POSTER: Traffic Splitting to Counter Website Fingerprinting

Abstract

Website fingerprinting (WFP) is a special type of traffic analysis, which aims to infer the websites visited by a user. Recent studies have shown that WFP targeting Tor users is notably more effective than previously expected. Concurrently, state-of-the-art defenses have been proven to be less effective. In response, we present a novel WFP defense that splits traffic over multiple entry nodes to limit the data a single malicious entry can use. Here, we explore several traffic-splitting strategies to distribute user traffic. We establish that our weighted random strategy dramatically reduces the accuracy from nearly 95% to less than 35% for four state-of-the-art WFP attacks without adding any artificial delays or dummy traffic.

Publication
Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS '19)
Placeholder Avatar
Wladimir De La Cadena
Placeholder Avatar
Asya Mitseva
Dr. rer. nat. Jan Pennekamp
Dr. rer. nat. Jan Pennekamp
Postdoctoral Researcher
Placeholder Avatar
Fabian Lanze
Placeholder Avatar
Thomas Engel
Klaus Wehrle
Klaus Wehrle
Head of Group
Placeholder Avatar
Andriy Panchenko