About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings

Research Article

RAP: A Lightweight Application Layer Defense Against Website Fingerprinting

Download(Requires a free EAI acccount)
6 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-96791-8_19,
        author={Yan Zhang and Li Yang and Junbo Jia and Shirui Ying and Yasheng Zhou},
        title={RAP: A Lightweight Application Layer Defense Against Website Fingerprinting},
        proceedings={Security and Privacy in New Computing Environments. 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings},
        proceedings_a={SPNCE},
        year={2022},
        month={3},
        keywords={Traffic analysis Website fingerprinting Web privacy},
        doi={10.1007/978-3-030-96791-8_19}
    }
    
  • Yan Zhang
    Li Yang
    Junbo Jia
    Shirui Ying
    Yasheng Zhou
    Year: 2022
    RAP: A Lightweight Application Layer Defense Against Website Fingerprinting
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-96791-8_19
Yan Zhang1, Li Yang1,*, Junbo Jia1, Shirui Ying1, Yasheng Zhou1
  • 1: Xidian University
*Contact email: yangli@xidian.edu.cn

Abstract

Website fingerprinting (WFP) attacks threaten user privacy on anonymity networks because they can be used by network surveillants to identify webpages that are visited by users based on extracted features from the network traffic. There are currently defenses to reduce the threat of WFP, but these defense measures have some defects; some defenses are too expensive to deploy, and some have been defeated by stronger WFP attack methods. In this work, we propose a lightweight application layer defense method,RAP, which can resist current WFP attacks with very low data and latency overheads; more importantly, it is easy to deploy. We randomly deploy important resource files, such as JS and CSS, to multiple Tor OR servers in advance and update them regularly. By randomly scrambling the resource request order, a single request is sent and received through multiple independent paths with different Tor entry ORs. To randomize the traffic distribution, users randomly obtain the website resource files directly from the Tor node server, rather than from the original server, when browsing the website. In this way, the best attack accuracy is reduced from 98% to 53%. Additionally, to confuse the traffic, we request a small amount of additional HTML text instead of the whole website resources, which reduces the effect of state-of-the-art WFP attacks to 40% with 13% data overhead and 31% latency overhead.

Keywords
Traffic analysis Website fingerprinting Web privacy
Published
2022-03-13
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-96791-8_19
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL