skip to main content
10.1145/3532105.3535015acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article
Public Access

A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception

Published: 08 June 2022 Publication History

Abstract

While encryption can protect network traffic against simple on-path eavesdropping attacks, it cannot prevent sophisticated traffic analysis (TA) attacks from inferring sensitive information. TA attackers utilize machine learning algorithms to learn the traffic patterns of a communication (e.g., a website visit) and then use these learned patterns to accurately identify similar communications (which website is being visited by a targeted user), even though packets are encrypted. In this paper, we propose a novel and effective defense approach to protect users' privacy against TA attacks. The proposed approach is based on two proactive defense paradigms: multipath routing and deception. The route randomization strategy distributes packets of a flow on multiple paths between a source and destination to restrict the amount of traffic that a TA adversary can collect from a flow. The deception strategy augments the randomization strategy by injecting fake packets among the real packets of a flow on different paths. Our focal research problem is to identify the optimal strategies for how real and fake packets must be distributed on multiple paths with different capacities to achieve maximum effectiveness against TA attacks. We formalize the problem as a zero-sum game and show that the water-filling distribution of real and fake packets provides an optimal defense solution. Through theoretical and experimental studies, we demonstrate that the proposed approach can significantly degrade the accuracy of the TA attacks. Unlike other defensive approaches in the literature, our approach works without manipulating the production traffic (e.g., delaying packets or padding), or requiring any real-time information about the protected traffic flows.

Supplementary Material

MP4 File (SACMAT_2022.mp4)
Web privacy-enhancing technologies preserve the users? privacy which could be compromised by the adversaries eavesdropping on victims? online behavior. Traffic analysis (TA) attacks are a class of ever-growing side-channel attacks that rely on sophisticated machine-learning and deep-learning algorithms to classify the encrypted packets based on unencryptable features such as packet lengths, counts, and timing. Conventional encryption or detection-based defense paradigms are not sufficient to address new challenges. In this research, two main security paradigms including route randomization and fake packet injection are combined to provide further privacy for the users. The interaction between a defender and an attacker is modeled as a zero-sum game and proved that the water-filling distribution yields the optimal distribution strategy from both theoretical and experimental points of view.

