90 Hits in 7.0 sec

Snoopy: A Webpage Fingerprinting Framework with Finite Query Model for Mass-Surveillance [article]

Gargi Mitra, Prasanna Karthik Vairam, Sandip Saha, Nitin Chandrachoodan, V. Kamakoti
2022 arXiv   pre-print
Webpage fingerprinting, an attack that analyzes encrypted traffic, can identify the webpages visited by a user in a given website.  ...  Internet users are vulnerable to privacy attacks despite the use of encryption.  ...  However, more fine-grained information such as the identity of webpages (a website can have many webpages) visited by the users on a targeted website could be much more useful to the attackers.  ... 
arXiv:2205.15037v1 fatcat:e2kaxje46bc6xhecfqex4ggqau

The web browser factor in traffic analysis attacks

Sami Zhioua
2015 Security and Communication Networks  
To this end, five fine-grained measures are used to point out very subtle differences in the network traffic of each web browser.  ...  Website fingerprinting is a known type of traffic analysis attacks that aims to identify which websites are visited in encrypted traffic traces.  ...  It is very similar to the previous measure (OOV) but is more fine grained because the focus is on the packet orders rather than the object orders.  ... 
doi:10.1002/sec.1338 fatcat:jcy2odc3ijctpov7vcas63feqe

Machine Learning Interpretability Meets TLS Fingerprinting [article]

Mahdi Jafari Siavoshani, Amir Hossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri
2021 arXiv   pre-print
Therefore, investigating and understanding how data is leaked from the information transmission platforms and protocols can lead us to a more secure environment.  ...  Protecting users' privacy over the Internet is of great importance; however, it becomes harder and harder to maintain due to the increasing complexity of network protocols and components.  ...  Shen et al. in [49] presented a method based on cumulative lengths of first 100 packets of each flow in order to do fine-grained webpage fingerprinting using a k-Nearest Neighbor (k-NN) classifier, enabling  ... 
arXiv:2011.06304v2 fatcat:gb3memyoivhtbnkx5fxrwu4ibu

Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail

Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton
2012 2012 IEEE Symposium on Security and Privacy  
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the identity of websites visited by a user.  ...  As just one of our results, we show that despite the use of traffic morphing, one can use only total upstream and downstream bandwidth to identifywith 98% accuracy-which of two websites was visited.  ...  Hiding packet lengths is not sufficient. We initiate a study of classifiers that do not directly use fine-grained features such as individual packet lengths.  ... 
doi:10.1109/sp.2012.28 dblp:conf/sp/DyerCRS12 fatcat:fqyqccivevfhnfbnztg6keexgq

Fingerprinting Search Keywords over HTTPS at Scale [article]

Junhua Yan, Hasan Faik Alan, Jasleen Kaur
2020 arXiv   pre-print
Our analysis reveals several insights into the threat of keyword fingerprinting in modern HTTPS traffic.  ...  In this work, we consider the problem of keyword fingerprinting of HTTPS traffic -- we study the impact of several factors, including client platform diversity, choice of search engine, feature sets as  ...  Since EtResp and k-FP use more coarse-grained features such as statistical derivatives of number of packets (versus fine-grained features such as packet size count used in PSC and Wfin++), their performance  ... 
arXiv:2008.08161v1 fatcat:z7r4dpknkvafzni5km7bkmspz4

Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware

Eva Papadogiannaki, Sotiris Ioannidis
2021 Sensors  
We generate signatures using only network packet metadata extracted from packet headers.  ...  More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing.  ...  This publication reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.  ... 
doi:10.3390/s21041140 pmid:33562000 fatcat:cfsytoioujeohglyusbem76ygy

Feature Selection for Website Fingerprinting

Junhua Yan, Jasleen Kaur
2018 Proceedings on Privacy Enhancing Technologies  
Prior work has focused only on a limited set of features, and does not help understand the extents of fingerprint-ability.  ...  Website fingerprinting based on TCP/IP headers is of significant relevance to several Internet entities.  ...  Grouping semantically-similar features: In contrast to [33] , we do not focus on analyzing the importance of each fine-grained feature (such as the maximum packet size and median packet size) in a traffic  ... 
doi:10.1515/popets-2018-0039 dblp:journals/popets/YanK18 fatcat:pfob4jq7xnba3giqatx2gh45fa

A Survey on Analyzing Encrypted Network Traffic of Mobile Devices [article]

Ashutosh Bhatiaa, Ankit AgrawalaAyush Bahugunaa, Kamlesh Tiwaria, K. Haribabua, Deepak Vishwakarmab
2020 arXiv   pre-print
However, it has been found that the amount and nature of incoming and outgoing traffic to a mobile device could reveal a significant amount of information that can be used to identify the activities performed  ...  To that end, researchers are trying to develop techniques to classify encrypted mobile traffic at different levels of granularity, with the objectives of performing mobile user profiling, network performance  ...  This research was supported by the Center for Artificial Intelligence and Robotics (CAIR) lab of Defence Research and Development Organisation (DRDO), India, Bangalore under the CARS scheme.  ... 
arXiv:2006.12352v1 fatcat:cysjaqpqdfbxjn7b2gsy6gyelu

