Matthew Wright, PhD Director of the Center for Cybersecurity Professor of Computing Security Rochester Institute of Technology
http://www.rit.edu/cybersecurity
Matthew Wright, PhD Director of the Center for Cybersecurity - - PowerPoint PPT Presentation
http://www.rit.edu/cybersecurity Matthew Wright, PhD Director of the Center for Cybersecurity Professor of Computing Security Rochester Institute of Technology Center Mission Research Interdisciplinary Real-world Human-centered
http://www.rit.edu/cybersecurity
Research
research
happen
Mehdi Mirakhorli Andy Meneely
Katie McConky
Peizhao Hu Marcin Lukowiak Ziming Zhao
Tijay Chung Hanif Rahbari Ziming Zhao
http://www.rit.edu/cybersecurity
https://turtlehealth.com/shell
Reading up on my athlete’s shell symptoms.
Encrypted Connection
Shelly
Encrypted Connection
Oh, what’s this? Broken shells! I can’t read it! Sheldon Shelly
https://turtlehealth.com/shell
http://www.nickandmore.com/wordpress/wp-content/uploads/2013/08/cover.jpg
DB P1 P2 P1 P2 Shredder
https://turtlehealth.com/shell https://turtlehealth.com/tail
Ah! A match for P1! P1 P2
Shelly
https://turtlehealth.com/shell
Po Possible At Attackers ISP AS Website
Client Webserver Guard Middle Exit
Attacker
16
17
Pre Predict ct
18
Heh! Nice try J
P1 Tor (unpadded) P1 Tor w/ Adaptive Padding
Un Undermining Website Fingerprinting De Defenses wi with De Deep Learning
Payap Sirinam Rochester Institute of Technology Mohsen Imani University of Texas at Arlington Marc Juarez imec-COSIC KU Leuven, Belgium Matthew Wright Rochester Institute of Technology Payap Mohsen Marc
24
https://codeburst.io/deep-learning-what-why-dd77d432f182
http://arcticicekennels.tripod.com/puppies.html
Trained!
28
29
Mo Monitore red
facebook.com humanright.com …..
Cl Closed-Wor World d Scenar enario
ccuracy cy of the attack
[JAA14] Juarez et al. A critical evaluation of website fingerprinting attacks., CCS 2014
30
Op Open-Wor World d Scenar enario
cisi sion and Reca call [JAA14 , PLZ16 ]
[JAA14] Juarez et al. A critical evaluation of website fingerprinting attacks., CCS 2014 [PLZ16] Panchenko et al. Website fingerprinting at internet scale., NDSS 2016
31
32
[WCN14] Wang et al. Effective attacks and provable defenses for website fingerprinting., USENIX 2014 [PLZ16] Panchenko et al. Website fingerprinting at internet scale., NDSS 2016 [HD16] Hayes and Danezis. k-Fingerprinting: A robust scalable website fingerprinting technique., USENIX 2016.
33
Ad Add dummy packets De Delay packets
34
[JIP16] Juarez et al. Toward an efficient website fingerprinting defense., ESORIC2016. [PER15] Mike Perry. Padding negotiation. Tor protocol specification., 2015.
35
[WG17] Wang and Goldberg. Walkie-talkie: An efficient defense against passive website fingerprinting attacks. USENIX 2017
36
[RPJ18] Rimmer et al. Automated website fingerprinting through deep learning., NDSS2018
37
https://stats.stackexchange.com/questions/188277/activation-function-for-first-layer-nodes-in-an-ann https://www.digitaltrends.com/cool-tech/what-is-an-artificial-neural-network/
Right? Wrong?
38
https://stats.stackexchange.com/questions/188277/activation-function-for-first-layer-nodes-in-an-ann https://www.digitaltrends.com/cool-tech/what-is-an-artificial-neural-network/
39
Al AlexNet (2 (2012) ~55% Accuracy VG VGG19 (2014) ~71% Accuracy In Inceptio tion V4 (2016) ~80% Accuracy
Canziani et al. An Analysis of Deep Neural Network Models for Practical Applications., arXiv:1605.07678
40
CNN CNN Model Effective
e.g. ~80 Accuracy
Effective?
Original Distorted
CNN CNN Model
41
42
#Filters growing Low-level High-level
Ze Zeiler and and Fe Fergus. . “Visualizing and understa tanding convoluti tional net networ
, 2014.
Deeper layers
Image Network Traffic
43
DF DF Model (O (Our) r) AW AWF M Model (Ri Rimmer et et al. al.)
44
DF DF Model (O (Our) r) AW AWF M Model (Ri Rimmer et et al. al.)
45
DF DF Model (O (Our) r) AW AWF M Model (Ri Rimmer et et al. al.)
46
Gradient Descent
https://saugatbhattarai.com.np/what-is-gradient-descent-in-machine-learning/ https://towardsdatascience.com/gradient-descent-in-a-nutshell-eaf8c18212f0 https://medium.com/@julian.harris/stochastic-gradient-descent-in-plain-english-9e6c10cdba97
BN: 1 ft. max
47
https://stats.stackexchange.com/questions/201569/difference-between-dropout-and-dropconnect
Train Test
48
~3X deeper
DF DF Model (O (Our) r) AW AWF M Model (Ri Rimmer et et al. al.)
49
Non-def defended ended Dat atas aset et
50
Walkie-Ta Talkie
Theoretical Maximum Accuracy
51
WTF-PAD PAD
52
At most st 50% accu ccura racy cy in cl close sed worl rld
Top-N N prediction
Re Real Site Deco coy y Site
DF DF: Top-2 2 pr predi ediction
98.44 44 Accur urac acy
53
54
Effective?
Distorted
CNN CNN Model
Network Traffic with Defenses
DF DF Model >90% Accuracy (WTF-PAD)
This material is based upon work supported by the National Science Foundation under Grant No. CNS-1423163, CNS-1722473, and CNS-1816851. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.
57
Deep Fingerprinting
Undermining Website Fingerprinting Defenses with Deep Learning
https://github.com/deep-fingerprinting/df