journal article Feb 02, 2024

Joint Alignment Networks For Few-Shot Website Fingerprinting Attack

View at Publisher Save 10.1093/comjnl/bxae009
Abstract
Abstract
Website fingerprinting (WF) attacks based on deep neural networks pose a significant threat to the privacy of anonymous network users. However, training a deep WF model requires many labeled traces, which can be labor-intensive and time-consuming, and models trained on the originally collected traces cannot be directly used for the classification of newly collected traces due to the concept drift caused by the time gap in the data collection. Few-shot WF attacks are proposed for using the originally and few-shot newly collected labeled traces to facilitate anonymous trace classification. However, existing few-shot WF attacks ignore the fine-grained feature alignment to eliminate the concept drift in the model training, which fails to fully use the knowledge of labeled traces. We propose a novel few-shot WF attack called Joint Alignment Networks (JAN), which conducts fine-grained feature alignment at both semantic-level and feature-level. Specifically, JAN minimizes a distribution distance between originally and newly collected traces in the feature space for feature-level alignment, and utilizes two task-specific classifiers to detect unaligned traces and force these traces mapped within decision boundaries for semantic-level alignment. Extensive experiments on public datasets show that JAN outperforms the state-of-the-art few-shot WF methods, especially in the difficult 1-shot tasks.
Topics

No keywords indexed for this article. Browse by subject →

References
42
[1]
Mathews "Sok: A critical evaluation of efficient website fingerprinting defenses" (2023) 10.1109/sp46215.2023.10179289
[2]
Li "Measuring information leakage in website fingerprinting attacks and defenses" (2018)
[3]
Brinson "Dark web forensics: An investigation of tracking dark web activity with digital forensics" (2022) 10.1109/irtm54583.2022.9791646
[4]
Feng "Strong anonymous communication system based on segment routing over sdn" Comput. J. (2022)
[5]
Syverson "Tor: The secondgeneration onion router" (2004)
[6]
Shen "Machine learning-powered encrypted network traffic analysis: a comprehensive survey" IEEE Commun. Surv. Tutorials (2023) 10.1109/comst.2022.3208196
[7]
Wang "Effective attacks and provable defenses for website fingerprinting" (2014)
[8]
Sirinam "Deep fingerprinting: Undermining website fingerprinting defenses with deep learning" (2018) 10.1145/3243734.3243768
[9]
Han "Detecting proxy user based on communication behavior portrait" Comput. J. (2019) 10.1093/comjnl/bxz065
[10]
Wang "Attacks and defenses in user authentication systems: a survey" J. Netw. Comput. Appl. (2021) 10.1016/j.jnca.2021.103080
[11]
Hayes "k-fingerprinting: A robust scalable website fingerprinting technique" (2016)
[12]
Panchenko "Website fingerprinting at internet scale" (2016) 10.14722/ndss.2016.23477
[13]
Deep learning

Yann LeCun, Yoshua Bengio, Geoffrey Hinton

Nature 2015 10.1038/nature14539
[14]
Graves (2012)
[15]
ImageNet classification with deep convolutional neural networks

