IEEE INFOCOM 2020 - IEEE Conference on Computer Communications 2020
DOI: 10.1109/infocom41043.2020.9155465
|View full text |Cite
|
Sign up to set email alerts
|

DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…GLUE added dummy packets between separate traces so that they appeared to the attacker as a long consecutive trace, rendering the attacker unable to find their start or end points. Abusnaina et al [138] proposed a novel defense mechanism using a per-burst injection technique, called Deep Fingerprinting Defender (DFD), against deep learning-based WF attacks, which had two operation modes, one-way and two-way injection. DFD was designed to break the inherent patterns preserved in Tor traffic traces by carefully injecting dummy packets within every burst.…”
Section: B Approachesmentioning
confidence: 99%
“…GLUE added dummy packets between separate traces so that they appeared to the attacker as a long consecutive trace, rendering the attacker unable to find their start or end points. Abusnaina et al [138] proposed a novel defense mechanism using a per-burst injection technique, called Deep Fingerprinting Defender (DFD), against deep learning-based WF attacks, which had two operation modes, one-way and two-way injection. DFD was designed to break the inherent patterns preserved in Tor traffic traces by carefully injecting dummy packets within every burst.…”
Section: B Approachesmentioning
confidence: 99%
“…e latest defense method (DFD) [14] injects a dummy burst sequence according to the previous burst sequence in the real-time traffic. When the injection method is the server-side injection method, the attack success rate using CNN as the attack model is reduced from 99.93% to 5% with 85.56% bandwidth overhead.…”
Section: Website Fingerprintingmentioning
confidence: 99%
“…In the meantime, some WF defenses have been proposed such as WTF-PAD [12], walkie-talkie (W-T) [13], and Deep Fingerprinting Defender (DFD) [14]. In addition, researchers have found that deep learning models are vulnerable to adversarial examples [15].…”
Section: Introductionmentioning
confidence: 99%
“…Matthews, Sirinam, and Wright used this framework to implement the "Random Extend Burst" (REB) defense mechanism [25], and Pulls used genetic algorithms to find the locally optimal padding machines Spring and Interspace [28]. Several other defenses [4,5,11] also use padding to disrupt fingerprints, but none have been implemented in the circuit padding framework.…”
Section: Defensesmentioning
confidence: 99%