DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting

The Onion Router (Tor) is designed to support an anonymous communication through end-to-end encryption. To prevent vulnerability of side channel attacks (e.g. website fingerprinting), dummy packet injection modules have been embedded in Tor to conceal trace patterns that are associated with the individual websites. However, recent study shows that current Website Fingerprinting (WF) defenses still generate patterns that may be captured and recognized by the deep learning technology. In this paper, we conduct in-depth analyses of two state-of-the-art WF defense approaches. Then, based on our new observations and insights, we propose a novel defense mechanism using a per-burst injection technique, called Deep Fingerprinting Defender (DFD), against deep learning-based WF attacks. The DFD has two operation modes, one-way and two-way injection. DFD is designed to break the inherent patterns preserved in Tor user’s traces by carefully injecting dummy packets within every burst. We conducted extensive experiments to evaluate the performance of DFD over both closed-world and open-world settings. Our results demonstrate that these two configurations can successfully break the Tor network traffic pattern and achieve a high evasion rate of 86.02% over one-way client-side injection rate of 100%, a promising improvement in comparison with state-of-the-art adversarial trace’s evasion rate of 60%. Moreover, DFD outperforms the state-of-the-art alternatives by requiring lower bandwidth overhead; 14.26% using client-side injection.

[1]  Noorbakhsh Amiri Golilarz,et al.  Control chart pattern recognition using RBF neural network with new training algorithm and practical features. , 2018, ISA transactions.

[2]  Aziz Mohaisen,et al.  Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks , 2019, 2019 IEEE Conference on Dependable and Secure Computing (DSC).

[3]  Aziz Mohaisen,et al.  Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[4]  Xiang Cai,et al.  CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense , 2014, WPES.

[5]  Ke Liu,et al.  On Improving TCP Performance over Mobile Data Networks , 2016, IEEE Transactions on Mobile Computing.

[6]  Thomas Ristenpart,et al.  Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.

[7]  Hannes Federrath,et al.  Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier , 2009, CCSW '09.

[8]  Thomas Engel,et al.  Website fingerprinting in onion routing based anonymization networks , 2011, WPES.

[9]  Aziz Mohaisen,et al.  Subgraph-Based Adversarial Examples Against Graph-Based IoT Malware Detection Systems , 2019, CSoNet.

[10]  Tao Wang,et al.  Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks , 2017, USENIX Security Symposium.

[11]  Tao Wang,et al.  Improved website fingerprinting on Tor , 2013, WPES.

[12]  Wouter Joosen,et al.  Automated Website Fingerprinting through Deep Learning , 2017, NDSS.

[13]  Mohsen Imani,et al.  Adversarial Traces for Website Fingerprinting Defense , 2018, CCS.

[14]  Mohsen Guizani,et al.  Deep CNN-Based Real-Time Traffic Light Detector for Self-Driving Vehicles , 2020, IEEE Transactions on Mobile Computing.

[15]  George Danezis,et al.  k-fingerprinting: A Robust Scalable Website Fingerprinting Technique , 2015, USENIX Security Symposium.

[16]  Mark Allman,et al.  On the generation and use of TCP acknowledgments , 1998, CCRV.

[17]  Mohsen Imani,et al.  Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning , 2018, CCS.

[18]  Mike Perry,et al.  Toward an Efficient Website Fingerprinting Defense , 2015, ESORICS.

[19]  Tao Wang,et al.  On Realistically Attacking Tor with Website Fingerprinting , 2016, Proc. Priv. Enhancing Technol..

[20]  Rachel Greenstadt,et al.  A Critical Evaluation of Website Fingerprinting Attacks , 2014, CCS.

[21]  Srinivas Devadas,et al.  DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows , 2018, WPES@CCS.

[22]  Tao Wang,et al.  A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses , 2014, CCS.

[23]  Vitaly Shmatikov,et al.  Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.

[24]  Aziz Mohaisen,et al.  AMAL: High-fidelity, behavior-based automated malware analysis and classification , 2014, Comput. Secur..

[25]  Brijesh Joshi,et al.  Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.

[26]  Shigeki Goto,et al.  Fingerprinting Attack on Tor Anonymity using Deep Learning , 2016 .

[27]  Aziz Mohaisen,et al.  Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach , 2019, IEEE Internet of Things Journal.

[28]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[29]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[30]  Klaus Wehrle,et al.  Website Fingerprinting at Internet Scale , 2016, NDSS.

[31]  Sanggil Kang,et al.  Code authorship identification using convolutional neural networks , 2019, Future Gener. Comput. Syst..

[32]  Tao Wang,et al.  Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.

[33]  Yoshua. Bengio,et al.  Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..

[34]  Aziz Mohaisen,et al.  Large-Scale and Language-Oblivious Code Authorship Identification , 2018, CCS.