TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting

Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns of data flows based on the size and direction of packets. By collecting traffic traces at a malicious Tor entry node --- one of the weakest adversaries in the attacker model of Tor --- a passive eavesdropper can leverage the captured meta-data to reveal the websites visited by a Tor user. As recently shown, WFP is significantly more effective and realistic than assumed. Concurrently, former WFP defenses are either infeasible for deployment in real-world settings or defend against specific WFP attacks only. To limit the exposure of Tor users to WFP, we propose novel lightweight WFP defenses, TrafficSliver, which successfully counter today's WFP classifiers with reasonable bandwidth and latency overheads and, thus, make them attractive candidates for adoption in Tor. Through user-controlled splitting of traffic over multiple Tor entry nodes, TrafficSliver limits the data a single entry node can observe and distorts repeatable traffic patterns exploited by WFP attacks. We first propose a network-layer defense, in which we apply the concept of multipathing entirely within the Tor network. We show that our network-layer defense reduces the accuracy from more than 98% to less than 16% for all state-of-the-art WFP attacks without adding any artificial delays or dummy traffic. We further suggest an elegant client-side application-layer defense, which is independent of the underlying anonymization network. By sending single HTTP requests for different web objects over distinct Tor entry nodes, our application-layer defense reduces the detection rate of WFP classifiers by almost 50 percentage points. Although it offers lower protection than our network-layer defense, it provides a security boost at the cost of a very low implementation overhead and is fully compatible with today's Tor network.

[1]  Ian Goldberg,et al.  Network-Based Website Fingerprinting , 2019 .

[2]  Klaus Wehrle,et al.  POSTER: Traffic Splitting to Counter Website Fingerprinting , 2019, CCS.

[3]  Patrick Thiran,et al.  Protecting against Website Fingerprinting with Multihoming , 2020, Proc. Priv. Enhancing Technol..

[4]  Xiang Cai,et al.  CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense , 2014, WPES.

[5]  Srinivas Devadas,et al.  DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows , 2018, WPES@CCS.

[6]  Jiajun Gong,et al.  Zero-delay Lightweight Defenses against Website Fingerprinting , 2020, USENIX Security Symposium.

[7]  Tao Wang,et al.  On Realistically Attacking Tor with Website Fingerprinting , 2016, Proc. Priv. Enhancing Technol..

[8]  Thomas Engel,et al.  Website fingerprinting in onion routing based anonymization networks , 2011, WPES.

[9]  Vern Paxson,et al.  SoK: Towards Grounding Censorship Circumvention in Empiricism , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[10]  Roy T. Fielding,et al.  Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content , 2014, RFC.

[11]  Junhua Yan,et al.  Feature Selection for Website Fingerprinting , 2018, Proc. Priv. Enhancing Technol..

[12]  Tao Wang,et al.  Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.

[13]  Rachel Greenstadt,et al.  A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.

[14]  Ian Goldberg,et al.  The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting , 2013, Privacy Enhancing Technologies.

[15]  George Danezis,et al.  k-fingerprinting: A Robust Scalable Website Fingerprinting Technique , 2015, USENIX Security Symposium.

[16]  Ian Goldberg,et al.  SoK: Making Sense of Censorship Resistance Systems , 2016, Proc. Priv. Enhancing Technol..

[17]  Brijesh Joshi,et al.  Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.

[18]  Micah Sherr,et al.  Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor , 2019, USENIX Security Symposium.

[19]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[20]  Charles V. Wright,et al.  Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.

[21]  Nicholas Hopper,et al.  p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning , 2019, Proc. Priv. Enhancing Technol..

[22]  Andriy Panchenko,et al.  Path Selection Metrics for Performance-Improved Onion Routing , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.

[23]  Shigeki Goto,et al.  Fingerprinting Attack on Tor Anonymity using Deep Learning , 2016 .

[24]  Thomas Engel,et al.  Analysis of Multi-path Onion Routing-Based Anonymization Networks , 2019, DBSec.

[25]  Tao Wang,et al.  Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks , 2017, USENIX Security Symposium.

[26]  Giovanni Cherubin,et al.  Website Fingerprinting Defenses at the Application Layer , 2017, Proc. Priv. Enhancing Technol..

[27]  Roy T. Fielding,et al.  Hypertext Transfer Protocol (HTTP/1.1): Range Requests , 2014, RFC.

[28]  Shuai Li,et al.  Measuring Information Leakage in Website Fingerprinting Attacks and Defenses , 2017, CCS.

[29]  Brian Neil Levine,et al.  Inferring the source of encrypted HTTP connections , 2006, CCS '06.

[30]  Tobias Pulls,et al.  Website Fingerprinting with Website Oracles , 2020, Proc. Priv. Enhancing Technol..

[31]  Thomas Ristenpart,et al.  Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.

[32]  Mohsen Imani,et al.  Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning , 2018, CCS.

[33]  Xiapu Luo,et al.  HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows , 2011, NDSS.

[34]  Andriy Panchenko,et al.  Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing , 2019, 2019 IEEE 27th International Conference on Network Protocols (ICNP).

[35]  Tao Wang,et al.  A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.

[36]  Lei Yang,et al.  mTor: A multipath Tor routing beyond bandwidth throttling , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[37]  Mohammad Saidur Rahman,et al.  Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning , 2019, CCS.

[38]  Klaus Wehrle,et al.  Website Fingerprinting at Internet Scale , 2016, NDSS.

[39]  Tao Wang,et al.  Improved website fingerprinting on Tor , 2013, WPES.

[40]  Wouter Joosen,et al.  Automated Website Fingerprinting through Deep Learning , 2017, NDSS.

[41]  Mike Perry,et al.  Toward an Efficient Website Fingerprinting Defense , 2015, ESORICS.