using Traffic Analysis Attacks Salini S K What is Traffic Analysis - - PowerPoint PPT Presentation

using traffic analysis
SMART_READER_LITE
LIVE PREVIEW

using Traffic Analysis Attacks Salini S K What is Traffic Analysis - - PowerPoint PPT Presentation

Website Fingerprinting using Traffic Analysis Attacks Salini S K What is Traffic Analysis What is Traffic Analysis Wiki says What is Traffic Analysis Wiki says Process of intercepting and examining messages in order to deduce


slide-1
SLIDE 1

Website Fingerprinting using Traffic Analysis Attacks

Salini S K

slide-2
SLIDE 2

What is Traffic Analysis

slide-3
SLIDE 3

What is Traffic Analysis

Wiki says……

slide-4
SLIDE 4

What is Traffic Analysis

Wiki says……

  • Process of intercepting and examining

messages in order to deduce information from patterns in communication.

  • Can be performed even when the messages

are encrypted.

slide-5
SLIDE 5

Why do I care?

  • Your privacy is compromised

– Attacker knows the site you are visiting – He knows how long you stay in the same site

  • Attacker can poison DNS cache

accordingly and you may end up giving your credentials to a malicious site.

slide-6
SLIDE 6

Client making request to a webpage

Encrypted

Unaware user

slide-7
SLIDE 7

Client making request to a webpage

But not safe

Unaware user

slide-8
SLIDE 8

Attacker intercepts traffic

slide-9
SLIDE 9

Attacker intercepts traffic

Attaaackk…

slide-10
SLIDE 10

Attacker intercepts traffic

Can See

  • Packet length
  • Bandwidth
  • Average packets transferred/sec
slide-11
SLIDE 11

What will I do?

slide-12
SLIDE 12
  • Visit different websites and collect

traffic traces (Data collection phase)

What will I do?

slide-13
SLIDE 13
  • Visit different websites and collect

traffic traces (Data collection phase)

  • Extract features from training dataset

(Training phase)

What will I do?

slide-14
SLIDE 14
  • Visit different websites and collect

traffic traces (Data collection phase)

  • Extract features and train dataset

(Training phase)

  • Test on random dataset. (Testing phase)

What will I do?

slide-15
SLIDE 15
  • Visit different websites and collect

traffic traces (Data collection phase)

  • Extract features and train dataset

(Training phase)

  • Test on random dataset. (Testing phase)

Use machine learning What will I do?

slide-16
SLIDE 16
  • Visit different websites and collect

traffic traces (Data collection phase)

  • Extract features and train dataset

(Training phase)

  • Test on random dataset. (Testing phase)

What will I do?

3 simple(???) steps

slide-17
SLIDE 17

Websites fingerprinted…

slide-18
SLIDE 18

Step 1

slide-19
SLIDE 19

Step 1

  • Data collection:
slide-20
SLIDE 20

Step 1

  • Data collection:
  • Used airodump-ng for collecting

WPA- encrypted data

  • Used Wireshark to filter out

traffic from a specific host

slide-21
SLIDE 21

Step 2

slide-22
SLIDE 22

Step 2

  • Feature extraction
slide-23
SLIDE 23

Features considered…

  • Packet length
  • Inter-arrival time
  • Upstream Bandwidth
  • Downstream Bandwidth
  • Average Packets sent/sec
  • Average Packets received/sec
slide-24
SLIDE 24

Why such features?

slide-25
SLIDE 25

Why such features?

  • deduced based on trail and error

method

slide-26
SLIDE 26

Bandwidth distribution for various websites

slide-27
SLIDE 27

Distribution of Average packet transferred/sec for various websites

slide-28
SLIDE 28

Step 3

slide-29
SLIDE 29

Step 3

  • Training and Testing
slide-30
SLIDE 30

Step 3

  • Training and Testing

Used machine learning classifiers

  • Naïve Bayes Simple
  • Naïve Bayes
  • Decision tree
slide-31
SLIDE 31

Accuracy of Classification- using various classifiers

Classifier Naïve Bayes Simple 90% 100% 83% 89% 99% Naïve Bayes (without SD) 89% 100% 90% 89% 99% Naïve Bayes (with SD) 99% 100% 99% 100% 100% Decision tree (Rankers Search) 80% 100% 80% 90% 90% Decision Tree (Best first Search) 100% 100% 100% 100% 100% SD- Supervised Discretion

slide-32
SLIDE 32

Question:

Can we train the system using the traffic profiles collected from one browser and test it on the traffic profiles collected from some other browser?

slide-33
SLIDE 33

Question:

Can we train the system using the traffic profiles collected from one browser and test it on the traffic profiles collected from some other browser?

NOOO…. Coz.,

slide-34
SLIDE 34

vs

slide-35
SLIDE 35

vs

slide-36
SLIDE 36

vs

slide-37
SLIDE 37

Then how can this attack be made useful?

slide-38
SLIDE 38

Then how can this attack be made useful?

  • Use Browser Fingerprinting
slide-39
SLIDE 39

Then how can this attack be made useful?

  • Use Browser Fingerprinting

Reference :Browser Fingerprinting from Coarse Traffic Summaries : Techiniques and Implications – by Yen et. al.

slide-40
SLIDE 40

Limitation and Future Work

  • Assumes that user is going to visit
  • nly a single website at a time. But in

practice, users can visit multiple websites.

  • Can be extended to other websites

and other browsers by using similar methods.

slide-41
SLIDE 41

Thank You