Publication | Open Access
Revisiting Assumptions for Website Fingerprinting Attacks
39
Citations
17
References
2019
Year
Unknown Venue
Internet SecurityEngineeringTargeted AttackInformation SecurityData AnonymizationWebsite Fingerprinting AttacksWebsite FingerprintingData PrivacyInformation ForensicsAnonymity NetworkPrivacy AnonymityNetwork TrafficPhishingNetwork ForensicsPrivacyData SecurityCryptography
Most privacy-conscious users utilize HTTPS and an anonymity network such as Tor to mask source and destination IP addresses. It has been shown that encrypted and anonymized network traffic traces can still leak information through a type of attack called a website fingerprinting (WF) attack. The adversary records the network traffic and is only able to observe the number of incoming and outgoing messages, the size of each message, and the time difference between messages. In previous work, the effectiveness of website fingerprinting has been shown to have an accuracy of over 90% when using Tor as the anonymity network. Thus, an Internet Service Provider can successfully identify the websites its users are visiting. One main concern about website fingerprinting is its practicality.
| Year | Citations | |
|---|---|---|
Page 1
Page 1