2019
DOI: 10.1109/tifs.2018.2855655
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Web Traffic Defence Against Timing-Analysis Attacks

Abstract: We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The tunnel opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. We find that the dummy packet overhead is typically less than 20% on lightly loaded links and falls to zero as the traffic load increases i.e. the tunnel is capacity-achieving. The additional latency incurred is less than 100ms. We build … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Of course timing based attacks are not confined to recommender systems and there is, in particular, a growing literature on such attacks against HTTPS traffic and on defenses. Borrowing from this literature, when user traffic can be aggregated, for example by use of a shared VPN, then relatively low amounts of buffering and injection of dummy traffic are sufficient to provably disrupt timing-based attacks 33 and such approaches might usefully be adopted in the present context.…”
Section: Additional Linking Attacksmentioning
confidence: 99%
“…Of course timing based attacks are not confined to recommender systems and there is, in particular, a growing literature on such attacks against HTTPS traffic and on defenses. Borrowing from this literature, when user traffic can be aggregated, for example by use of a shared VPN, then relatively low amounts of buffering and injection of dummy traffic are sufficient to provably disrupt timing-based attacks 33 and such approaches might usefully be adopted in the present context.…”
Section: Additional Linking Attacksmentioning
confidence: 99%