References

[1]
alexa.com. [n.d.]. Alexa Top Websites. https://https://www.alexa.com/
[2]
John S Atkinson, O Adetoye, Miguel Rio, John E Mitchell, and George Matich. 2013. Your WiFi is leaking: Inferring user behaviour, encryption irrelevant. In IEEE Wireless Communications and Networking Conference. 1097--1102.
[3]
Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, and Don Towsley. 2020. Practical traffic analysis attacks on secure messaging applications. arXiv preprint arXiv:2005.00508 (2020).
[4]
Mike Belshe, Roberto Peon, and Martin Thomson. 2015. RFC 7540: hypertext transfer protocol version 2 (HTTP/2). Internet Engineering Task Force (2015).
[5]
Antra Bhardwaj and Hosam El-Ocla. 2020. Multipath routing protocol using genetic algorithm in mobile adhoc networks. IEEE Access, Vol. 8 (2020), 177534--177548.
[6]
Sanjit Bhat, David Lu, Albert Hyukjae Kwon, and Srinivas Devadas. 2019. Var-cnn: A data-efficient website fingerprinting attack based on deep learning. (2019).
[7]
Igor Bisio, Chiara Garibotto, Fabio Lavagetto, Andrea Sciarrone, and Sandro Zappatore. 2018. Unauthorized amateur UAV detection based on WiFi statistical fingerprint analysis. IEEE Communications Magazine, Vol. 56, 4 (2018), 106--111.
[8]
Xiang Cai, Rishab Nithyanand, and Rob Johnson. 2014a. Cs-buflo: A congestion sensitive website fingerprinting defense. In 13th Workshop on Privacy in the Electronic Society. 121--130.
[9]
Xiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, and Ian Goldberg. 2014b. A systematic approach to developing and evaluating website fingerprinting defenses. In ACM SIGSAC CCS. 227--238.
[10]
Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. 2012. Touching from a distance: Website fingerprinting attacks and defenses. In 2012 ACM conference on Computer and communications security. ACM, 605--616.
[11]
Zigang Cao, Gang Xiong, Yong Zhao, Zhenzhen Li, and Li Guo. 2014. A survey on encrypted traffic classification. In International Conference on Applications and Techniques in Information Security. Springer, 73--81.
[12]
Giovanni Cherubin, Jamie Hayes, and Marc Juárez. 2017. Website Fingerprinting Defenses at the Application Layer. Proc. Priv. Enhancing Technol., Vol. 2017, 2 (2017), 186--203.
[13]
Wladimir De la Cadena, Asya Mitseva, Jens Hiller, Jan Pennekamp, Sebastian Reuter, Julian Filter, Thomas Engel, Klaus Wehrle, and Andriy Panchenko. 2020. Trafficsliver: Fighting website fingerprinting attacks with traffic splitting. In 2020 ACM SIGSAC Conference on Computer and Communications Security. 1971--1985.
[14]
Kevin P Dyer, Scott E Coull, Thomas Ristenpart, and Thomas Shrimpton. 2012. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In 2012 IEEE symposium on security and privacy. IEEE, 332--346.
[15]
Fabian Pedregosa ηl. 2011. Scikit-learn: Machine Learning in Python. J. Mach. Learn. Res., Vol. 12 (2011), 2825--2830.
[16]
Saman Feghhi and Douglas J Leith. 2016. A web traffic analysis attack using only timing information. IEEE Transactions on Information Forensics and Security, Vol. 11, 8 (2016), 1747--1759.
[17]
Taher Ahmed Ghaleb. 2016. Techniques and countermeasures of website/wireless traffic analysis and fingerprinting. Cluster Computing, Vol. 19, 1 (2016), 427--438.
[18]
Jamie Hayes and George Danezis. 2016. k-fingerprinting: A robust scalable website fingerprinting technique. In USENIX Security. 1187--1203.
[19]
Sébastien Henri, Ginés Garc'ia-Avilés, Pablo Serrano, Albert Banchs, and Patrick Thiran. 2020. Protecting against website fingerprinting with multihoming. Proceedings on Privacy Enhancing Technologies 2 (2020), 89--110.
[20]
Dominik Herrmann, Rolf Wendolsky, and Hannes Federrath. 2009. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial na"ive-bayes classifier. In ACM workshop on Cloud computing security. 31--42.
[21]
Chengshang Hou, Gaopeng Gou, Junzheng Shi, Peipei Fu, and Gang Xiong. 2020. WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning. In IEEE Symposium on Computers and Communications. IEEE, 1--7.
[22]
Rebekah Houser, Zhou Li, Chase Cotton, and Haining Wang. 2019. An investigation on information leakage of DNS over TLS. In 15th International Conference on Emerging Networking Experiments And Technologies. 123--137.
[23]
Jafar Haadi Jafarian, Ehab Al-Shaer, and Qi Duan. 2013. Formal approach for route agility against persistent attackers. In European Symposium on Research in Computer Security. Springer, 237--254.
[24]
Rob Jansen, Marc Juarez, Rafa Galvez, Tariq Elahi, and Claudia Diaz. 2018. Inside Job: Applying Traffic Analysis to Measure Tor from Within. In NDSS .
[25]
Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, and Matthew Wright. 2016. Toward an efficient website fingerprinting defense. In European Symposium on Research in Computer Security. Springer, 27--46.
[26]
Jawad Khalife, Amjad Hajjar, and Jesus Diaz-Verdejo. 2014. A multilevel taxonomy and requirements for an optimal traffic-classification model. International Journal of Network Management, Vol. 24, 2 (2014), 101--120.
[27]
Liaqat Ali Khan, Muhammad Shamim Baig, and Amr M Youssef. 2010. Speaker recognition from encrypted VoIP communications. digital investigation, Vol. 7, 1--2 (2010), 65--73.
[28]
Marc Liberatore and Brian Neil Levine. 2006. Inferring the source of encrypted HTTP connections. In 13th ACM conference on Computer and communications security. ACM, 255--263.
[29]
David Lu, Sanjit Bhat, Albert Kwon, and Srinivas Devadas. 2018. Dynaflow: An efficient website fingerprinting defense based on dynamically-adjusting flows. In 2018 Workshop on Privacy in the Electronic Society. 109--113.
[30]
Brad Miller, Ling Huang, Anthony D Joseph, and J Doug Tygar. 2014. I know why you went to the clinic: Risks and realization of https traffic analysis. In International Symposium on Privacy Enhancing Technologies. Springer, 143--163.
[31]
Baiju Muthukadan. 2018. Selenium with python. Retrieved Jan, Vol. 23 (2018), 2019.
[32]
Milad Nasr, Alireza Bahramali, and Amir Houmansadr. 2018. Deepcorr: Strong flow correlation attacks on Tor using deep learning. In 2018 ACM SIGSAC Conference on Computer and Communications Security. 1962--1976.
[33]
Milad Nasr, Alireza Bahramali, and Amir Houmansadr. 2021. Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations. In USENIX Security 21. 2705--2722.
[34]
Se Eun Oh, Saikrishna Sunkam, and Nicholas Hopper. 2019. p1-fp: Extraction, classification, and prediction of website fingerprints with deep learning. Proceedings on Privacy Enhancing Technologies 3 (2019).
[35]
Andriy Panchenko, Fabian Lanze, Jan Pennekamp, Thomas Engel, Andreas Zinnen, Martin Henze, and Klaus Wehrle. 2016. Website Fingerprinting at Internet Scale. In NDSS .
[36]
Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel. 2011. Website fingerprinting in onion routing based anonymization networks. In 10th annual ACM workshop on Privacy in the electronic society. 103--114.
[37]
Abdullah Qasem, Sami Zhioua, and Karima Makhlouf. 2019. Finding a needle in a haystack: The traffic analysis version. Proceedings on Privacy Enhancing Technologies 2 (2019), 270--290.
[38]
Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, and Matthew Wright. 2020. Mockingbird: Defending against deep-learning-based website fingerprinting attacks with adversarial traces. IEEE Transactions on Information Forensics and Security, Vol. 16 (2020), 1594--1609.
[39]
Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom Van Goethem, and Wouter Joosen. 2017. Automated website fingerprinting through deep learning. arXiv preprint arXiv:1708.06376 (2017).
[40]
Lu Ruan and Yanwei Zheng. 2014. Dynamic survivable multipath routing and spectrum allocation in OFDM-based flexible optical networks. Journal of Optical Communications and Networking, Vol. 6, 1 (2014), 77--85.
[41]
scikit learn.org. [n.d.]. sklearn.modelselection.GridSearchC. https://scikit-learn.org/stable/modules/generated/sklearn.model_selection.GridSearchCV.html
[42]
Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, and Ben Y Zhao. 2021. A Real-time Defense against Website Fingerprinting Attacks. arXiv preprint arXiv:2102.04291 (2021).
[43]
Payap Sirinam, Mohsen Imani, Marc Juarez, and Matthew Wright. 2018. Deep fingerprinting: Undermining website fingerprinting defenses with deep learning. In 2018 ACM SIGSAC Conference on Computer and Communications Security. 1928--1943.
[44]
Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective attacks and provable defenses for website fingerprinting. In USENIX Security 14. 143--157.
[45]
Tao Wang and Ian Goldberg. 2017. Walkie-talkie: An efficient defense against passive website fingerprinting attacks. In USENIX Security 17. 1375--1390.
[46]
Charles V Wright, Scott E Coull, and Fabian Monrose. 2009. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. In NDSS, Vol. 9.
[47]
Chengwen Xing, Yindi Jing, Shuai Wang, Shaodan Ma, and H Vincent Poor. 2020. New viewpoint and algorithms for water-filling solutions in wireless communications. IEEE Transactions on Signal Processing, Vol. 68 (2020), 1618--1634.
[48]
Fan Zhang, Wenbo He, Xue Liu, and Patrick G Bridges. 2011. Inferring users' online activities through traffic analysis. In fourth ACM conference on Wireless network security. ACM, 59--70.
[49]
Zan Zhou, Changqiao Xu, Xiaohui Kuang, Tao Zhang, and Limin Sun. 2019. An efficient and agile spatio-temporal route mutation moving target defense mechanism. In IEEE International Conference on Communications. 1--6.

