Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23210
|View full text |Cite
|
Sign up to set email alerts
|

Statistical Privacy for Streaming Traffic

Abstract: Machine learning empowers traffic-analysis attacks that breach users' privacy from their encrypted traffic. Recent advances in deep learning drastically escalate such threats. One prominent example demonstrated recently is a traffic-analysis attack against video streaming by using convolutional neural networks. In this paper, we explore the adaption of techniques previously used in the domains of adversarial machine learning and differential privacy to mitigate the machine-learning-powered analysis of streamin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(31 citation statements)
references
References 38 publications
(56 reference statements)
0
31
0
Order By: Relevance
“…GuardSpark++ is an access control mechanism, not a silver bullet that addresses all attacks. Conventional attacks, such as DoS [55], collusion attacks [77], or traffic analysis [75], will still work even if GuardSpark++ is in place. In particular, if the Spark platform is untrusted or compromised, GuardSpark++ becomes ineffective.…”
Section: Security Analysis and Discussionmentioning
confidence: 99%
“…GuardSpark++ is an access control mechanism, not a silver bullet that addresses all attacks. Conventional attacks, such as DoS [55], collusion attacks [77], or traffic analysis [75], will still work even if GuardSpark++ is in place. In particular, if the Spark platform is untrusted or compromised, GuardSpark++ becomes ineffective.…”
Section: Security Analysis and Discussionmentioning
confidence: 99%
“…Such unique constraints require substantially 5 https://bit.ly/2IDchsx different methods to find adversarial confidence score vectors. Other studies have leveraged adversarial examples to defend against traffic analysis [71] and author identification [38,54]. However, these studies did not consider formal utility-loss guarantees.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…Video streaming is a computationally expensive process, and if a request pattern is obfuscated too much, it will cause video lag or video buffering because not enough data is being sent or, conversely, because excess data is being downloaded. To the best of our knowledge at the time of this writing, only one defense strategy has been proposed, by Zhang et al [7]. It leverages differential privacy and works by setting a proxy between the client and server in the form of a browser extension.…”
Section: Problem Definitionmentioning
confidence: 99%
“…Differential privacy adds noise to data; in the case of video streaming, this noise changes the time intervals of the requests from the client and the amount of data requested by the client. e defense scheme proposed by Zhang et al [7] leverages two differential privacy methods for obfuscation, d * − privacy and FPA k .…”
Section: Problem Definitionmentioning
confidence: 99%
See 1 more Smart Citation