Website fingerprinting (WF) attacks, usually conducted with the help of a machine learning-based classifier, enable a network eavesdropper to pinpoint which web page a user is accessing through the inspection of traffic patterns. These attacks have been shown to succeed even when users browse the Internet through encrypted tunnels, e.g., through Tor or VPNs. To assess the security of new defenses against WF attacks, recent works have proposed feature-dependent theoretical frameworks that estimate the Bayes error of an adversary's features set or the mutual information leaked by manually-crafted features. Unfortunately, as state-of-the-art WF attacks increasingly rely on deep learning and latent feature spaces, security estimations based on simpler (and less informative) manually-crafted features can no longer be trusted to assess the potential success of a WF adversary in defeating such defenses. In this work, we propose DeepSE-WF, a novel WF security estimation framework that leverages specialized kNN-based estimators to produce Bayes error and mutual information estimates from learned latent feature spaces, thus bridging the gap between current WF attacks and security estimation methods. Our evaluation reveals that DeepSE-WF produces tighter security estimates than previous frameworks, reducing the required computational resources to output security estimations by one order of magnitude.
翻译:通常在机器学习分类器的帮助下进行的网站指纹(WF)攻击,使网络窃听器能够通过检查交通模式确定用户访问的网页。即使用户通过加密隧道浏览互联网,例如通过Tor或VPNs浏览互联网,这些攻击也证明是成功的。为了评估新防御系统在抵抗WF攻击方面的安全性,最近的一些工作提出了基于地物的理论框架,以估计对手的特征的贝耶斯错误或人工制作的特征泄露的相互信息。不幸的是,由于最先进的WF攻击越来越依赖深层次的学习和潜在特征空间,因此基于更简单(信息较少)人工制作的特征的安全估计不再能够被信任到评估UNFCF在击败这种防御方面的潜在成功性。在这项工作中,我们提议了DeepSE-WFS-FS这个新的安全估计框架,利用专门的KNNS估计器生成贝耶斯错误和从所学到的潜在地物空间的相互信息估计,从而缩小了当前FFS攻击和安全程度所需的一种估算方法。我们用更精确的估算方法来估计安全程度。