Website fingerprinting attack is an extensively studied technique used in a web browser to analyze traffic patterns and thus infer confidential information about users. Several website fingerprinting attacks based on machine learning and deep learning tend to use the most typical features to achieve a satisfactory performance of attacking rate. However, these attacks suffer from several practical implementation factors, such as a skillfully pre-processing step or a clean dataset. To defend against such attacks, random packet defense (RPD) with a high cost of excessive network overhead is usually applied. In this work, we first propose a practical filter-assisted attack against RPD, which can filter out the injected noises using the statistical characteristics of TCP/IP traffic. Then, we propose a list-assisted defensive mechanism to defend the proposed attack method. To achieve a configurable trade-off between the defense and the network overhead, we further improve the list-based defense by a traffic splitting mechanism, which can combat the mentioned attacks as well as save a considerable amount of network overhead. In the experiments, we collect real-life traffic patterns using three mainstream browsers, i.e., Microsoft Edge, Google Chrome, and Mozilla Firefox, and extensive results conducted on the closed and open-world datasets show the effectiveness of the proposed algorithms in terms of defense accuracy and network efficiency.
翻译:网站指纹攻击是一种广泛研究的技术,用于网络浏览器分析交通模式,从而推断用户的机密信息。一些基于机器学习和深层次学习的网站指纹攻击往往使用最典型的特征来达到攻击率的令人满意的表现。然而,这些攻击受到若干实际执行因素的影响,例如熟练的预处理步骤或干净的数据集。为了防范这种攻击,通常采用随机包装防御(RPD),其成本过高的网络管理费用过高。在这项工作中,我们首先提议对RPD进行实际的过滤辅助攻击,利用TCP/IP交通的统计特征来过滤注入的噪音。然后,我们提出一个清单辅助的防御机制来保护拟议的攻击方法。为了在国防和网络管理之间实现可配置的权衡交易,我们进一步通过分流机制改进基于清单的防御,这种机制可以打击上述攻击,并节省相当数量的网络管理费用。在实验中,我们利用三个主流浏览器收集真实生活的交通模式,即Microsoft Edge、Google Chrome、Google Chrome 和Mozilla Firefox 数据在开放的准确性网络中,以及拟议的开放数据的效率和透明化结果中进行。</s>