DeTorrent: An Adversarial Padding-only Traffic Analysis Defense

02/03/2023
by   James K Holland, et al.
0

While anonymity networks like Tor aim to protect the privacy of their users, they are vulnerable to traffic analysis attacks such as Website Fingerprinting (WF) and Flow Correlation (FC). Recent implementations of WF and FC attacks, such as Tik-Tok and DeepCoFFEA, have shown that the attacks can be effectively carried out, threatening user privacy. Consequently, there is a need for effective traffic analysis defense. There are a variety of existing defenses, but most are either ineffective, incur high latency and bandwidth overhead, or require additional infrastructure. As a result, we aim to design a traffic analysis defense that is efficient and highly resistant to both WF and FC attacks. We propose DeTorrent, which uses competing neural networks to generate and evaluate traffic analysis defenses that insert 'dummy' traffic into real traffic flows. DeTorrent operates with moderate overhead and without delaying traffic. In a closed-world WF setting, it reduces an attacker's accuracy by 60.5 reduction 9.5 state-of-the-art FC attacker, DeTorrent reduces the true positive rate for a 10^-4 false positive rate to about .30, which is less than half that of the next-best defense. We also demonstrate DeTorrent's practicality by deploying it alongside the Tor network and find that it maintains its performance when applied to live traffic.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/11/2020

RegulaTOR: A Powerful Website Fingerprinting Defense

Website Fingerprinting (WF) attacks are used by passive, local attackers...
research
11/24/2021

WFDefProxy: Modularly Implementing and Empirically Evaluating Website Fingerprinting Defenses

Tor, an onion-routing anonymity network, has been shown to be vulnerable...
research
03/30/2023

TorKameleon: Improving Tor's Censorship Resistance With K-anonimization and Media-based Covert Channels

The use of anonymity networks such as Tor and similar tools can greatly ...
research
02/08/2021

A Real-time Defense against Website Fingerprinting Attacks

Anonymity systems like Tor are vulnerable to Website Fingerprinting (WF)...
research
02/27/2023

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic

Website fingerprinting attack is an extensively studied technique used i...
research
09/15/2022

Defending Root DNS Servers Against DDoS Using Layered Defenses

Distributed Denial-of-Service (DDoS) attacks exhaust resources, leaving ...
research
05/25/2020

The never ending war in the stack and the reincarnation of ROP attacks

Return Oriented Programming (ROP) is a technique by which an attacker ca...

Please sign up or login with your details

Forgot password? Click here to reset