Skip to main content

RLTree: Website Fingerprinting Through Resource Loading Tree

  • Conference paper
  • First Online:
Network and System Security (NSS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13041))

Included in the following conference series:

Abstract

Website fingerprinting (WF) attack is a type of traffic analysis technique that extracts the unique fingerprint from the traffic of each website demonstrating that the current privacy protection mechanism provided by HTTPS is still fragile. While prior WF attack methods that extract fingerprints only using the web traffic generated by the first TCP session can be easily compromised by the frequent website updates, we observe that it is still possible to identify a website accurately through fingerprinting the resource loading sequence generated by the multiple initial TCP sessions. We record the multiple TCP sessions by visiting a website and analyze its traffic structure. We find that despite the update of the website, the TCP establishment is always kept unchanged, and such TCP sequence can be used to fingerprint a website. Hence, we build a resource loading tree using the multiple TCP sessions and demonstrates its high precision in recognizing a website even under HTTPS protection. We collect data from 20 websites with a total of 7,326 traces, and show that the accuracy can achieve up to 95.9%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alexa website ranking. https://www.alexa.com/. Accessed 6 May 2021

  2. Chrome release notes. https://chromereleases.googleblog.com/. Accessed 30 Sep 2021

  3. Chrome resource priorities and scheduling. https://docs.google.com/document/d/1bCDuq9H1ih9iNjgzyAL0gpwNFiEP4TZS-YLRp_RuMlc/. Accessed 17 Aug 2021

  4. Cisco joy. https://github.com/cisco/joy. Accessed 17 Aug 2021

  5. Firefox release notes. https://www.mozilla.org/en-US/firefox/notes/ Accessed 30 Sep 2021

  6. RFC 8446 - the transport layer security (TLS) protocol version 1.3. https://tools.ietf.org/html/rfc8446#section-4.1.2. Accessed 23 Dec 2020

  7. Selenium, automating web applications for testing purposes tools. https://www.selenium.dev/. Accessed 17 Aug 2021

  8. tshark - the wireshark network analyzer. https://www.wireshark.org/docs/man-pages/tshark.html. Accessed 23 Dec 2020

  9. A novel passive website fingerprinting attack on tor using fast Fourier transform. Computer Communications Guildford Then Amsterdam Butterworth Scientific Limited Then Elsevier (2016)

    Google Scholar 

  10. Aminuddin, M.A.I.M., Zaaba, Z.F., Singh, M.K.M., Singh, D.S.M.: A survey on tor encrypted traffic monitoring. Int. J. Adv. Comput. Sci. Appl. 9(8) (2018). https://doi.org/10.14569/IJACSA.2018.090815

  11. Dong, C., Lu, Z., Cui, Z., Liu, B., Chen, K.: MBTree: detecting encryption rats communication using malicious behavior tree. IEEE Trans. Inf. Forensics Secur. 16, 3589–3603 (2021)

    Article  Google Scholar 

  12. Ghaleb, T.A.: Wireless/website traffic analysis amp; fingerprinting: a survey of attacking techniques and countermeasures. In: 2015 International Conference on Cloud Computing (ICCC), pp. 1–7 (2015). https://doi.org/10.1109/CLOUDCOMP.2015.7149665

  13. Hayes, J., Danezis, G.: k-fingerprinting: a robust scalable website fingerprinting technique. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 1187–1203 (2016)

    Google Scholar 

  14. Herrmann, D., Wendolsky, R., Federrath, H.: Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial Nave-Bayes classifier. In: CCS 2009, Cloud Computing Security Workshop (2009)

    Google Scholar 

  15. Panchenko, A., Lanze, F., Zinnen, A., Henze, M., Engel, T.: Website fingerprinting at internet scale. In: Network & Distributed System Security Symposium (2016)

    Google Scholar 

  16. Postel, J.: Transmission control protocol. RFC 793, Internet Engineering Task Force, September 1981. http://www.rfc-editor.org/rfc/rfc793.txt

  17. Shen, M., Liu, Y., Chen, S., Zhu, L., Zhang, Y.: Webpage fingerprinting using only packet length information. In: ICC 2019–2019 IEEE International Conference on Communications (ICC) (2019)

    Google Scholar 

  18. Shen, M., Liu, Y., Zhu, L., Du, X., Hu, J.: Fine-grained webpage fingerprinting using only packet length information of encrypted traffic. IEEE Trans. Inf. Forensics Secur. 16(99), 2046–2059 (2020)

    Google Scholar 

  19. Shen, M., Zhang, J., Zhu, L., Xu, K., Du, X.: Accurate decentralized application identification via encrypted traffic analysis using graph neural networks. IEEE Trans. Inf. Forensics Secur. 16(99), 2367–2380 (2021)

    Google Scholar 

  20. Shi, Y., Matsuura, K.: Fingerprinting attack on the tor anonymity system, pp. 425–438, December 2009

    Google Scholar 

  21. Zhang, Z., Kang, C., Xiong, G., Li, Z.: Deep forest with LRRS feature for fine-grained website fingerprinting with encrypted SSL/TLS. In: Proceedings of the 28th ACM International Conference on Information and Knowledge Management, pp. 851–860. CIKM 2019. Association for Computing Machinery (2019). https://doi.org/10.1145/3357384.3357993

Download references

Acknowledgement

This work is supported in part by the National Key Research and Development Program of China No. 2019QY1302; the NSFC-General Technology Basic Research Joint Funds under Grant U1836214; NSFC-61872265; the New Generation of Artificial Intelligence Science and Technology Major Project of Tianjin under 19ZXZNGX00010.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laiping Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, C., Nie, L., Zhao, L. (2021). RLTree: Website Fingerprinting Through Resource Loading Tree. In: Yang, M., Chen, C., Liu, Y. (eds) Network and System Security. NSS 2021. Lecture Notes in Computer Science(), vol 13041. Springer, Cham. https://doi.org/10.1007/978-3-030-92708-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-92708-0_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-92707-3

  • Online ISBN: 978-3-030-92708-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics