32
Tor website fingerprinting Website fingerprinting attacks against Tor Browser Bundle: a comparison between HTTP/1.1 and HTTP/2 T.T.N. Marks BSc. K.C.N. Halvemaan BSc. University of Amsterdam System and Network Engineering Research Project #1 February 8, 2017

Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

  • Upload
    others

  • View
    4

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Website fingerprinting attacks against Tor BrowserBundle a comparison between HTTP11 and

HTTP2

TTN Marks BScKCN Halvemaan BSc

University of Amsterdam

System and Network EngineeringResearch Project 1

February 8 2017

Tor website fingerprinting

Overview

1 IntroductionResearch questionsHTTP2How does Tor work

2 Related work

3 MethodURLsScraping with TBBProblems after scrapingConverting packet captures to tracesTraining the SVM

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Introduction

Introduction

1 Tor The second generation onion router

2 rdquoTor is free software and an open network that helps youdefend against traffic analysis a form of networksurveillance that threatens personal freedom and privacyconfidential business activities and relationships and statesecurityrdquo1

3 Often used as part of the Tor Browser Bundle (TBB)

1httpswwwtorprojectorg retrieved on 2017-02-02

Tor website fingerprinting

Introduction

Problem statement

1 Website fingerprinting possible despite encryption andobfuscation techniques

2 An eavesdropper might learn which website you have visitedbased on the meta data of the encrypted TCPIP stream

3 The web is moving from HTTP11 to HTTP2 what doesthis mean for website fingerprinting

4 HTTP2 still disabled in the TBB by default because code isnot audited and possible security implications are unclear

Tor website fingerprinting

Introduction

Research questions

Research questions

1 Can a website fingerprinting attack be done on a TBBenabled with HTTP2

2 Is there a difference in website fingerprinting attacks on aTBB enabled with just HTTP11 and a TBB enabled withHTTP2

Tor website fingerprinting

Introduction

HTTP2

What is new in HTTP2

1 Mandatory HTTPS in all major browsers (de facto standard2)

2 Data compression of HTTP headers

3 Prioritisation of requests

4 Multiplexing multiple requests over a single TCPIPconnection

2httpshttp2githubiofaqdoes-http2-require-encryptionretrieved on 2017-02-03

Tor website fingerprinting

Introduction

How does Tor work

How Tor works

Tor website fingerprinting

Introduction

How does Tor work

Website fingerprinting

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 2: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Overview

1 IntroductionResearch questionsHTTP2How does Tor work

2 Related work

3 MethodURLsScraping with TBBProblems after scrapingConverting packet captures to tracesTraining the SVM

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Introduction

Introduction

1 Tor The second generation onion router

2 rdquoTor is free software and an open network that helps youdefend against traffic analysis a form of networksurveillance that threatens personal freedom and privacyconfidential business activities and relationships and statesecurityrdquo1

3 Often used as part of the Tor Browser Bundle (TBB)

1httpswwwtorprojectorg retrieved on 2017-02-02

Tor website fingerprinting

Introduction

Problem statement

1 Website fingerprinting possible despite encryption andobfuscation techniques

2 An eavesdropper might learn which website you have visitedbased on the meta data of the encrypted TCPIP stream

3 The web is moving from HTTP11 to HTTP2 what doesthis mean for website fingerprinting

4 HTTP2 still disabled in the TBB by default because code isnot audited and possible security implications are unclear

Tor website fingerprinting

Introduction

Research questions

Research questions

1 Can a website fingerprinting attack be done on a TBBenabled with HTTP2

2 Is there a difference in website fingerprinting attacks on aTBB enabled with just HTTP11 and a TBB enabled withHTTP2

Tor website fingerprinting

Introduction

HTTP2

What is new in HTTP2

1 Mandatory HTTPS in all major browsers (de facto standard2)

2 Data compression of HTTP headers

3 Prioritisation of requests

4 Multiplexing multiple requests over a single TCPIPconnection

2httpshttp2githubiofaqdoes-http2-require-encryptionretrieved on 2017-02-03

Tor website fingerprinting

Introduction

How does Tor work

How Tor works

Tor website fingerprinting

Introduction

How does Tor work

Website fingerprinting

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 3: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Introduction

