Title
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning.
Abstract
Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we present Deep Fingerprinting (DF), a new website fingerprinting attack against Tor that leverages a type of deep learning called Convolutional Neural Networks (CNN) with a sophisticated architecture design, and we evaluate this attack against WTF-PAD and Walkie-Talkie. The DF attack attains over 98% accuracy on Tor traffic without defenses, better than all prior attacks, and it is also the only attack that is effective against WTF-PAD with over 90% accuracy. Walkie-Talkie remains effective, holding the attack to just 49.7% accuracy. In the more realistic open-world setting, our attack remains effective, with 0.99 precision and 0.94 recall on undefended traffic. Against traffic defended with WTF-PAD in this setting, the attack still can get 0.96 precision and 0.68 recall. These findings highlight the need for effective defenses that protect against this new attack and that could be deployed in Tor.
Year
DOI
Venue
2018
10.1145/3243734.3243768
ACM Conference on Computer and Communications Security
Keywords
DocType
Volume
Tor, privacy, website fingerprinting, deep learning
Conference
abs/1801.02265
ISBN
Citations 
PageRank 
978-1-4503-5693-0
21
0.83
References 
Authors
26
4
Name
Order
Citations
PageRank
Payap Sirinam1251.58
Mohsen Imani234148.13
Marc Juarez331614.57
Matthew Wright478060.07