论文标题
监管机构:直接网站指纹防御
RegulaTor: A Straightforward Website Fingerprinting Defense
论文作者
论文摘要
本地无源攻击者使用网站指纹攻击(WF)攻击,以通过比较用户发送并接收到的数据包与先前记录的数据集来确定互联网流量的目的地。结果,WF攻击尤其关注于诸如TOR之类的隐私技术。作为回应,已经开发了各种WF防御,尽管它们倾向于产生高带宽和延迟开销或需要其他基础架构,从而使它们在实践中难以实施。也提出了一些轻巧的防御措施。尽管如此,他们仍然对最近发表的WF攻击仅具有适度的有效性。在本文中,我们旨在提出一种现实和新颖的防御机构,该防御机构利用网络浏览流量中的共同模式,以减少防御开销和当前WF攻击的准确性。在封闭世界的环境中,监管机构降低了最先进的攻击tik-tok的准确性Tik-Tok,对可比的防御措施从66%到25.4%。为了实现这一表现,它需要有限的延迟和带宽的开销,比领先的中度范围防守少39.3%。在开放世界的环境中,监管机构将精确调整的Tik-Tok攻击限制为F-评分为.135,而最佳防御的最佳防御能力为.625。
Website Fingerprinting (WF) attacks are used by local passive attackers to determine the destination of encrypted internet traffic by comparing the sequences of packets sent to and received by the user to a previously recorded data set. As a result, WF attacks are of particular concern to privacy-enhancing technologies such as Tor. In response, a variety of WF defenses have been developed, though they tend to incur high bandwidth and latency overhead or require additional infrastructure, thus making them difficult to implement in practice. Some lighter-weight defenses have been presented as well; still, they attain only moderate effectiveness against recently published WF attacks. In this paper, we aim to present a realistic and novel defense, RegulaTor, which takes advantage of common patterns in web browsing traffic to reduce both defense overhead and the accuracy of current WF attacks. In the closed-world setting, RegulaTor reduces the accuracy of the state-of-the-art attack, Tik-Tok, against comparable defenses from 66% to 25.4%. To achieve this performance, it requires limited added latency and a bandwidth overhead 39.3% less than the leading moderate-overhead defense. In the open-world setting, RegulaTor limits a precision-tuned Tik-Tok attack to an F-score of .135, compared to .625 for the best comparable defense.