A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning
Abstract
:1. Introduction
- We first propose a new convolutional neural network-based website fingerprinting attack (CWFA) scheme. It integrates both package direction and time sequence information. It can alleviate the decline of accuracy and resist common defense strategies, when compared with existing attacks.
- We then design a fine-tuning mechanism for the proposed CWFA scheme. The proposed FM-CWFA scheme can tackle the irregular changes of the statistical features.
- Systematic experiments show that the decline of the performance in the CWFA scheme is the slowest due to the decreasing of the training data, while the FM-CWFA scheme is still valid even if the training and testing data are collected three years apart.
2. Related Works
2.1. The WF Attack
2.2. The WF Defense
2.3. Website Fingerprint Selection
3. Preliminaries
3.1. The CNN Model
3.2. Transfer Learning
3.3. Loss Function
4. Background
4.1. Definitions
4.2. Problem Statement
5. Problem Analysis
6. Website Fingerprinting Attack via CNN
6.1. System Overview
6.2. The CNN-Based WFA Scheme
6.3. The Fine-Tuning-Based CWFA Scheme
7. Evaluation
7.1. Setting
7.2. Dataset
7.3. Evaluation Metrics
7.4. The Evaluation of the CWFA Scheme
7.4.1. Closed-World Setting
7.4.2. Open-World Setting
7.5. The Evaluation of the FM-CWFA Scheme
7.5.1. Closed-World Setting
7.5.2. Open-World Setting
7.6. Technical Evidence and Explanation of the Success
7.6.1. Analysis of Features and Model Architecture
7.6.2. Analysis of Features Sequence Information
8. Discussion
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Dingledine, R.; Mathewson, N.; Syverson, P.F. Tor: The Second-Generation Onion Router. In Proceedings of the USENIX Security Symposium, San Diego, CA, USA, 9–13 August 2004; pp. 303–320. [Google Scholar]
- Wang, T.; Cai, X.; Nithyanand, R.; Johnson, R.; Goldberg, I. Effective attacks and provable defenses for website fingerprinting. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA, 20–22 August 2014; pp. 143–157. [Google Scholar]
- Panchenko, A.; Lanze, F.; Pennekamp, J.; Engel, T.; Zinnen, A.; Henze, M.; Wehrle, K. Website Fingerprinting at Internet Scale. In Proceedings of the NDSS, San Diego, CA, USA, 21–24 February 2016. [Google Scholar]
- Hayes, J.; Danezis, G. k-fingerprinting: A Robust Scalable Website Fingerprinting Technique. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016; pp. 1187–1203. [Google Scholar]
- Abe, K.; Goto, S. Fingerprinting attack on Tor anonymity using deep learning. Proc. Asia-Pac. Adv. Netw. 2016, 42, 15–20. [Google Scholar]
- Rimmer, V.; Preuveneers, D.; Juarez, M.; van Goethem, T.; Joosen, W. Automated Website Fingerprinting through Deep Learning. In Proceedings of the 25th Annual Network and Distributed System Security Symposium, NDSS, San Diego, CA, USA, 18–21 February 2018; pp. 18–21. [Google Scholar]
- Sirinam, P.; Imani, M.; Juarez, M.; Wright, M. Deep fingerprinting: Undermining website fingerprinting defenses with deep learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 1928–1943. [Google Scholar]
- Juarez, M.; Afroz, S.; Acar, G.; Diaz, C.; Greenstadt, R. A critical evaluation of website fingerprinting attacks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; pp. 263–274. [Google Scholar]
