• Corpus ID: 10623439

WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor

@article{Jurez2015WTFPADTA,
  title={WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor},
  author={Marc Ju{\'a}rez and Mohsen Imani and Mike Perry and Claudia D{\'i}az and Matthew K. Wright},
  journal={ArXiv},
  year={2015},
  volume={abs/1512.00524}
}
Website Fingerprinting attacks are conducted by a low-resource local adversary who observes the (encrypted) traffic between an anonymity system and one or more of its clients. With this attack, the adversary can recover the user's otherwise anonymized web browsing activity by matching the observed traffic with prerecorded web page traffic templates. The defenses that have been proposed to counter these attacks are effective, but they are impractical for deployment in real-world systems due to… 
RegulaTOR: A Powerful Website Fingerprinting Defense
TLDR
A realistic and novel defense, Regulator, is presented that demonstrates improved overhead and high effectiveness against current WF attacks and reduces the accuracy of the state-of-the-art attack, Tik-Tok, against lightweight defenses.
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks
TLDR
The study reveals that state-of-the-art website fingerprinting techniques may not be effective in real-world scenarios, even in the face of Shadowsocks which does not deploy typical defenses.
Effective defense against fingerprinting attack based on autocorrelation property minimization approach
TLDR
It is shown that the autocorrelation property is the most important success factor of the website fingerprinting attack, and a new effective defense model is offered to resolve this security vulnerability of the Tor anonymity network.
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
TLDR
The technique, k-fingerprinting, performs better than current state-of-the-art attacks even against website fingerprinting defenses, and it is shown that it is possible to launch aWebsite fingerprinting attack in the face of a large amount of noisy data.
Towards an Evaluation of a Recommended Tor Browser Configuration in Light of Website Fingerprinting Attacks
TLDR
The results show that the recommended ”more secure” setting for Tor Browser is actually more vulnerable to WF attacks than the default and non-recommended setting.
Towards Language-Based Mitigation of Traffic Analysis Attacks
TLDR
SELENE is introduced, a small language for principled, provably secure communication over channels where packets are publicly observable, and it is demonstrated how the program level defence can reduce the latency and bandwidth overheads induced compared with program-agnostic defence mechanisms.
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network
TLDR
DAENet is presented, an efficient mix network that resists both targeted DoS attacks and traffic analysis attacks with a new abstraction called Stealthy Peer-to-Peer (P2P) Network, which effectively hides the shuffling nodes used in a routing path into the whole network.
Profiling Tor Users with Unsupervised Learning Techniques
TLDR
This paper considers an adversary with the same capabilities as in website fingerprinting, but who uses unsupervised techniques to profile the users’ browsing activity and shows that for a world of 1,000 pages, the attack performance does not suffer a significant reduction.
The Effect of DNS on Tor's Anonymity
TLDR
It is shown that an adversary who can mount a DefecTor attack can often determine the website that a Tor user is visiting with perfect precision, particularly for less popular websites where the set of DNS names associated with that website may be unique to the site.
Communications anonymes dans un réseau homogène
TLDR
This thesis designs an Internet overlay inspired from previous works, and deviates from the traditional client-server architecture endorsed by most existing anonymous networks, in favor of a homogeneous, fully distributed architecture in which every user also acts as a relay server, allowing it to conceal its own traffic in the traffic it relays for others.
...
1
2
...

References

SHOWING 1-10 OF 49 REFERENCES
Glove: A Bespoke Website Fingerprinting Defense
TLDR
Preliminary results of {Glove}, a new SSH based defense based on the observation that current defenses are expensive not because website traces are different, but because the defense, operating blindly, does not know how to add cover traffic and therefore, puts it everywhere.
Effective Attacks and Provable Defenses for Website Fingerprinting
TLDR
This paper shows how simulatable, deterministic defenses can be provably private, and shows that bandwidth overhead optimality can be achieved for these defenses by using a supersequence over anonymity sets of packet sequences.
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
TLDR
Tamaraw is presented, a new defense that achieves a better security/bandwidth trade-off than any previously proposed defense and provides an "existence proof" for efficient, secure defenses.
CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense
TLDR
The complete specifications of the CS-BuFlo scheme, which is based on the BuFlo defense proposed by Dyer, et al., are laid out and a thorough evaluation of the scheme is performed using empirical data (rather than data from simulations).
Touching from a distance: website fingerprinting attacks and defenses
We present a novel web page fingerprinting attack that is able to defeat several recently proposed defenses against traffic analysis attacks, including the application-level defenses HTTPOS and
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
TLDR
A novel method that applies common text mining techniques to the normalised frequency distribution of observable IP packet sizes and outperforms previously known methods like Jaccard's classifier and Naïve Bayes that neglect packet frequencies altogether or rely on absolute frequency values.
Website fingerprinting in onion routing based anonymization networks
TLDR
It is shown that anonymity in Tor and JAP is not as strong as expected so far and cannot resist website fingerprinting attacks under certain circumstances, and this work is the first successful attack in the open-world scenario.
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis
TLDR
This paper proposes a novel method for thwarting statistical traffic analysis algorithms by optimally morphing one class of traffic to look like another class, and shows how to optimally modify packets in real-time to reduce the accuracy of a variety of traffic classifiers while incurring much less overhead than padding.
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
TLDR
It is unlikely that bandwidth-efficient, general-purpose TA countermeasures can ever provide the type of security targeted in prior work, and it is shown that nine known countermeasures are vulnerable to simple attacks that exploit coarse features of traffic.
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows
TLDR
Extensive evaluation of HTTPOS on live web traffic shows that it can successfully prevent the state-of-the-art attacks from inferring private information from encrypted HTTP flows and offer much better scalability and flexibility.
...
1
2
3
4
5
...