Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics
نویسندگان
چکیده
The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend against traffic analysis attacks. However, the vulnerability of the connections between end users and the anonymous network do not attract any attention yet. For the first time, we reveal an end user browsing dynamics based attack on anonymous browsing systems at the LAN where the victim locates. This new attack method is fundamentally different from existing attack methodologies. In general, web surfers browse the web following certain patterns, such as requesting a web page, viewing it and requesting another page. The browsing pattern of a victim can be clearly observed by a local adversary when the victim is viewing the web without protection. Unfortunately, browsing dynamics releases rich information for attacking even though the web page content is encrypted. In order to show how a local eavesdropper can decipher which pages have been viewed with the knowledge of user browsing dynamics and the public information of a given website, we established a specific hidden Markov model to represent browsing dynamics for the website. By using this model, we can then identify the optimal of the accessed pages using the Viterbi algorithm. In order to confirm the effectiveness of the revealed attack method, we have conducted extensive experiments on a real data set. The results demonstrated that the attack accuracy can be more than 80%. A few possible counter-attack strategies are discussed at the end of the paper.
منابع مشابه
Advances in Network and System Security: Editorial Statement
SPECIAL FOCUS ON ADVANCES IN NETWORK AND SYSTEM SECURITY 382 Advances in Network and System Security: Editorial Statement Jiankun Hu, Yang Xiang and Wanlei Zhou 384 Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks Leonardo B. Oliveira, Aman Kansal, Conrado P.L. Gouvêa, Diego F. Aranha, Julio López, Bodhi Priyantha, Michel Goraczko and Feng Zhao 397 Dynamic S...
متن کاملRelated Packet Padding for Anonymous Web Browsing in Mobile Devices against Traffic Analysis Attack
Anonymous web browsing is becoming more popular to meet web privacy protection. To meet anonymity, we propose related packet padding strategy in which web page related to user request is selected as cover page based on the popularity for anonymous web browsing systems. Earlier predicted packet strategy was used for anonymous web browsing systems in which web page based on popularity is selected...
متن کاملAnonymous Web Browsing against Traffic Analysis Attacks by Reusing the Cache Memory
Anonymous web browsing is a hot topic with many potential applications for privacy reasons. However, there are few such systems which can provide high level anonymity for web browsing. The reason is the current dominant dummy packet padding method for anonymization against traffic analysis attacks. This method inherits huge delay and bandwidth waste, which inhibits its use for web browsing. In ...
متن کاملBridging the gap between anonymous e-mail and anonymous web browsing
Purpose – Anonymity research on high latency, store-and-forward mediums, such as e-mail, have led to comparatively well-researched anonymity technologies; however, similar achievements have proven to be more difficult for low-latency communications such as Web browsing. This paper aims to propose an anonymous Web browsing protocol that harnesses some of the advantages of a store-and-forward ano...
متن کاملSemantic Identification Attacks on Web Browsing
We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adversary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MS...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Comput. J.
دوره 55 شماره
صفحات -
تاریخ انتشار 2012