- Sirinam, P.; Mathews, N.; Rahman, M.S.; Wright, M. Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 1131–1148. [Google Scholar]
- Wang, C.; Dani, J.; Li, X.; Jia, X.; Wang, B. Adaptive fingerprinting: Website fingerprinting over few encrypted traffic. In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event USA, 26–28 April 2021; pp. 149–160. [Google Scholar]
- Chen, M.; Wang, Y.; Qin, Z.; Zhu, X. Few-shot website fingerprinting attack with data augmentation. Secur. Commun. Netw. 2021, 2021, 2840289. [Google Scholar] [CrossRef]
- Juarez, M.; Imani, M.; Perry, M.; Diaz, C.; Wright, M. Toward an efficient website fingerprinting defense. In Proceedings of the European Symposium on Research in Computer Security, Heraklion, Greece, 26–30 September 2016; pp. 27–46. [Google Scholar]
- Gong, J.; Wang, T. Zero-delay lightweight defenses against website fingerprinting. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, 12–14 August 2020; pp. 717–734. [Google Scholar]
- Dyer, K.P.; Coull, S.E.; Ristenpart, T.; Shrimpton, T. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 20–23 May 2012; pp. 332–346. [Google Scholar]
- Cai, X.; Nithyanand, R.; Wang, T.; Johnson, R.; Goldberg, I. A systematic approach to developing and evaluating website fingerprinting defenses. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; pp. 227–238. [Google Scholar]
- Cai, X.; Nithyanand, R.; Johnson, R. Cs-buflo: A congestion sensitive website fingerprinting defense. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, Scottsdale, AZ, USA, 3 November 2014; pp. 121–130. [Google Scholar]
- Wang, T.; Goldberg, I. Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver BC Canada, 16–18 August 2017; pp. 1375–1390. [Google Scholar]
- Herrmann, D.; Wendolsky, R.; Federrath, H. Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, IL, USA, 13 November 2009; pp. 31–42. [Google Scholar]
- Panchenko, A.; Niessen, L.; Zinnen, A.; Engel, T. Website fingerprinting in onion routing based anonymization networks. In Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, Chicago, IL, USA, 17 October 2011; pp. 103–114. [Google Scholar]
- Bhat, S.; Lu, D.; Kwon, A.; Devadas, S. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning. Proc. Priv. Enhancing Technol. 2019, 2019, 292–310. [Google Scholar] [CrossRef]
- Simonyan, K.; Zisserman, A. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv 2015, arXiv:1409.1556. [Google Scholar]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar]
- Chen, M.; Wang, Y.; Xu, H.; Zhu, X. Few-shot website fingerprinting attack. Comput. Netw. 2021, 198, 108298. [Google Scholar] [CrossRef]
- Rahman, M.S.; Sirinam, P.; Mathews, N.; Gangadhara, K.G.; Wright, M.K. Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. Proc. Priv. Enhancing Technol. 2020, 2020, 5–24. [Google Scholar] [CrossRef]
- Yin, Q.; Liu, Z.; Li, Q.; Wang, T.; Wang, Q.; Shen, C.; Xu, Y. Automated Multi-Tab Website Fingerprinting Attack. IEEE Trans. Dependable Secur. Comput. 2021, 19, 3656–3670. [Google Scholar] [CrossRef]
- Cui, W.; Chen, T.; Fields, C.; Chen, J.; Sierra, A.; Chan-Tin, E. Revisiting assumptions for website fingerprinting attacks. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, Auckland, New Zealand, 9–12 July 2019; pp. 328–339. [Google Scholar]
