Skip to main content
Erschienen in: Cluster Computing 1/2016

01.03.2016

Techniques and countermeasures of website/wireless traffic analysis and fingerprinting

verfasst von: Taher Ahmed Ghaleb

Erschienen in: Cluster Computing | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The behavior of a communication traffic may reveal some patterns (such as, packet size, packet direction, and inter-packet time, etc.) that can expose users’ identities and their private interactions. Such information may not be concealed even if encrypting protocols have been employed, which gives traffic analysis attacks an opportunity to infer the identities of the visited websites by Internet users, or the applications being running in wireless networks. In response, defense schemes and anonymity networks endeavor to disguise traffic features in order to preserve user privacy. This paper reviews existing traffic analysis techniques along with their countermeasures, and categorizes them into two main domains: websites and wireless. In addition, we propose a unified traffic analysis process model compound of a set of layers that demonstrate the stages of traffic analysis techniques. Then, factors that can impact the fingerprinting accuracy are elaborated to show how can the change of such factors affect the success results of fingerprinting. Finally, we present various potential challenges that need to be considered when implementing and deploying real-world traffic analysis systems. A recommendation of a future research direction regarding the enhancement of fingerprinting success rates and fair evaluation of them is also introduced.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Atkinson, J., Adetoye, O., Rio, M., Mitchell, J., Matich, G.: Your wifi is leaking: inferring user behaviour, encryption irrelevant. In: Wireless Communications and Networking Conference, pp. 1097–1102. IEEE (2013) Atkinson, J., Adetoye, O., Rio, M., Mitchell, J., Matich, G.: Your wifi is leaking: inferring user behaviour, encryption irrelevant. In: Wireless Communications and Networking Conference, pp. 1097–1102. IEEE (2013)
2.
Zurück zum Zitat Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Information Hiding, pp. 245–257. Springer (2001) Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Information Hiding, pp. 245–257. Springer (2001)
3.
Zurück zum Zitat Berthold, O., Federrath, H., Köpsell, S.: Web mixes: a system for anonymous and unobservable internet access. In: Designing Privacy Enhancing Technologies, pp. 115–129. Springer (2001) Berthold, O., Federrath, H., Köpsell, S.: Web mixes: a system for anonymous and unobservable internet access. In: Designing Privacy Enhancing Technologies, pp. 115–129. Springer (2001)
4.
Zurück zum Zitat Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy vulnerabilities in encrypted http streams. In: Privacy Enhancing Technologies, pp. 1–11. Springer (2006) Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy vulnerabilities in encrypted http streams. In: Privacy Enhancing Technologies, pp. 1–11. Springer (2006)
5.
Zurück zum Zitat Cai, X., Nithyanand, R., Johnson, R.: Cs-buflo: a congestion sensitive website fingerprinting defense. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 121–130. ACM (2014) Cai, X., Nithyanand, R., Johnson, R.: Cs-buflo: a congestion sensitive website fingerprinting defense. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 121–130. ACM (2014)
6.
Zurück zum Zitat Cai, X., Nithyanand, R., Wang, T., Johnson, R., Goldberg, I.: A systematic approach to developing and evaluating website fingerprinting defenses. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 227–238. ACM (2014) Cai, X., Nithyanand, R., Wang, T., Johnson, R., Goldberg, I.: A systematic approach to developing and evaluating website fingerprinting defenses. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 227–238. ACM (2014)
7.
Zurück zum Zitat Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 605–616. ACM (2012) Cai, X., Zhang, X.C., Joshi, B., Johnson, R.: Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 605–616. ACM (2012)
8.
Zurück zum Zitat Chan-Tin, E., et al.: Identifying webbrowsers in encrypted communications. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 135–138. ACM (2014) Chan-Tin, E., et al.: Identifying webbrowsers in encrypted communications. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 135–138. ACM (2014)
9.
Zurück zum Zitat Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: why efficient traffic analysis countermeasures fail. In: IEEE Symposium on Security and Privacy (SP), pp. 332–346 (2012) Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: why efficient traffic analysis countermeasures fail. In: IEEE Symposium on Security and Privacy (SP), pp. 332–346 (2012)
10.
Zurück zum Zitat Ghaleb, T.A.: Website fingerprinting as a cybercrime investigation model: role and challenges. In: First International Conference on Anti-Cybercrime (ICACC-2015), pp. 1–5. IEEE, In press (2015) Ghaleb, T.A.: Website fingerprinting as a cybercrime investigation model: role and challenges. In: First International Conference on Anti-Cybercrime (ICACC-2015), pp. 1–5. IEEE, In press (2015)
11.
Zurück zum Zitat Ghaleb, T.A.: Wireless/website traffic analysis & fingerprinting: a survey of attacking techniques and countermeasures. In: International Conference on Cloud Computing (ICCC), pp. 1–7. IEEE (2015) Ghaleb, T.A.: Wireless/website traffic analysis & fingerprinting: a survey of attacking techniques and countermeasures. In: International Conference on Cloud Computing (ICCC), pp. 1–7. IEEE (2015)
12.
Zurück zum Zitat Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: Proceedings of the 6th International Conference on Mobile systems, Applications, and Services, pp. 40–53. ACM (2008) Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: Proceedings of the 6th International Conference on Mobile systems, Applications, and Services, pp. 40–53. ACM (2008)