Fingerprinting Keywords in Search Queries over Tor

Se Eun Oh, Shuai Li, Nicholas Hopper
2017 Proceedings on Privacy Enhancing Technologies  
We show that by augmenting traffic analysis using a two-stage approach with new task-specific feature sets, a passive network adversary can in many cases defeat the use of Tor to protect search engine  ...  Search engine queries contain a great deal of private and potentially compromising information about users.  ...  Side Channel Attacks and Defenses on Encrypted Network Traffic The idea of inferring meaningful information based on analyzing encrypted SSL packets was introduced in 1996 [41] .  ... 
doi:10.1515/popets-2017-0048 dblp:journals/popets/OhLH17 fatcat:r7ogvb2nprds3my5asr4k7cegq

Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices

Dilawer Ahmed, Anupam Das, Fareed Zaffar
2022 Proceedings on Privacy Enhancing Technologies  
Researchers have, therefore, looked at fingerprinting loT devices and their activities from encrypted network traffic.  ...  In recent years, we have seen rapid growth in the use and adoption of Internet of Things (IoT) devices.  ...  Wright et al. [59] suggest the use of traffic morphing to mitigate the risk of packet length-based inference techniques.  ... 
doi:10.2478/popets-2022-0057 fatcat:i4gegnn2svebriup3al7q5vsxa

Website Detection Using Remote Traffic Analysis [chapter]

Xun Gong, Nikita Borisov, Negar Kiyavash, Nabil Schear
2012 Lecture Notes in Computer Science  
Recent work in traffic analysis has shown that traffic patterns leaked through side channels can be used to recover important semantic information.  ...  To demonstrate the threat of such remote traffic analysis, we study a remote website detection attack that works against home broadband users.  ...  We identify a queuing side channel that can be used to infer the queue size of a given link with good accuracy and thus monitor traffic patterns.  ... 
doi:10.1007/978-3-642-31680-7_4 fatcat:nyb6rnozfzakvnawms3jhoriva

Website Detection Using Remote Traffic Analysis [article]

Xun Gong, Negar Kiyavash, Nabíl Schear, Nikita Borisov
2011 arXiv   pre-print
Recent work in traffic analysis has shown that traffic patterns leaked through side channels can be used to recover important semantic information.  ...  To demonstrate the threat of such remote traffic analysis, we study a remote website detection attack that works against home broadband users.  ...  Note that these techniques relied on detecting a specially-crafted coarse-grained communication pattern, whereas our attacks make use of fine-grained information obtained through remote traffic analysis  ... 
arXiv:1109.0097v1 fatcat:xheg2phwpbbgffkwlnwlcorzau

Beauty and the Burst: Remote Identification of Encrypted Video Streams

Roei Schuster, Vitaly Shmatikov, Eran Tromer
2017 USENIX Security Symposium  
The MPEG-DASH streaming video standard contains an information leak: even if the stream is encrypted, the segmentation prescribed by the standard causes contentdependent packet bursts.  ...  Further, neural networks are flexible and can leverage information from the low-level features, such as packet lengths, as well as sequences of burst sizes (as estimated from encrypted traffic).  ...  second (PPS), and down/up/all average packet length (PLEN).  ... 
dblp:conf/uss/SchusterST17 fatcat:kmmnhbm27ncptdkf6ldp7tiwyq

Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels [article]

Ryan Shah, Chuadhry Mujeeb Ahmed, Shishir Nagaraja
2022 arXiv   pre-print
While there exists mandates for the use of end-to-end encryption for data transmission in such settings, it is entirely possible for passive adversaries to fingerprint and reconstruct entire workflows  ...  Using a neural network approach to traffic analysis, we find that one can predict TLS-encrypted movements with around \textasciitilde60\% accuracy, increasing to near-perfect accuracy under realistic network  ...  Measurement System of the UK Department of Business, Energy & Industrial Strategy, which funded this work as part of NPL's Data Science program.  ... 
arXiv:2205.08426v1 fatcat:lp46unx4ljgc3o4uctl6o5b65i

Website Fingerprinting Defenses at the Application Layer

Giovanni Cherubin, Jamie Hayes, Marc Juarez
2017 Proceedings on Privacy Enhancing Technologies  
Website Fingerprinting (WF) allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website.  ...  Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult.  ...  Acknowledgments We thank the anonymous reviewers for their useful comments. A special acknowledgment to Gunes Acar, George Danezis, Mustafa A.  ... 
doi:10.1515/popets-2017-0023 dblp:journals/popets/CherubinHJ17 fatcat:lwoidlgwpjf3jhathtpnnmt54i
« Previous Showing results 1 — 15 out of 90 results