- Wang, T.; Goldberg, I. On Realistically Attacking Tor with Website Fingerprinting. Proc. Priv. Enhancing Technol. 2016, 2016, 21–36. [Google Scholar] [CrossRef]
- Wang, T. High precision open-world website fingerprinting. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 18–20 May 2020; pp. 152–167. [Google Scholar]
Hyperparameters | Search Range | Final |
---|---|---|
Optimizer | [Adam, Adamax, SGD] | SGD |
Learning Rate | [0.001…0.01] | 0.005 |
Training Epochs | [20…50] | 30 |
Batch Size | [16…256] | [32…128] |
Activation Functions | [Tanh, ReLU, GELU] | [GELU] |
Number of Filters | ||
Block1_d[Conv1_d, Conv2_d] | [16…64] | [32, 32] |
Block1_t[Conv1_t, Conv2_t] | [16…64] | [32, 32] |
Block2[Conv3, Conv4] | [64…128] | [64, 64] |
Block3[Conv5, Conv6] | [64…256] | [128, 128] |
Block4[Conv7, Conv8] | [128…512] | [256, 256] |
Block5[Conv9, Conv10] | [256…1024] | [512, 512] |
Pooling Layers | [Average, Max] | Average |
Dropout [Block, FC] | [0.1…0.7] | [0.1, 0.5] |
Fine-Tuning Learning Rate | [0.0001…0.1] | [0.0005, 0.01] |
Dataset | Number of Traces | ||||
---|---|---|---|---|---|
1 | 5 | 10 | 15 | 20 | |
Undefended | 12.0 | 71.8 | 86.6 | 91.2 | 93.3 |
WTF-PAD | 6.1 | 44.5 | 71.7 | 80.0 | 83.8 |
FRONT | 5.0 | 22.7 | 41.5 | 56.0 | 66.7 |
Dataset | Methods | Number of Traces | ||||
---|---|---|---|---|---|---|
1 | 5 | 10 | 15 | 20 | ||
Undefended | TF | 40.2 | 59.8 | 64.7 | 67.4 | 67.5 |
AF | 24.3 | 63.1 | 74.5 | 84.7 | 85.4 | |
TLFA* | 51.8 | 76.8 | 83.9 | 86.7 | 88.1 | |
FM-CWFA | 52.2 | 81.8 | 88.6 | 92.2 | 93.3 | |
WTF-PAD | TF | 15.1 | 31.5 | 34.3 | 36.3 | 38.0 |
AF | 7.9 | 27.4 | 38.1 | 52.4 | 55.7 | |
TLFA* | 31.9 | 60.1 | 68.2 | 72.4 | 74.0 | |
FM-CWFA | 36.5 | 70.3 | 79.2 | 83.5 | 85.4 | |
FRONT | TF | 8.7 | 13.4 | 15.8 | 16.7 | 17.3 |
AF | 4.1 | 15.0 | 22.3 | 33.8 | 35.4 | |
TLFA* | 16.7 | 36.5 | 45.7 | 50.0 | 52.7 | |
FM-CWFA | 17.5 | 45.0 | 62.0 | 69.6 | 73.8 |
Setting | Dataset | ||
---|---|---|---|
Undefended | WTF-PAD | FRONT | |
Setting1-direction | 97.3 | 89.0 | 80.2 |
Setting1-timing | 95.9 | 89.3 | 89.8 |
Setting2 | 96.9 | 90.2 | 87.3 |
Setting3 | 98.2 | 93.8 | 91.9 |
Setting4-add | 97.7 | 95.4 | 93.4 |
Setting4-multiply | 98.3 | 95.4 | 92.2 |
Setting4-concat | 98.5 | 95.6 | 93.6 |
Dataset | Methods | Normal | Random |
---|---|---|---|
Undefended | DF | 0.89 | 0.30 |
Var-CNN | 0.96 | 0.48 | |
CWFA | 0.97 | 0.52 | |
WTF-PAD | DF | 0.73 | 0.14 |
Var-CNN | 0.86 | 0.25 | |
CWFA | 0.94 | 0.29 | |
FRONT | DF | 0.55 | 0.06 |
Var-CNN | 0.86 | 0.17 | |
CWFA | 0.89 | 0.15 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pan, T.; Tang, Z.; Xu, D. A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning. Mathematics 2023, 11, 4078. https://doi.org/10.3390/math11194078
Pan T, Tang Z, Xu D. A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning. Mathematics. 2023; 11(19):4078. https://doi.org/10.3390/math11194078
Chicago/Turabian StylePan, Tianyao, Zejia Tang, and Dawei Xu. 2023. "A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning" Mathematics 11, no. 19: 4078. https://doi.org/10.3390/math11194078
APA StylePan, T., Tang, Z., & Xu, D. (2023). A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning. Mathematics, 11(19), 4078. https://doi.org/10.3390/math11194078