Introduction

1 Tor The second generation onion router

2 rdquoTor is free software and an open network that helps youdefend against traffic analysis a form of networksurveillance that threatens personal freedom and privacyconfidential business activities and relationships and statesecurityrdquo1

3 Often used as part of the Tor Browser Bundle (TBB)

1httpswwwtorprojectorg retrieved on 2017-02-02

Tor website fingerprinting

Introduction

Problem statement

1 Website fingerprinting possible despite encryption andobfuscation techniques

2 An eavesdropper might learn which website you have visitedbased on the meta data of the encrypted TCPIP stream

3 The web is moving from HTTP11 to HTTP2 what doesthis mean for website fingerprinting

4 HTTP2 still disabled in the TBB by default because code isnot audited and possible security implications are unclear

Tor website fingerprinting

Introduction

Research questions

Research questions

1 Can a website fingerprinting attack be done on a TBBenabled with HTTP2

2 Is there a difference in website fingerprinting attacks on aTBB enabled with just HTTP11 and a TBB enabled withHTTP2

Tor website fingerprinting

Introduction

HTTP2

What is new in HTTP2

1 Mandatory HTTPS in all major browsers (de facto standard2)

2 Data compression of HTTP headers

3 Prioritisation of requests

4 Multiplexing multiple requests over a single TCPIPconnection

2httpshttp2githubiofaqdoes-http2-require-encryptionretrieved on 2017-02-03

Tor website fingerprinting

Introduction

How does Tor work

How Tor works

Tor website fingerprinting

Introduction

How does Tor work

Website fingerprinting

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 4: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Introduction

Problem statement

1 Website fingerprinting possible despite encryption andobfuscation techniques

2 An eavesdropper might learn which website you have visitedbased on the meta data of the encrypted TCPIP stream

3 The web is moving from HTTP11 to HTTP2 what doesthis mean for website fingerprinting

4 HTTP2 still disabled in the TBB by default because code isnot audited and possible security implications are unclear

Tor website fingerprinting

Introduction

Research questions

Research questions

1 Can a website fingerprinting attack be done on a TBBenabled with HTTP2

2 Is there a difference in website fingerprinting attacks on aTBB enabled with just HTTP11 and a TBB enabled withHTTP2

Tor website fingerprinting

Introduction

HTTP2

What is new in HTTP2

1 Mandatory HTTPS in all major browsers (de facto standard2)

2 Data compression of HTTP headers

3 Prioritisation of requests

4 Multiplexing multiple requests over a single TCPIPconnection

2httpshttp2githubiofaqdoes-http2-require-encryptionretrieved on 2017-02-03

Tor website fingerprinting

Introduction

How does Tor work

How Tor works

Tor website fingerprinting

Introduction

How does Tor work

Website fingerprinting

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 5: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Introduction

Research questions

Research questions

1 Can a website fingerprinting attack be done on a TBBenabled with HTTP2

2 Is there a difference in website fingerprinting attacks on aTBB enabled with just HTTP11 and a TBB enabled withHTTP2

Tor website fingerprinting

Introduction

HTTP2

What is new in HTTP2

1 Mandatory HTTPS in all major browsers (de facto standard2)

2 Data compression of HTTP headers

3 Prioritisation of requests

4 Multiplexing multiple requests over a single TCPIPconnection

2httpshttp2githubiofaqdoes-http2-require-encryptionretrieved on 2017-02-03

Tor website fingerprinting

Introduction

How does Tor work

How Tor works

Tor website fingerprinting

Introduction

How does Tor work

Website fingerprinting

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 6: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Introduction