13.
Zurück zum Zitat Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 31–42. ACM (2009) Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 31–42. ACM (2009)
14.
Zurück zum Zitat Juarez, M., Afroz, S., Acar, G., Diaz, C., Greenstadt, R.: A critical evaluation of website fingerprinting attacks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 263–274. ACM (2014) Juarez, M., Afroz, S., Acar, G., Diaz, C., Greenstadt, R.: A critical evaluation of website fingerprinting attacks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 263–274. ACM (2014)
15.
Zurück zum Zitat Liberatore, M., Levine, B.N.: Inferring the source of encrypted http connections. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 255–263. ACM (2006) Liberatore, M., Levine, B.N.: Inferring the source of encrypted http connections. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 255–263. ACM (2006)
16.
Zurück zum Zitat Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of tor. In: IEEE Symposium on Security and Privacy, pp. 183–195. IEEE (2005) Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of tor. In: IEEE Symposium on Security and Privacy, pp. 183–195. IEEE (2005)
17.
Zurück zum Zitat Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 103–114. ACM (2011) Panchenko, A., Niessen, L., Zinnen, A., Engel, T.: Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 103–114. ACM (2011)
18.
Zurück zum Zitat Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Designing Privacy Enhancing Technologies, pp. 10–29. Springer (2001) Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: Designing Privacy Enhancing Technologies, pp. 10–29. Springer (2001)
19.
Zurück zum Zitat Shi, Y., Matsuura, K.: Fingerprinting attack on the tor anonymity system. In: Information and Communications Security, pp. 425–438. Springer (2009) Shi, Y., Matsuura, K.: Fingerprinting attack on the tor anonymity system. In: Information and Communications Security, pp. 425–438. Springer (2009)
20.
Zurück zum Zitat Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 19–30. IEEE (2002) Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 19–30. IEEE (2002)
21.
Zurück zum Zitat Tavallaee, M., Lu, W., Ghorbani, A.A.: Online classification of network flows. In: Seventh Annual Conference on Communication Networks and Services Research , CNSR’09, pp. 78–85. IEEE (2009) Tavallaee, M., Lu, W., Ghorbani, A.A.: Online classification of network flows. In: Seventh Annual Conference on Communication Networks and Services Research , CNSR’09, pp. 78–85. IEEE (2009)
23.
Zurück zum Zitat Wagner, D., Schneier, B.: Analysis of the ssl 3.0 protocol. In: Proceedings of the Second USENIX Workshop on Electronic Commerce, pp. 29–40 (1996) Wagner, D., Schneier, B.: Analysis of the ssl 3.0 protocol. In: Proceedings of the Second USENIX Workshop on Electronic Commerce, pp. 29–40 (1996)
24.
Zurück zum Zitat Wang, T., Cai, X., Nithyanand, R., Johnson, R., Goldberg, I.: Effective attacks and provable defenses for website fingerprinting. In: Proceedings of the 23th USENIX Security Symposium (USENIX) (2014) Wang, T., Cai, X., Nithyanand, R., Johnson, R., Goldberg, I.: Effective attacks and provable defenses for website fingerprinting. In: Proceedings of the 23th USENIX Security Symposium (USENIX) (2014)
26.
Zurück zum Zitat Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 201–212. ACM (2013) Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 201–212. ACM (2013)
27.
Zurück zum Zitat Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted voip conversations. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 35–49. IEEE (2008) Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted voip conversations. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 35–49. IEEE (2008)
28.
Zurück zum Zitat Wright, C.V., Coull, S.E., Monrose, F.: Traffic morphing: an efficient defense against statistical traffic analysis. In: NDSS (2009) Wright, C.V., Coull, S.E., Monrose, F.: Traffic morphing: an efficient defense against statistical traffic analysis. In: NDSS (2009)
29.
Zurück zum Zitat Zhang, F., He, W., Liu, X., Bridges, P.G.: Inferring users’ online activities through traffic analysis. In: Proceedings of the fourth ACM Conference on Wireless Network Security, pp. 59–70. ACM (2011) Zhang, F., He, W., Liu, X., Bridges, P.G.: Inferring users’ online activities through traffic analysis. In: Proceedings of the fourth ACM Conference on Wireless Network Security, pp. 59–70. ACM (2011)
30.
Zurück zum Zitat Zhang, F., He, W., Liu, X.: Defending against traffic analysis in wireless networks through traffic reshaping. In: 31st International Conference on Distributed Computing Systems, pp. 593–602. IEEE (2011) Zhang, F., He, W., Liu, X.: Defending against traffic analysis in wireless networks through traffic reshaping. In: 31st International Conference on Distributed Computing Systems, pp. 593–602. IEEE (2011)
31.
Zurück zum Zitat Zhioua, S., Langar, M.: Traffic analysis of web browsers. In: Proceedings of the Formal Methods for Security Workshop (FMS 2014), pp. 20–33. CEUR Workshop Proceedings (2014) Zhioua, S., Langar, M.: Traffic analysis of web browsers. In: Proceedings of the Formal Methods for Security Workshop (FMS 2014), pp. 20–33. CEUR Workshop Proceedings (2014)
Metadaten
Titel
Techniques and countermeasures of website/wireless traffic analysis and fingerprinting
verfasst von
Taher Ahmed Ghaleb
Publikationsdatum
01.03.2016
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 1/2016
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-015-0502-4

Weitere Artikel der Ausgabe 1/2016

Cluster Computing 1/2016 Zur Ausgabe

Premium Partner