD with over 90% accuracy. Expand
Vuvuzela: scalable private messaging resistant to traffic analysis
TLDR
Vuvuzela is a new scalable messaging system that offers strong privacy guarantees, hiding both message data and metadata, and is secure against adversaries that observe and tamper with all network traffic, and that control all nodes except for one server. Expand
The Limitations of Deep Learning in Adversarial Settings
TLDR
This work formalizes the space of adversaries against deep neural networks (DNNs) and introduces a novel class of algorithms to craft adversarial samples based on a precise understanding of the mapping between inputs and outputs of DNNs. Expand
Towards Evaluating the Robustness of Neural Networks
TLDR
It is demonstrated that defensive distillation does not significantly increase the robustness of neural networks, and three new attack algorithms are introduced that are successful on both distilled and undistilled neural networks with 100% probability are introduced. Expand
Toward an Efficient Website Fingerprinting Defense
TLDR
This paper proposes a novel, lightweight defense based on Adaptive Padding that provides a sufficient level of security against website fingerprinting, particularly in realistic evaluation conditions. Expand
Effective Attacks and Provable Defenses for Website Fingerprinting
TLDR
This paper shows how simulatable, deterministic defenses can be provably private, and shows that bandwidth overhead optimality can be achieved for these defenses by using a supersequence over anonymity sets of packet sequences. Expand
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks
TLDR
Walkie-Talkie is proposed, an effective and efficient WF defense that cannot be defeated by any website fingerprinting attack, even hypothetical advanced attacks that use site link information, page visit rates, and intercell timing. Expand
Website fingerprinting in onion routing based anonymization networks
TLDR
It is shown that anonymity in Tor and JAP is not as strong as expected so far and cannot resist website fingerprinting attacks under certain circumstances, and this work is the first successful attack in the open-world scenario. Expand
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows
TLDR
Extensive evaluation of HTTPOS on live web traffic shows that it can successfully prevent the state-of-the-art attacks from inferring private information from encrypted HTTP flows and offer much better scalability and flexibility. Expand
...
1
2
3
4
5
...