论文标题
AWA:对抗网站的改编
AWA: Adversarial Website Adaptation
论文作者
论文摘要
增强隐私技术的最重要义务之一是为用户在互联网上的浏览活动带来机密性和隐私。网站指纹攻击使本地的被动窃听器可以预测目标用户的浏览活动,即使她使用匿名技术,例如VPN,IPSEC和TOR。最近,深度学习的增长使对手能够以更高的准确性进行网站指纹攻击。在本文中,我们提出了针对网站指纹攻击的新防御,使用对抗性深度学习方法称为“对抗网站适应”(AWA)。 AWA在每次运行中创建一个变压器设置,使每个网站都有一个唯一的变压器。每个变压器都会生成对抗痕迹,以逃避对手的分类器。 AWA有两个版本,包括Universal AWA(UAWA)和非宇宙AWA(Nuawa)。与Nuawa不同,无需访问网站的整个跟踪,以便在UAWA生成对抗性跟踪。我们在变压器的训练阶段容纳秘密随机元素,以便AWA在每次运行中生成各种变压器。我们多次运行AWA并创建多组变压器。如果对手和目标用户选择不同的变压器集,则对手分类器的准确性将近19.52%和31.94%,在Uawa和Nuawa中分别为22.28%和26.28%的带宽开销。如果一个更强大的对手通过多组变压器产生对手痕迹,并在上面训练分类器,则对手分类器的准确性几乎为49.10%和25.93%,分别在Uawa和Nuaw,几乎为62.52%和64.33%的带宽开销。
One of the most important obligations of privacy-enhancing technologies is to bring confidentiality and privacy to users' browsing activities on the Internet. The website fingerprinting attack enables a local passive eavesdropper to predict the target user's browsing activities even she uses anonymous technologies, such as VPNs, IPsec, and Tor. Recently, the growth of deep learning empowers adversaries to conduct the website fingerprinting attack with higher accuracy. In this paper, we propose a new defense against website fingerprinting attack using adversarial deep learning approaches called Adversarial Website Adaptation (AWA). AWA creates a transformer set in each run so that each website has a unique transformer. Each transformer generates adversarial traces to evade the adversary's classifier. AWA has two versions, including Universal AWA (UAWA) and Non-Universal AWA (NUAWA). Unlike NUAWA, there is no need to access the entire trace of a website in order to generate an adversarial trace in UAWA. We accommodate secret random elements in the training phase of transformers in order for AWA to generate various sets of transformers in each run. We run AWA several times and create multiple sets of transformers. If an adversary and a target user select different sets of transformers, the accuracy of adversary's classifier is almost 19.52% and 31.94% with almost 22.28% and 26.28% bandwidth overhead in UAWA and NUAWA, respectively. If a more powerful adversary generates adversarial traces through multiple sets of transformers and trains a classifier on them, the accuracy of adversary's classifier is almost 49.10% and 25.93% with almost 62.52% and 64.33% bandwidth overhead in UAWA and NUAW, respectively.