More about HKUST
Towards Real-World Design and Evaluation of Website Fingerprinting Defenses
PhD Thesis Proposal Defence
Title: "Towards Real-World Design and Evaluation of Website Fingerprinting
Defenses"
by
Mr. Jiajun GONG
Abstract:
Website Fingerprinting (WF) attacks threaten user privacy on anonymity networks
such as Tor because they can be used by network surveillants to identify the
web pages a user is visiting by extracting the size and timing information of
the user’s encrypted network traffic; however, Tor is currently undefended
against WF because existing defenses have not convincingly shown their
effectiveness. Some defenses have been overcome by newer attacks; other
defenses have never been implemented and tested in a real open-world scenario,
as they had unsolved practical issues for deployment. In this thesis, we
focused on designing and evaluating effective defenses that can be deployed in
the real Tor network. We proposed three effective defenses that incur different
overhead levels, targeting users with different security preferences.
We first proposed two zero-delay defenses, FRONT and GLUE. FRONT and GLUE are
two practical defenses specifically designed for achieving low overhead. We
observed that WF attacks rely on the feature-rich trace front, so FRONT focuses
on obfuscating the trace front with dummy packets. It also randomizes the
number and distribution of dummy packets for trace-to-trace randomness to
impede the attacker’s learning process. GLUE adds dummy packets between
separate traces so that they appear to the attacker as a long consecutive
trace, rendering the attacker unable to find their start or end points, let
alone classify them. Our experiments show that with only 33% data overhead,
FRONT reduces the F1-score of the best attack from 0.94 to 0.47. By comparison,
the best-known lightweight defense, WTF-PAD, only reduces it to 0.70. With
around 22% — 44% data overhead, GLUE can lower the true positive rate and
precision of the best WF attacks to less than 15%, approaching the performance
of the best heavyweight defenses.
FRONT is strong and efficient as a lightweight defense, but it is ineffective
if we want to reduce the attacker’s true positive rate below 50%. To further
thwart WF attacks, we proposed a strong defense, Surakav. Surakav makes use of
a Generative Adversarial Network (GAN) to generate realistic sending patterns
and regulates buffered data according to these patterns. Experiments show that
Surakav is able to reduce the attacker’s true positive rate by 57% with 55%
data overhead and 16% time overhead, saving 42% data overhead compared to
FRONT. In the heavyweight setting, Surakav outperforms the strongest known
defense, Tamaraw, requiring 50% less overhead in data and time to lower the
attacker’s true positive rate to only 8%.
Date: Wednesday, 5 October 2022
Time: 3:00pm - 5:00pm
Venue: Room 5501
lifts 25/26
Zoom Meeting:
https://hkust.zoom.us/j/9514345771?pwd=WkEzbTFZVW91dGNMSERpT09peFgvdz09
Committee Members: Dr. Charles Zhang (Supervisor)
Dr. Tao Wang (Supervisor, Simon Fraser University)
Prof. Shing-Chi Cheung (Chairperson)
Dr. Dimitris Papadopoulos
Prof. Raymond Wong
**** ALL are Welcome ****