website fingerprinting attack mitigation using traffic morphing · 2018. 7. 10. · website...

33
Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University Chicago 1 ) Taejoon Kim (Texas A&M University, Commerce) Jinoh Kim (Texas A&M University, Commerce) 1 Previously at Oklahoma State University

Upload: others

Post on 07-Oct-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Website Fingerprinting Attack Mitigation using Traffic

Morphing

Eric Chan-Tin (Loyola University Chicago1)Taejoon Kim (Texas A&M University, Commerce)

Jinoh Kim (Texas A&M University, Commerce)

1Previously at Oklahoma State University

Page 2: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Internet

Page 3: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Internet

Page 4: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

To: Charlie

Page 5: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

To: Charlie

To: Bob

To: Alice

From: Eric

Page 6: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

To: Charlie

To: Bob

To: Alice

From: Eric

Page 7: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

To: Charlie

To: Bob

To: Alice

From: Eric

From: Alice

From: Bob

Page 8: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Tor

● Free, open-source● 2002● Anonymity network● Onion routing● 2,000,000+ users daily● 7,000+ volunteers (relay nodes)

Page 9: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Internet

ComcastCoxATT

VerizonTmobile

Page 10: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University
Page 11: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University
Page 12: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University
Page 13: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University
Page 14: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University
Page 15: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University
Page 16: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University
Page 17: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

A

B

C

Page 18: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Website Fingerprinting Attack

Uses only number of packets, size of packets, and direction of packets

Page 19: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Accuracy

● 80+% accuracy● Machine learning such as k-NN, SVM,

RandomForest

Page 20: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

● Padding● Every packet has same size

● Delay● Same delay

● Extra packets (noise)

● Make every website look similar using traffic morphing

Page 21: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

But...

● Hard to make every website on the Internet look similar

Page 22: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Contribution

● Some websites already look "similar"● Number of packets● Size of packets

● Cluster "similar" websites and make all websites within a cluster indistinguishable● Easier to do within a cluster than for ALL websites

on the Internet● Use traffic morphing

Page 23: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Dataset

● Panchenko et. al., “Website fingerprinting at Internet scale,” NDSS 2016

● 757 unique websites● 40 instances each

Page 24: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Proposed Algorithm

● Cluster websites● PCA (Principal Component Analysis)● 104 features

– Total number of outgoing packets– Total number of incoming packets– Total size of all outgoing packets– Total size of all incoming packets– 100 samples of cumulative packet sizes

● Traffic morph each cluster to make all websites within that cluster indistinguishable

Page 25: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Clustering

Page 26: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Elbow Method

Page 27: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Traffic Morph Method

● Biggest● Make the size of every packet in a cluster be

the same size as the biggest packet in that cluster

Page 28: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Experiment Setup

● 50% of dataset for training, 50% for testing● Repeat 10 times

Page 29: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Accuracy

Mitigation Accuracy

No defense (Tor) 91%

CS-BuFLO 22%

Tamaraw 10%

WTF-PAD 15%

Walkie-Talkie 19%

Our Algorithm < 1%

Page 30: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University
Page 31: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Overhead

Mitigation LatencyOverhead

BandwidthOverhead

No defense (Tor) 0% 0%

CS-BuFLO 173% 130%

Tamaraw 200% 38%

WTF-PAD 0% 54%

Walkie-Talkie 34% 31%

Our Algorithm 0% 210%

Page 32: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Summary

● Promising research● Clustering● Traffic morphing within each cluster

● Almost completely mitigates website fingerprinting attacks (<1% accuracy)

● Other methods such as average packet size, random packet size, and closest packet size

Page 33: Website Fingerprinting Attack Mitigation using Traffic Morphing · 2018. 7. 10. · Website Fingerprinting Attack Mitigation using Traffic Morphing Eric Chan-Tin (Loyola University

Thank you!

Questions?

Eric Chan-Tin, [email protected]