Abstract
Website fingerprinting (WFP) attacks threaten user privacy on anonymity networks because they can be used by network surveillants to identify webpages that are visited by users based on extracted features from the network traffic. There are currently defenses to reduce the threat of WFP, but these defense measures have some defects; some defenses are too expensive to deploy, and some have been defeated by stronger WFP attack methods. In this work, we propose a lightweight application layer defense method, RAP, which can resist current WFP attacks with very low data and latency overheads; more importantly, it is easy to deploy. We randomly deploy important resource files, such as JS and CSS, to multiple Tor OR servers in advance and update them regularly. By randomly scrambling the resource request order, a single request is sent and received through multiple independent paths with different Tor entry ORs. To randomize the traffic distribution, users randomly obtain the website resource files directly from the Tor node server, rather than from the original server, when browsing the website. In this way, the best attack accuracy is reduced from 98% to 53%. Additionally, to confuse the traffic, we request a small amount of additional HTML text instead of the whole website resources, which reduces the effect of state-of-the-art WFP attacks to 40% with 13% data overhead and 31% latency overhead.
Supported by the National Natural Science Foundation of China (62072359, 62072352), the National Key Research and Development Project (2017YFB0801805).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bhat, S., Lu, D., Kwon, A., Devadas, S.: Var-cnn: a data-efficient website fingerprinting attack based on deep learning. Proc. Priv. Enhanc. Technol. 4, 292–310 (2019)
De la Cadena, W., et al.: Trafficsliver: fighting website fingerprinting attacks with traffic splitting. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1971–1985 (2020)
Cai, X., Nithyanand, R., Johnson, R.: Cs-buflo: a congestion sensitive website fingerprinting defense. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 121–130 (2014)
Cai, X., Nithyanand, R., Wang, T., Johnson, R., Goldberg, I.: A systematic approach to developing and evaluating website fingerprinting defenses. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 227–238 (2014)
Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp. 605–616 (2012)
Cherubin, G., Hayes, J., Juarez, M.: Website fingerprinting defenses at the application layer. Proc. Priv. Enhanc. Technol. 2017(2), 186–203 (2017)
Cui, W., Chen, T., Fields, C., Chen, J., Sierra, A., Chan-Tin, E.: Revisiting assumptions for website fingerprinting attacks. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 328–339 (2019)
Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: why efficient traffic analysis countermeasures fail. In: 2012 IEEE Symposium on Security and Privacy, pp. 332–346. IEEE (2012)
Gong, J., Wang, T.: Zero-delay lightweight defenses against website fingerprinting. In: 29th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 20), pp. 717–734 (2020)
Hayes, J., Danezis, G.: k-fingerprinting: a robust scalable website fingerprinting technique. In: 25th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 16), pp. 1187–1203 (2016)
Juarez, M., Afroz, S., Acar, G., Diaz, C., Greenstadt, R.: A critical evaluation of website fingerprinting attacks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 263–274 (2014)
Juarez, M., Imani, M., Perry, M., Diaz, C., Wright, M.: Toward an efficient website fingerprinting defense. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 27–46. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45744-4_2
Nithyanand, R., Cai, X., Johnson, R.: Glove: a bespoke website fingerprinting defense. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 131–134 (2014)
Panchenko, A., et al.: Website fingerprinting at internet scale. In: NDSS (2016)
Rimmer, V., Preuveneers, D., Juarez, M., Van Goethem, T., Joosen, W.: Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376 (2017)
Sirinam, P., Imani, M., Juarez, M., Wright, M.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1928–1943 (2018)
Sun, J., Wang, X., Xiong, N., Shao, J.: Learning sparse representation with variational auto-encoder for anomaly detection. IEEE Access 33353–33361 (2018)
Syverson, P., Dingledine, R., Mathewson, N.: Tor: the secondgeneration onion router. In: Usenix Security, pp. 303–320 (2004)
Wang, T., Cai, X., Nithyanand, R., Johnson, R., Goldberg, I.: Effective attacks and provable defenses for website fingerprinting. In: 23rd \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 14), pp. 143–157 (2014)
Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 201–212 (2013)
Wang, T., Goldberg, I.: On realistically attacking tor with website fingerprinting. Proc. Priv. Enhanc. Technol. 4, 21–36 (2016)
Wang, T., Goldberg, I.: Walkie-talkie: an efficient defense against passive website fingerprinting attacks. In: 26th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 17), pp. 1375–1390 (2017)
Xu, Y., Wang, T., Li, Q., Gong, Q., Chen, Y., Jiang, Y.: A multi-tab website fingerprinting attack. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 327–341 (2018)
Yang, L., Li, C., Wei, T., Zhang, F., Ma, J., Xiong, N.: Vacuum: an efficient and assured deletion scheme for user sensitive data on mobile devices. IEEE Internet Things J. 1 (2021)
Yi, B., et al.: Deep matrix factorization with implicit feedback embedding for recommendation system. IEEE Trans. Ind. Inf. 15(8), 4591–4601 (2019)
Zhang, J., Yang, L., Yu, S., Ma, J.: A dns tunneling detection method based on deep learning models to prevent data exfiltration. In: Liu, J.K., Huang, X. (eds.) NSS 2019. LNCS, vol. 11928, pp. 520–535. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36938-5_32
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhang, Y., Yang, L., Jia, J., Ying, S., Zhou, Y. (2022). RAP: A Lightweight Application Layer Defense Against Website Fingerprinting. In: Shi, W., Chen, X., Choo, KK.R. (eds) Security and Privacy in New Computing Environments. SPNCE 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 423. Springer, Cham. https://doi.org/10.1007/978-3-030-96791-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-96791-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96790-1
Online ISBN: 978-3-030-96791-8
eBook Packages: Computer ScienceComputer Science (R0)