2020
DOI: 10.2478/popets-2020-0019
|View full text |Cite
|
Sign up to set email alerts
|

Protecting against Website Fingerprinting with Multihoming

Abstract: Anonymous communication tools, such as Tor, are extensively employed by users who want to keep their web activity private. But recent works have shown that when a local, passive adversary observes nothing more than the timestamp, size and direction (incoming or outgoing) of the packets, it can still identify with high accuracy the website accessed by a user. Several defenses against these website fingerprinting attacks have been proposed but they come at the cost of a significant overhead in traffic and/or web… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(21 citation statements)
references
References 47 publications
1
20
0
Order By: Relevance
“…• We consider WF attacks that operate on packet directions 1 . This assumption is consistent with many previous defenses [21,31,34,58,75]. For each u's website session, the attacker collects its trace x u as a sequence of packet directions (i.e., marking each outgoing packet as +1 and each incoming packet as -1).…”
Section: Problem and Threat Modelsupporting
confidence: 66%
See 2 more Smart Citations
“…• We consider WF attacks that operate on packet directions 1 . This assumption is consistent with many previous defenses [21,31,34,58,75]. For each u's website session, the attacker collects its trace x u as a sequence of packet directions (i.e., marking each outgoing packet as +1 and each incoming packet as -1).…”
Section: Problem and Threat Modelsupporting
confidence: 66%
“…In application layer obfuscation, the defender introduces randomness into HTTP requests or the Tor routing algorithm (e.g., [18,21,31]). Application layer defenses generally make strong assumptions that are often unrealistic in practice, such as target websites implementing customized HTTP protocols [18] or only allowing attackers to observe traffic at a single Tor entry node [21,31]. These defenses provide less than 60% protection against DNN-based attacks such as DF and Var-CNN [7,65].…”
Section: Website Fingerprinting Defensesmentioning
confidence: 99%
See 1 more Smart Citation
“…Traffic Splitting defenses defend against WF attacks by splitting traffic between multiple guard nodes so that any individual sub-trace reveals little information about the target web page. The TrafficSliver [18] and Multihoming [23] defenses both use traffic splitting, though their implementations are fairly different. In Multihoming, clients connect through two different access points (e.g.…”
Section: Website Fingerprinting Defensesmentioning
confidence: 99%
“…The scale of tracking motivate re-designing systems to provide privacy guarantees. For example, multihoming can be used to defend against fingerprinting [38] and trusted hardware can ensure compliance to stated privacy policies [39].…”
Section: Privacy Practicesmentioning
confidence: 99%