About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings

Research Article

SAD: Website Fingerprinting Defense Based on Adversarial Examples

Download(Requires a free EAI acccount)
6 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-96791-8_7,
        author={Renzhi Tang and Guowei Shen and Chun Guo and Yunhe Cui},
        title={SAD: Website Fingerprinting Defense Based on Adversarial Examples},
        proceedings={Security and Privacy in New Computing Environments. 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings},
        proceedings_a={SPNCE},
        year={2022},
        month={3},
        keywords={Website fingerprinting attack Website fingerprinting defense Tor Adversarial examples},
        doi={10.1007/978-3-030-96791-8_7}
    }
    
  • Renzhi Tang
    Guowei Shen
    Chun Guo
    Yunhe Cui
    Year: 2022
    SAD: Website Fingerprinting Defense Based on Adversarial Examples
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-96791-8_7
Renzhi Tang1, Guowei Shen1,*, Chun Guo1, Yunhe Cui1
  • 1: College of Computer Science and Technology, Guizhou University
*Contact email: gwshen@gzu.edu.cn

Abstract

Website Fingerprinting (WF) attacks can infer website names from encrypted network traffic when the victim is browsing the website. Inherent defenses of anonymous communication systems such as The Onion Router (Tor) cannot compete with current WF attacks. The state-of-the-art attack based on deep learning can gain over 98% accuracy in Tor. However, the existing defense will bring high bandwidth overhead, affect the user’s network experience or cannot be used in actual scenarios. Some researchers found that deep learning models are vulnerable to adversarial examples. In this paper, based on adversarial examples we propose Segmented Adversary Defense (SAD) for deep learning-based WF attacks. Network traffic is divided into multiple segments. Then, the adversarial examples for each segment of traffic can be generated by SAD. Finally, dummy packets from adversarial examples are inserted after each segment traffic. Experimentally, our results show that SAD can effectively reduce the accuracy of WF attacks. The technique drops the accuracy of the state-of-the-art attack hardened from 96% to 3% while incurring only 40% bandwidth overhead. Compared with the existing proposed defense named Deep Fingerprinting Defender (DFD), the defense effect of SAD is better under the same bandwidth overhead.

Keywords
Website fingerprinting attack Website fingerprinting defense Tor Adversarial examples
Published
2022-03-13
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-96791-8_7
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL