Seamless Website Fingerprinting in Multiple Environments

Chuxu Song,Zining Fan,Hao Wang,Richard Martin
2024-07-28
Abstract:Website fingerprinting (WF) attacks identify the websites visited over anonymized connections by analyzing patterns in network traffic flows, such as packet sizes, directions, or interval times using a machine learning classifier. Previous studies showed WF attacks achieve high classification accuracy. However, several issues call into question whether existing WF approaches are realizable in practice and thus motivate a re-exploration. Due to Tor's performance issues and resulting poor browsing experience, the vast majority of users opt for Virtual Private Networking (VPN) despite VPNs weaker privacy protections. Many other past assumptions are increasingly unrealistic as web technology advances. Our work addresses several key limitations of prior art. First, we introduce a new approach that classifies entire websites rather than individual web pages. Site-level classification uses traffic from all site components, including advertisements, multimedia, and single-page applications. Second, our Convolutional Neural Network (CNN) uses only the jitter and size of 500 contiguous packets from any point in a TCP stream, in contrast to prior work requiring heuristics to find page boundaries. Our seamless approach makes eavesdropper attack models realistic. Using traces from a controlled browser, we show our CNN matches observed traffic to a website with over 90% accuracy. We found the training traffic quality is critical as classification accuracy is significantly reduced when the training data lacks variability in network location, performance, and clients' computational capability. We enhanced the base CNN's efficacy using domain adaptation, allowing it to discount irrelevant features, such as network location. Lastly, we evaluate several defensive strategies against seamless WF attacks.
Cryptography and Security
What problem does this paper attempt to address?
### What problems does this paper attempt to solve? This paper aims to re - examine and improve the Website Fingerprinting (WF) technology, especially in view of the limitations of existing WF methods in practical applications. Specifically, this research attempts to solve the following key problems: 1. **Limitations of traditional WF methods**: - **Page - level classification vs. site - level classification**: Traditional WF methods mainly focus on identifying individual web pages, ignoring the traffic characteristics of the entire website. This leads to lower classification accuracy, especially in modern complex website structures. This paper proposes a new method, that is, classifying the entire website, including all components such as advertisements, multimedia content, and single - page applications (SPA). 2. **Unrealistic attack models**: - **Traditional WF attack models assume that attackers can observe the complete web page transaction process**, for example, all network traffic from start to end. However, in reality, attackers may only be able to observe 500 consecutive packets at any position. This paper proposes a more realistic seamless WF attack model, where attackers only need to observe 500 consecutive packets at any position to perform classification. 3. **Lack of diversity in experimental environments**: - **Most previous studies only conduct experiments in one client environment**, which makes the training and testing sets less representative. This paper shows the impact of different network environments on WF accuracy by collecting traffic data in different network environments (such as cloud data centers, university campus networks, and home networks), and emphasizes the importance of diverse training data for improving classification accuracy. 4. **Impact of computing environments**: - **Traffic patterns generated by clients with different computing capabilities vary significantly**, which has an important impact on the accuracy of WF. This paper explores the impact of machines with different computing performances (such as cloud servers and home desktops) on traffic patterns, and points out that these differences will lead to a decline in classification accuracy. 5. **Effectiveness of defense strategies**: - **This paper also evaluates several strategies for defending against seamless WF attacks**, including two privacy - enhancing techniques: Inflation (confusing traffic by randomly delaying and increasing packet size) and Active Injection (reducing classification accuracy by randomly adding extra packets). The results show that these defense strategies can reduce the success rate of WF attacks to a certain extent. 6. **Application of domain adaptation**: - **To deal with the differences between different network environments**, this paper introduces the domain adaptation technique, enabling the model to maintain high classification accuracy in different network environments. By adding an auxiliary network in the CNN to classify different network locations, location - related features are eliminated, and important features related to website classification are retained. In summary, through introducing new seamless WF attack models, diverse experimental environments, and domain adaptation techniques, this paper aims to improve the accuracy and robustness of WF in practical applications, and explore effective defense strategies.