Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
Recent advancements in deep learning (DL) have introduced new security challenges in the form of side-channel attacks. A prime example is the website fingerprinting attack (WFA), which targets anonymity networks like Tor, enabling attackers to unveil users’ protected browsing activities from traffic data. While state-of-the-art WFAs have achieved remarkable results, they often rely on unrealistic single-website assumptions. In this paper, we undertake an exhaustive exploration of multi-tab website fingerprinting attacks (MTWFAs) in more realistic scenarios. We delve into MTWFAs and introduce MTWFA-SEG, a task involving the fine-grained packet-level classification within multi-tab Tor traffic. By employing deep learning models, we reveal their potential to threaten user privacy by discerning visited websites and browsing session timing. We design an improved fully convolutional model for MTWFA-SEG, which are enhanced by both network architecture advances and traffic data instincts. In the evaluations on interlocking browsing datasets, the proposed models achieve remarkable accuracy rates of over 68.6%, 71.8%, and 76.1% in closed, imbalanced open, and balanced open-world settings, respectively. Furthermore, the proposed models exhibit substantial robustness across diverse train-test settings. We further validate our designs in a coarse-grained task, MTWFA-MultiLabel, where they not only achieve state-of-the-art performance but also demonstrate high robustness in challenging situations.
F. Buccafurri, V. De Angelis, M. F. Idone, C. Labrini, and S. Lazzaro, Achieving sender anonymity in tor against the global passive adversary, Appl. Sci., vol. 12, no. 1, p. 137, 2021.
J. Huang, Q. Huang, and W. Susilo, Leakage-resilient Group signature: Definitions and constructions, Inf. Sci., vol. 509, pp. 119–132, 2020.
H. Yin, Y. Liu, Y. Li, Z. Guo, and Y. Wang, Defeating deep learning based de-anonymization attacks with adversarial example, J. Netw. Comput. Appl., vol. 220, p. 103733, 2023.
S. Bhat, D. Lu, A. Kwon, and S. Devadas, Var-CNN: A data-efficient website fingerprinting attack based on deep learning, Proc. Priv. Enhancing Technol., vol. 2019, no. 4, pp. 292–310, 2019.
M. Chen, Y. Wang, H. Xu, and X. Zhu, Few-shot website fingerprinting attack, Comput. Netw., vol. 198, p. 108298, 2021.
M. Chen, Y. Wang, and X. Zhu, Few-shot website fingerprinting attack with meta-bias learning, Pattern Recognit., vol. 130, p. 108739, 2022.
Q. Yin, Z. Liu, Q. Li, T. Wang, Q. Wang, C. Shen, and Y. Xu, An automated multi-tab website fingerprinting attack, IEEE Trans. Dependable Secure Comput., vol. 19, no. 6, pp. 3656–3670, 2022.
A. Montieri, D. Ciuonzo, G. Aceto, and A. Pescapé, Anonymity services tor, I2P, JonDonym: Classifying in the dark (web), IEEE Trans. Dependable Secure Comput., vol. 17, no. 3, pp. 662–675, 2020.
A. Montieri, D. Ciuonzo, G. Bovenzi, V. Persico, and A. Pescapé, A dive into the dark web: Hierarchical traffic classification of anonymity tools, IEEE Trans. Netw. Sci. Eng., vol. 7, no. 3, pp. 1043–1054, 2020.
A. Nascita, A. Montieri, G. Aceto, D. Ciuonzo, V. Persico, and A. Pescapé, Improving performance, reliability, and feasibility in multimodal multitask traffic classification with XAI, IEEE Trans. Netw. Serv. Manag., vol. 20, no. 2, pp. 1267–1289, 2023.
M. S. Rahman, P. Sirinam, N. Mathews, K. G. Gangadhara, and M. Wright, Tik-Tok: The utility of packet timing in website fingerprinting attacks, Proc. Priv. Enhancing Technol., vol. 2020, no. 3, pp. 5–24, 2020.
S. Hochreiter and J. Schmidhuber, Long short-term memory, Neural Comput., vol. 9, no. 8, pp. 1735–1780, 1997.
L. Dritsoula, P. Loiseau, and J. Musacchio, A game-theoretic analysis of adversarial classification, IEEE Trans. Inf. Forensics Secur., vol. 12, no. 12, pp. 3094–3109, 2017.
P. Addesso, M. Barni, M. Di Mauro, and V. Matta, Adversarial Kendall’s model towards containment of distributed cyber-threats, IEEE Trans. Inf. Forensics Secur., vol. 16, pp. 3604–3619, 2021.
L. Zhang, T. Zhu, F. K. Hussain, D. Ye, and W. Zhou, A game-theoretic method for defending against advanced persistent threats in cyber systems, IEEE Trans. Inf. Forensics Secur., vol. 18, pp. 1349–1364, 2022.
436
Views
65
Downloads
0
Crossref
0
Web of Science
0
Scopus
0
CSCD
Altmetrics
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).