HTTP2

What is new in HTTP2

1 Mandatory HTTPS in all major browsers (de facto standard2)

2 Data compression of HTTP headers

3 Prioritisation of requests

4 Multiplexing multiple requests over a single TCPIPconnection

2httpshttp2githubiofaqdoes-http2-require-encryptionretrieved on 2017-02-03

Tor website fingerprinting

Introduction

How does Tor work

How Tor works

Tor website fingerprinting

Introduction

How does Tor work

Website fingerprinting

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 7: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Introduction

How does Tor work

How Tor works

Tor website fingerprinting

Introduction

How does Tor work

Website fingerprinting

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 8: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Introduction

How does Tor work

Website fingerprinting

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 9: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 10: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 11: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 12: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 13: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 14: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Related work

Related work

1 Fingerprinting encrypted HTTP traffic (Liberatore and Levine2006)

2 Extended to Tor by Herrmann et al (2009)

3 Improved by Panchenko et al (2011) by using a SupportVector Machine

4 Various defenses were discussed by Cai et al (2012) of whichthe rsquopadding defensersquo was implemented in Tor

5 A review of earlier methods was given in Wang and Goldberg(2013) their results were better but unrealistic setting

6 The previous work on Tor was done by looking at HTTP11traffic

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 15: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Method

Overview

1 Introduction

2 Related work

3 Method

4 Results

5 Conclusion

6 Discussion amp Future work

7 References

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 16: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Method

Overall Implementation

1 Get a list of websites supporting HTTP22 Visit each website 40 times in TBB for both HTTP11 and

HTTP21 Make packet capture and save corresponding HTTP Headers2 Convert packet captures to ldquotracesrdquo

3 Calculate distance between traces

4 Use distances to train a SVM and use it to predict unseentraces

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 17: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Method

URLs

URLs

1 Alexa top million websites of 2017-01-14

2 Test top 5000 with curl for HTTP2 responses

3 1110 of 5000 websites were HTTP2 capable

4 All Google TLDs were removed except rdquogooglecomrdquo

5 Top 130 of the HTTP2 enabled websites were retrieved

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 18: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Method

Scraping with TBB

Setup

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 19: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Method

Problems after scraping

Problems after scraping

1 Invalid captures that were removed from our sample1 Websites redirecting to plain http2 Websites using Cloudflare as they would show a captcha

screen by default3 Websites that failed to load completely more than 25 of the

time

2 Left us with 56 of 130 websites scraped

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 20: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Method

Converting packet captures to traces

Converting packet captures to traces

1 Based on method by Wang and Goldberg (2013)

2 Check HTTP Archive (HAR) content and verify HTTPversion and status OK

3 Filter out retransmitted and out-of-order TCPIP packets

4 One or more Tor cells in TCPIP packet extracted byrounding length of data in bytes to nearest multiple of 512and dividing by 512

5 Direction indicated with sign negative for incoming andpositive for outgoing

6 Resulting trace is a list of only 1rsquos and -1rsquos indicating thedirection order and frequency of Tor cells for a specificwebsite

7 Still some ldquonoiserdquo left in traces due to SENDME Tor cells

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 21: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Method

Training the SVM

Training the SVM

1 Distance between traces calculated with the optimal stringaligment distance (Wang and Goldberg 2013)

1 Took about four hours to compute on the DAS5supercomputer using 10 nodes (Bal et al 2016)

2 Train and test the SVM in closed world model1 36 training cases and 4 testing cases for each site2 10-fold cross validation with one accuracy value for each of the

folds so 10 accuracyrsquos per tested set

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 22: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 23: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 24: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Results

Results

TrainTest

HTTP11 HTTP2

HTTP11 x = 88036 s = 20164 x = 64687 s = 66631

HTTP2 x = 54667 s = 35286 x = 86485 s = 30871

1 HTTP11 by Wang and Goldberg (2013) x = 90 s = 6

2 Paired t-test of accuracyrsquos between the HTTP11 andHTTP2 sets pvalue = 019392 with α = 005The difference is not statistically significant pvalue gt α

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 25: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Conclusion

Conclusion

1 It is possible to do a website fingerprinting attack on a TBBenabled with HTTP2 in a closed-world scenario

2 For a website fingerprinting attack on a TBB enabled withHTTP2 the decrease in accuracy was minimal compared to aTBB enabled with just HTTP11

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 26: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Discussion amp Future work

Discussion amp Future work

1 Closed-world scenario not realistic and experiments do notconform with human browsing habits (Juarez et al 2014)

2 Some websites are hard to fingerprint due to AB testinglocalisation andor random content

3 An attacker would need to continually keep his modelup-to-date due to changing websites

4 HTTP2 prioritisation could be used to randomise traffic andincrease fingerprinting difficulty

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 27: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Discussion amp Future work

Thank you for listening

Thank you for listeningAre there any questions

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 28: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

Discussion amp Future work

Optimal string aligment distance

Figure As in Appendix B of Wang and Goldberg (2013)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 29: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

References

References I

rdquoHow Tor worksrdquo images on slides 7 based on rdquoHow Tor Worksrdquoimages from httpswwwtorprojectorgaboutoverviewDevil Py Coding Monitor and Onion icons in figure on slide 8 13and 7 made by Freepik from wwwflaticoncom and is licensed byCC 30 BYServer and Folder icons in figure on slide 13 and 7 made byMadebyoliver from wwwflaticoncom and is licensed by CC 30 BY

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 30: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

References

References II

Henri Bal Dick Epema Cees de Laat Rob van Nieuwpoort JohnRomein Frank Seinstra Cees Snoek and Harry Wijshoff Amedium-scale distributed system for computer science researchInfrastructure for the long term Computer 49(5)54ndash63 2016

Xiang Cai Xin Cheng Zhang Brijesh Joshi and Rob JohnsonTouching from a distance Website fingerprinting attacks anddefenses In Proceedings of the 2012 ACM conference onComputer and communications security pages 605ndash616 ACM2012

Dominik Herrmann Rolf Wendolsky and Hannes FederrathWebsite fingerprinting attacking popular privacy enhancingtechnologies with the multinomial naıve-bayes classifier InProceedings of the 2009 ACM workshop on Cloud computingsecurity pages 31ndash42 ACM 2009

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 31: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

References

References III

Marc Juarez Sadia Afroz Gunes Acar Claudia Diaz and RachelGreenstadt A critical evaluation of website fingerprintingattacks In Proceedings of the 2014 ACM SIGSAC Conferenceon Computer and Communications Security pages 263ndash274ACM 2014

Marc Liberatore and Brian Neil Levine Inferring the source ofencrypted http connections In Proceedings of the 13th ACMconference on Computer and communications security pages255ndash263 ACM 2006

Andriy Panchenko Lukas Niessen Andreas Zinnen and ThomasEngel Website fingerprinting in onion routing basedanonymization networks In Proceedings of the 10th annualACM workshop on Privacy in the electronic society pages103ndash114 ACM 2011

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References
Page 32: Website fingerprinting attacks against Tor Browser Bundle ... · Tor website ngerprinting Related work Related work 1 Fingerprinting encrypted HTTP tra c (Liberatore and Levine, 2006)

Tor website fingerprinting

References

References IV

Tao Wang and Ian Goldberg Improved website fingerprinting ontor In Proceedings of the 12th ACM workshop on Workshop onprivacy in the electronic society pages 201ndash212 ACM 2013

  • Introduction
    • Research questions
    • HTTP2
    • How does Tor work
      • Related work
      • Method
        • URLs
        • Scraping with TBB
        • Problems after scraping
        • Converting packet captures to traces
        • Training the SVM
          • Results
          • Conclusion
          • Discussion amp Future work
          • References