Skip to main content

A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14526))

Included in the following conference series:

  • 101 Accesses

Abstract

Aiming the problems of the high segmentation error of multi-tab webpage traffic and unreasonable use of mixed regions in the current Tor webpage fingerprinting methods and the poor recognition effect of webpage fingerprinting caused by lack of information on incomplete webpage traffic, a multi-scene webpage fingerprinting method based on multi-head attention and data enhancement was proposed. In the multi-tab webpage browsing scenario, sequence embedding and block division were used to transfer the original multi-tab webpage traffic sequence into a block matrix that preserves the original access order. Then, the global features of different mixed types of webpages were extracted from the block matrix based on multi-head attention for webpage recognition. In incomplete webpage browsing scenario, the original incomplete webpage traffic sequence was preprocessed to generate sequence samples. Then, incomplete sequences were interpolated through generative adversarial imputation nets to achieve data enhancement. The interpolated complete sequence was used for webpage recognition. The experiment results demonstrate that the proposed method has good performance in both webpage browsing scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sun, X.F., Huang, A.S., Luo, X.T., et al.: Webpage fingerprinting identification on tor: a survey. J. Comput. Res. Dev. 58(8), 1773–1788 (2021)

    Google Scholar 

  2. Zhao, N.F., Su, J.S., Zhao, B.T., et al.: A survey on hidden service location technologies in anonymous communication system. Chin. J. Comput. 45(2), 393–411 (2022)

    Google Scholar 

  3. Zou, H.F., Su, J.S., Wei, Z.T., et al.: A review of the research of website fingerprinting identification and defense. Chin. J. Comput. 45(10), 2243–2278 (2022)

    Google Scholar 

  4. Wang, T.F., Cai, X.S., Nithyanand, R.T., et al.: Effective attacks and provable defenses for website fingerprinting. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 143–157. USENIX Association, San Diego (2014)

    Google Scholar 

  5. Hayes, J.F., Danezis, G.S.: k-fingerprinting: a robust scalable website fingerprinting technique. In: USENIX Security Symposium, pp. 1187–1203. USENIX Association, Austin (2016)

    Google Scholar 

  6. Panchenko, A.F., Lanze, F.S., Pennekamp, J.T., et al.: Website fingerprinting at internet scale. In: 23rd Network and Distributed System Security Symposium (NDSS), pp. 1–15. ISOC, California (2016)

    Google Scholar 

  7. Rimmer, V.F., Preuveneers, D.S., Juarez, M.T., et al.: Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376 (2017)

  8. Juarez, M.F., Afroz, S.S., Acar, G.T., et al.: A critical evaluation of website fingerprinting attacks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 263–274. ACM, AZ, USA (2014)

    Google Scholar 

  9. Yoon J.F., Jordon J.S., Schaar M.T.: Gain: missing data imputation using generative adversarial nets. In: International Conference on Machine Learning, pp. 5689–5698. ACM, Stockholm (2018)

    Google Scholar 

  10. Sirinam, P.F., Imani, M.S., Juarez, M.T., et al.: Deep fingerprinting: undermining website fingerprinting defenses with deep learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1928–1943. ACM, Toronto (2018)

    Google Scholar 

  11. Juarez, M., Imani, M., Perry, M., Diaz, C., Wright, M.: Toward an efficient website fingerprinting defense. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 27–46. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45744-4_2

    Chapter  Google Scholar 

  12. Wang, T.F., Goldberg, I.S.: Walkie-Talkie: an efficient defense against passive website fingerprinting attacks. In: USENIX Security Symposium, pp. 1375–1390. USENIX Association, Vancouver, BC, Canada (2017)

    Google Scholar 

  13. Xu, Y.F., Wang, T.S., Li, Q.T., et al.: A multi-tab website fingerprinting attack. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 327–341. IEEE, San Juan (2018)

    Google Scholar 

  14. Liu, X.F., Wu, J.S., Zhou, Z.T.: Exploratory undersampling for class-imbalance learning. IEEE Trans. Syst. Man Cybern. 39(2), 539–550 (2008)

    Google Scholar 

  15. Chen T.F., Guestrin C.S.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–794. ACM, San Francisco (2016)

    Google Scholar 

  16. Cui, W.F., Chen, T.S., Fields, C.T., et al.: Revisiting assumptions for website fingerprinting attacks. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 328–339. ACM, London (2019)

    Google Scholar 

  17. Guan, Z.F., Xiong, G.S., Gou, G.T., et al.: BAPM: block attention profiling model for multi-tab website fingerprinting attacks on tor. In: Annual Computer Security Applications Conference, pp. 248–259. IEEE, USA (2021)

    Google Scholar 

  18. Clevert, D.A.F., Unterthiner, T.S., Hochreiter, S.T.: Fast and accurate deep network learning by exponential linear units (elus). arXiv preprint arXiv:1511.07289 (2015)

  19. Vaswani, A.F., Shazeer, N.S., Parmar, N.T., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30, pp. 5998‒6008 (2017)

    Google Scholar 

  20. Creswell, A., White, T., Dumoulin, V., Arulkumaran, K., Sengupta, B., Bharath, A.A.: Generative adversarial networks: an overview. IEEE Signal Process. Mag. 35(1), 53–65 (2018). https://doi.org/10.1109/MSP.2017.2765202

    Article  Google Scholar 

  21. Wang, Y., Haitao, X., Guo, Z., Qin, Z., Ren, K.: SnWF: website fingerprinting attack by ensembling the snapshot of deep learning. IEEE Trans. Inf. Forensics Secur. 17, 1214–1226 (2022). https://doi.org/10.1109/TIFS.2022.3158086

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 62201576, No. U1833107), the Fundamental Research Funds for the Central Universities (No. 3122022050), the Open Fund of the Information Security Evaluation Center of Civil Aviation University of China (ISECCA-202202), and the Discipline Development Funds of Civil Aviation University of China.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hongyu Yang , Ze Hu or Xiang Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xie, L. et al. (2024). A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement. In: Ge, C., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2023. Lecture Notes in Computer Science, vol 14526. Springer, Singapore. https://doi.org/10.1007/978-981-97-0942-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0942-7_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0941-0

  • Online ISBN: 978-981-97-0942-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics