using traffic analysis
play

using Traffic Analysis Attacks Salini S K What is Traffic Analysis - PowerPoint PPT Presentation

Website Fingerprinting using Traffic Analysis Attacks Salini S K What is Traffic Analysis What is Traffic Analysis Wiki says What is Traffic Analysis Wiki says Process of intercepting and examining messages in order to deduce


  1. Website Fingerprinting using Traffic Analysis Attacks Salini S K

  2. What is Traffic Analysis

  3. What is Traffic Analysis Wiki says……

  4. What is Traffic Analysis Wiki says…… • Process of intercepting and examining messages in order to deduce information from patterns in communication. • Can be performed even when the messages are encrypted.

  5. Why do I care? • Your privacy is compromised – Attacker knows the site you are visiting – He knows how long you stay in the same site • Attacker can poison DNS cache accordingly and you may end up giving your credentials to a malicious site.

  6. Client making request to a webpage Unaware user Encrypted

  7. Client making request to a webpage Unaware user But not safe

  8. Attacker intercepts traffic

  9. Attacker intercepts traffic Attaaackk…

  10. Attacker intercepts traffic Can See • Packet length • Bandwidth • Average packets transferred/sec

  11. What will I do?

  12. What will I do? • Visit different websites and collect traffic traces (Data collection phase)

  13. What will I do? • Visit different websites and collect traffic traces (Data collection phase) • Extract features from training dataset (Training phase)

  14. What will I do? • Visit different websites and collect traffic traces (Data collection phase) • Extract features and train dataset (Training phase) • Test on random dataset. (Testing phase)

  15. What will I do? • Visit different websites and collect traffic traces (Data collection phase) • Extract features and train dataset (Training phase) • Test on random dataset. (Testing phase) Use machine learning

  16. What will I do? • Visit different websites and collect traffic traces (Data collection phase) • Extract features and train dataset (Training phase) • Test on random dataset. (Testing phase) 3 simple(???) steps

  17. Websites fingerprinted…

  18. Step 1

  19. Step 1 • Data collection:

  20. Step 1 • Data collection: - Used airodump-ng for collecting WPA- encrypted data - Used Wireshark to filter out traffic from a specific host

  21. Step 2

  22. Step 2 • Feature extraction

  23. Features considered… • Packet length • Inter-arrival time • Upstream Bandwidth • Downstream Bandwidth • Average Packets sent/sec • Average Packets received/sec

  24. Why such features?

  25. Why such features? - deduced based on trail and error method

  26. Bandwidth distribution for various websites

  27. Distribution of Average packet transferred/sec for various websites

  28. Step 3

  29. Step 3 • Training and Testing

  30. Step 3 • Training and Testing Used machine learning classifiers -Naïve Bayes Simple -Naïve Bayes -Decision tree

  31. Accuracy of Classification- using various classifiers Classifier Naïve Bayes 90% 100% 83% 89% 99% Simple Naïve Bayes 89% 100% 90% 89% 99% (without SD) Naïve Bayes 99% 100% 99% 100% 100% (with SD) Decision tree 80% 100% 80% 90% 90% (Rankers Search) Decision Tree 100% 100% 100% 100% 100% (Best first Search) SD- Supervised Discretion

  32. Question: Can we train the system using the traffic profiles collected from one browser and test it on the traffic profiles collected from some other browser?

  33. Question: Can we train the system using the traffic profiles collected from one browser and test it on the traffic profiles collected from some other browser? NOOO…. Coz.,

  34. vs

  35. vs

  36. vs

  37. Then how can this attack be made useful?

  38. Then how can this attack be made useful? • Use Browser Fingerprinting

  39. Then how can this attack be made useful? • Use Browser Fingerprinting Reference :Browser Fingerprinting from Coarse Traffic Summaries : Techiniques and Implications – by Yen et. al.

  40. Limitation and Future Work • Assumes that user is going to visit only a single website at a time. But in practice, users can visit multiple websites. • Can be extended to other websites and other browsers by using similar methods.

  41. Thank You

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend