Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning

01/07/2018
by   Payap Sirinam, et al.
0

Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection, and the state-of-the-art attacks have been shown to be effective even when the user is protecting her privacy with the Tor anonymity system. Recently, lightweight website fingerprinting defenses for Tor have emerged that substantially degrade existing attacks, including WTF-PAD and Walkie-Talkie. In this work, we propose a new website fingerprinting attack against Tor that leverages a type of deep learning called convolution neural networks (CNN), and we evaluate this attack against WTF-PAD and Walkie-Talkie. The CNN attack attains over 98 Tor traffic without defenses, better than all prior attacks, and it is also effective against WTF-PAD with over 90 effective, holding the attack to just 53 setting, the CNN attack remains effective, with a 93 less than 1 defended with WTF-PAD in this setting, the attack still can get a 60 positive rate with a less than 1 a need for more study of robust defenses that could be deployed in Tor.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset