期刊文献+

基于深度神经网络burst特征分析的网站指纹攻击方法 被引量:22

burst-Analysis Website Fingerprinting Attack Based on Deep Neural Network
下载PDF
导出
摘要 以Tor为代表的匿名网络是一种隐匿用户数据传输行为的通信中介网络.不法分子利用匿名网络从事网络犯罪,对网络监管造成了极大的困难.网站指纹攻击技术是破解匿名通信的可行技术,可用于发现基于匿名网络秘密访问敏感网站的内网用户行为,是网络监管的重要手段.神经网络在网站指纹攻击技术上的应用突破了传统方法的性能瓶颈,但现有的研究未充分考虑根据突发流量(burst)特征等Tor流量特征对神经网络结构进行设计,存在网络过于复杂和分析模块冗余导致特征提取和分析不彻底、运行缓慢等问题.在对Tor流量特征进行研究和分析的基础上,设计了轻便的基于一维卷积网络的burst特征提取和分析模块,提出了基于深度神经网络分析burst特征的网站指纹攻击方法.进一步,针对在开放世界场景中仅使用阈值法简单分析指纹向量的不足,设计了基于随机森林算法的指纹向量分析模型.改进后的模型分类准确率达到了99.87%,在缓解概念漂移、绕过网站指纹攻击防御机制、识别Tor隐藏网站、小样本训练模型和运行速度等方面均有优异的性能表现,提高了网站指纹攻击技术应用到真实网络的可实践性. Anonymous network represented by Tor is a communication intermediary network that hides user data transmission behavior.The criminals use anonymous networks to engage in cyber crimes,which cause great difficulties in network supervision.The website fingerprinting attack technology is a feasible technology for cracking anonymous communication.It can be used to discover the behavior of intranet users who secretly access sensitive websites based on anonymous network,which is an important mean of network supervision.The application of neural network in website fingerprinting attack breaks through the performance bottleneck of traditional methods,but the existing researches have not fully considered to design the neural network structures based on the characteristics of Tor traffic such as burst and the characteristics of website fingerprinting attack technology.There are problems that the neural network is too complicated and the analysis module is redundant,which leads to problems such as incomplete feature extraction and analysis and running slowly.Based on the researches and analysis of Tor traffic characteristics,a lightweight burst feature extraction and analysis module based on one-dimensional convolutional network is designed,and a burst-analysis website fingerprinting attack method based on deep neural network is proposed.Furthermore,aiming at the shortcoming of simply using the threshold method to analyze fingerprinting vectors in open world scenarios,a fingerprint vector analysis model based on random forest algorithm is designed.The classification accuracy of the improved model reaches 99.87%and the model has excellent performance in alleviating concept drift,bypassing defense techniques against website fingerprinting attacks,identifying Tor hidden websites,performance of models trained with a small amount of data,and run time,which improves the practicality of applying website fingerprinting attack technology to real networks.
作者 马陈城 杜学绘 曹利峰 吴蓓 Ma Chencheng;Du Xuehui;Cao Lifeng;Wu Bei(Strategic Support Force Information Engineering University,Zhengzhou 450001;He nan Province Key Laboratory of Information Security(Strategic Support Force Information Engineering University),Zhengzhou 450001;Unit 61497,Beijing 100000)
出处 《计算机研究与发展》 EI CSCD 北大核心 2020年第4期746-766,共21页 Journal of Computer Research and Development
基金 国家重点研发计划项目(2016YFB0501901,2018YFB0803603) 国家自然科学基金项目(61502531,61702550,61802436)。
关键词 网站指纹攻击 深度神经网络 burst特征分析 Tor匿名网络 网络监管 website fingerprinting attack deep neural network(DNN) burst analysis Tor anonymous network network supervision
  • 相关文献

参考文献4

二级参考文献33

  • 1Dingledine R, Mathewson N, Syverson P. Tor: The second- generation onion router//Proceedings oi the 13th USENIX Security Symposium. San Diego, USA, 2004:21-21.
  • 2Yu W, Fu XW, Graham X, et al. DSSS-based flow marking technique for invisible traceback//Proceedings of the IEEE Symposium on Security and Privacy (IEEE S P). Oakland, USA, 2007:18-32.
  • 3Ling Z, Luo JZ, Yu W, et al. A new cell-counting-based attack against tor. IEEE/ACM Transactions on Networking, 2012, 20(4): 1245-1261.
  • 4Hintz A. Fingerprinting websites using traffic analysis// Proceedings of the Privacy Enhancing Technologies Workshop. San Francisco, USA, 2002:171-178.
  • 5Sun Q, Simon D, Wang Y, et al. Statistical identification of encrypted Web browsing traffic//Proeeedings of the 2002 IEEE Symposium on Security and Privacy (IEEE S -P). Oakland, USA, 2002:19-30.
  • 6Bissias G, Liberatore M, Jensen D, Levine B. Privacy vulnerabilities in encrypted HTTP streams//Proceedings of the Privacy Enhancing Technologies Workshop. ,Cavtat, Croatia, 2005:1-11.
  • 7Liberatore M, Levine B. Inferring the source of encrypted HTTP connections//Proceedings of the 13th ACM Conference on Computer and Communications Security(CCS). Alexandria, USA, 2006:255-263.
  • 8Herrmann D, Wendolsky R, Federrath H. Website finger- printing: Attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier//Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW). Chicago, USA, 2009:31-42.
  • 9Lu L, Chang E, Chan M. Website fingerprinting and identi- fication using ordered feature sequences//Proceedings of the European Symposium on Research in Computer Security (ESORICS). Athens, Greece, 2010:199-214.
  • 10Ling Z, Luo JZ, Zhang Y, et al. A novel network delay based side-channel attack: Modeling and defense//Proceed- ings of the 31th IEEE International Conference on Computer Communications (INFOCOM). Orlando, USA, 2012: 2390- 2398.

共引文献207

同被引文献115

引证文献22

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部