Alex Krizhevsky, Ilya Sutskever, Geoffrey E. Hinton

Communications of the ACM 2017 10.1145/3065386
[16]
Bao "Evidential deep learning for open set action recognition" (2021)
[17]
Rimmer "Automated website fingerprinting through deep learning" (2018) 10.14722/ndss.2018.23105
[18]
Bhat "Var-cnn: a data-efficient website fingerprinting attack based on deep learning" Proc. Priv. Enhancing Technol. (2019) 10.2478/popets-2019-0070
[19]
Juarez "Toward an efficient website fingerprinting defense" (2016)
[20]
Sirinam "Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning" (2019) 10.1145/3319535.3354217
[21]
Chen "Few-shot website fingerprinting attack" Comput. Netw. (2021) 10.1016/j.comnet.2021.108298
[22]
Chen "Few-shot website fingerprinting attack with meta-bias learning" Pattern Recognit. (2022) 10.1016/j.patcog.2022.108739
[23]
Zhou "Few-shot website fingerprinting attack with cluster adaptation" Comput. Netw. (2023) 10.1016/j.comnet.2023.109780
[24]
Juarez "A critical evaluation of website fingerprinting attacks" (2014) 10.1145/2660267.2660368
[25]
Saleh "Shedding light on the dark corners of the internet: a survey of tor research" J. Netw. Comput. Appl. (2018) 10.1016/j.jnca.2018.04.002
[26]
Kaaniche "Privacy enhancing technologies for solving the privacy-personalization paradox: taxonomy and survey" J. Netw. Comput. Appl. (2020) 10.1016/j.jnca.2020.102807
[27]
Wang "Snwf: website fingerprinting attack by ensembling the snapshot of deep learning" IEEE Trans. Inf. Forensics Secur. (2022) 10.1109/tifs.2022.3158086
[28]
Wang "On realistically attacking tor with website fingerprinting" Proc. Priv. Enhancing Technol. (2016) 10.1515/popets-2016-0027
[29]
Cai "A systematic approach to developing and evaluating website fingerprinting defenses" (2014) 10.1145/2660267.2660362
[30]
Aminuddin "The rise of website fingerprinting on tor: analysis on techniques and assumptions" J. Netw. Comput. Appl. (2023) 10.1016/j.jnca.2023.103582
[31]
Cherubin "Online website fingerprinting: Evaluating website fingerprinting attacks on tor in the real world" (2022)
[32]
Lan "Darknetsec: a novel self-attentive deep learning method for darknet traffic classification and application identification" Comput. Secur. (2022) 10.1016/j.cose.2022.102663
[33]
Chen "Few-shot website fingerprinting attack with data augmentation" Secur. Commun. Netw. (2021)
[34]
Hoffer "Deep metric learning using triplet network" (2015) 10.1007/978-3-319-24261-3_7
[35]
Sun "Meta-transfer learning for few-shot learning" (2019)
[36]
Learning representations by back-propagating errors

David E. Rumelhart, Geoffrey E. Hinton, Ronald J. Williams

Nature 1986 10.1038/323533a0
[37]
Gretton "Optimal kernel choice for large-scale two-sample tests" Adv. Neural Inf. Process. Syst. (2012)
[38]
Integrating structured biological data by Kernel Maximum Mean Discrepancy

Karsten M. Borgwardt, Arthur Gretton, Malte J. Rasch et al.

Bioinformatics 2006 10.1093/bioinformatics/btl242
[39]
Yin "An automated multi-tab website fingerprinting attack" IEEE Trans. Dependable Secure Comput. (2021) 10.1109/tdsc.2021.3104869
[40]
Kingma "Adam: a method for stochastic optimization" ICLR (Poster) (2015)
[41]
Van der Maaten "Visualizing data using t-sne" J. Mach. Learn. Res. (2008)
[42]
Ben-David "Analysis of representations for domain adaptation" (2006)
Metrics
6
Citations
42
References
Details
Published
Feb 02, 2024
Vol/Issue
67(6)
Pages
2331-2345
License
View
Funding
National Natural Science Foundation of China Award: 62372105
Leading-Edge Technology Program of Jiangsu Natural Science Foundation Award: BK20202001
Basic Science (Natural Science) Research Projects in Higher Education Institutions in Jiangsu Province Award: 23KJB520004
Cite This Article
Qiang Zhou, Liangmin Wang, Huijuan Zhu, et al. (2024). Joint Alignment Networks For Few-Shot Website Fingerprinting Attack. The Computer Journal, 67(6), 2331-2345. https://doi.org/10.1093/comjnl/bxae009
Related

You May Also Like

A Simplex Method for Function Minimization

J. A. Nelder, R. Mead · 1965

28,583 citations

Function minimization by conjugate gradients

R. Fletcher · 1964

3,790 citations

A Rapidly Convergent Descent Method for Minimization

R. Fletcher, M. J. D. Powell · 1963

3,739 citations

A new approach to variable metric algorithms

R. Fletcher · 1970

3,216 citations