Cited By

View all
  • (2024)Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple PathsCryptography10.3390/cryptography80200228:2(22)Online publication date: 28-May-2024
  • (2024)Darknet Traffic Analysis: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2024.337376912(42423-42452)Online publication date: 2024
  • (2024)Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSNMultimedia Tools and Applications10.1007/s11042-024-19516-xOnline publication date: 15-Jun-2024
  • Show More Cited By

Index Terms

  1. A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SACMAT '22: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies
    June 2022
    282 pages
    ISBN:9781450393577
    DOI:10.1145/3532105
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 June 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cyber deception
    2. machine learning
    3. multipath routing
    4. traffic analysis
    5. water-filling

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    SACMAT '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 177 of 597 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)211
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple PathsCryptography10.3390/cryptography80200228:2(22)Online publication date: 28-May-2024
    • (2024)Darknet Traffic Analysis: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2024.337376912(42423-42452)Online publication date: 2024
    • (2024)Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSNMultimedia Tools and Applications10.1007/s11042-024-19516-xOnline publication date: 15-Jun-2024
    • (2024)Exploring the Synergy of Blockchain, IoT, and Edge Computing in Smart Traffic Management across Urban LandscapesJournal of Grid Computing10.1007/s10723-024-09762-622:2Online publication date: 17-Apr-2024
    • (2024)Intrusion Detection using Federated Attention Neural Network for Edge Enabled Internet of ThingsJournal of Grid Computing10.1007/s10723-023-09725-322:1Online publication date: 20-Jan-2024
    • (2024)Non-cooperative game theory with generative adversarial network for effective decision-making in military cyber warfareAnnals of Operations Research10.1007/s10479-024-06406-6Online publication date: 28-Nov-2024
    • (2024)Evolutionary game theory with deep learning-based target detection and tracking in sensor networksAnnals of Operations Research10.1007/s10479-024-06379-6Online publication date: 11-Nov-2024
    • (2023)A Formal Representation for Intelligent Decision-Making in GamesMathematics10.3390/math1122456711:22(4567)Online publication date: 7-Nov-2023
    • (2023)PWR: Path Weighted Random Scheme in Multipath Traffic Splitting Against Website FingerprintingIEEE Access10.1109/ACCESS.2023.331536011(101273-101285)Online publication date: 2023
    • (2023)Towards an efficient model for network intrusion detection system (IDS): systematic literature reviewWireless Networks10.1007/s11276-023-03495-230:1(453-482)Online publication date: 14-Sep-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media