Tor recently integrated a circuit padding framework for creating padding machines: defenses that work by defining state machines that inject dummy traffic to protect against traffic analysis attacks like Website Fingerprinting (WF) attacks. In this paper, we explore the design of effective and efficient padding machines to defend against WF attacks. Through the use of carefully crafted datasets, a circuit padding simulator, genetic programming, and manual tuning of padding machines we explore different aspects of what makes padding machines effective and efficient defenses. Our final machine, named Interspace, is probabilistically-defined with a tweakable trade-off between efficiency and effectiveness against the state-of-the-art deep-learning WF attack Deep Fingerprinting by Sirinam et al. We show that Interspace can be both more effective and efficient than WTF-PAD by Juarez et al. the padding machine that inspired the design of Tor's circuit padding framework. We end this paper by showing how Interspace can be made less effective, identifying the promising tactic of probabilistically defined padding machines, and highlighting the need to further explore this tactic in more complex defenses.
翻译:托尔最近整合了一个用于创建护垫机的电路垫板框架: 防御系统, 其方法是界定国家机器, 给假交通注入假交通来防范交通分析攻击, 比如网站指纹(WF)攻击。 在本文中, 我们探索了设计高效且高效的护垫机, 以抵御WF攻击。 我们通过使用精心设计的数据集、 电路垫模拟器、 基因编程和人工调整毛垫机, 我们探索了使护垫机有效和高效防御的不同方面。 我们名为 Interspace 的最后一台机器, 以可调适的方式定义, 在对Sirinam 等人的顶级深造指纹(WFTF攻击深度指纹)进行高效和高效的交换。 我们展示了Interspace 是如何使Interspace 变得无效的, 找出了最先进的、 精密的护脚机器的有前途的策略, 并更强调进一步探索这一策略的复杂防御需要。