Traffic Analysis of Web Browsers

نویسندگان

  • Sami Zhioua
  • Mahjoub Langar
چکیده

Tor network is currently the most commonly used anonymity system with more than 300,000 users and almost 3000 relays. Attacks against Tor are typically confirmation attacks where the adversary injects easily discernible traffic pattern and observes which clients and/or relays exhibit such patterns. The main limitation of these attacks is that they require a “powerful” adversary. Website fingerprinting is a new breed of attacks that identifies which websites are visited by a Tor client by learning the traffic pattern for each suspected website. Recent works showed that some classifiers can successfully identify 80% of visited websites. In this paper we use a classic classifier, namely, decision trees (C4.5 algorithm) and we study to which extent popular web browsers can resist to website fingerprinting attacks. Among four studied web browsers, Google Chrome offers the best resistance to website fingerprinting (5 times better than the other web browsers). Since most of existing fingerprinting techniques have been evaluated using Firefox web browser, we expect the accuracy results of existing works to be reduced in case Chrome browser is used.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pii: S0140-3664(99)00130-9

As enterprise computing environments become more network-oriented, the importance of network traffic monitoring and analysis intensifies. Most existing traffic monitoring and analysis tools focus on measuring the traffic loads of individual network segments. Further, they typically have complicated user interfaces. As Internet and Intranet traffic increases due to the increase in the use of the...

متن کامل

Fingerprintability of WebRTC

We examine WebRTC’s suitability as a means of Internet censorship circumvention. WebRTC is a framework and suite of protocols for peer-to-peer communication between web browsers. We analyze the implementation differences in instantiations of WebRTC that make it possible to “fingerprint” implementations—potentially distinguishing circumvention-related uses from ordinary ones. This question is re...

متن کامل

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows

Leakage of private information from web applications— even when the traffic is encrypted—is a major security threat to many applications that use HTTP for data delivery. This paper considers the problem of inferring from encrypted HTTP traffic the web sites or web pages visited by a user. Existing browser-side approaches to this problem cannot defend against more advanced attacks, and serversid...

متن کامل

Creating a Framework for Developing High-performance Web Servers over ATM

During the past two years, the volume of traffic on the World Wide Web (Web) has grown dramatically. Traffic increases are due largely to the proliferation of inexpensive and ubiquitous Web browsers (such as NCSA Mosaic, Netscape Navigator, and Internet Explorer). Likewise, Web protocols and browsers are increasingly being applied to specialized computationally expensive tasks, such as imaging ...

متن کامل

Website Fingerprinting using Traffic Analysis Attacks

Website fingerprinting is the act of recognizing web traffic through surveillance despite the use of encryption or anonymizing software. The overall idea is to leverage the fact that many web sites have specific request patterns, response byte counts, and other similar coarse features that are known beforehand. This information can be used to recognize and classify different website traffic des...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014