Tuesday, February 27, 2018

WEB TRAFFIC ANALYSIS ATTACK

INTRODUCTION


Web Traffic Analysis Attack Using Only Timing Information. introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defences.  we consider an attacker of the type illustrated in Figure 1. 

The attacker can detect the time when packets traverse the encrypted tunnel in the uplink direction, but has no other information about the clients’ activity. 

The attacker’s objective is to use this information to guess, with high probability of success, the web sites which the client visits. 

What is distinctive about the attack considered here is that the attacker relies solely on packet timestamp information whereas the previously reported attacks against encrypted web traffic have mainly made use of observations of packet size and/or packetcount information. 

Our interest in timing-only attacks is twofold. Firstly, packet padding is a relatively straightforward defence against attacks that rely primarily on packet size, and indeed is currently either already available or being implemented in a number of popular VPNs.



 Secondly, alternative attacks based on packet counting   are insensitive to packet padding defences but require partitioning of a packet stream into individual web fetches in order for the number of packets associated with each web fetch to be determined, which may be highly challenging in practice on links where there are no clear pauses between web fetches. 

In contrast, packet timingbased attacks are not only largely unaffected by packet padding defenses but also, as we will show, do not require partitioning  of the packet stream. Hence, they are potentially a practically important class of attack against current and future VPNs. 

While some work has been carried out using inter-arrival time information to classify the application (HTTP, IMAP etc.)   to our knowledge, there is no previous work reporting use of timing information alone to construct a successful attack against encrypted web traffic. 


EXISTING SYSTEMS


An easy way to comply with the IJSRET journal paper formatting requirements is to use this document as a template and simply type your text into it. 

The attacker can detect the time when packets traverse the encrypted tunnel in the uplink direction, but has no other information about the clients’ activity. 

The attacker’s objective is to use this information to guess, with high probability of success, the web sites which the client visits. 

The attacker relies solely on packet timestamp information whereas the previously reported attacks against encrypted web traffic have mainly made use of observations of packet size and/or packet count information. 

Our interest in timing-only attacks is twofold. Packet padding is a relatively straight forward defense against attacks that rely primarily on packet size, and indeed is currently either already available or being implemented in a number of popular virtual private networks.

Alternative attacks based on packet counting are insensitive to packet padding defenses but require partitioning of a packet stream into individual web fetches in order for the number of packets associated with each web fetch to be determined, which may be highly challenging in practice on links where there are no clear pauses between web fetches.



No comments:

Post a Comment

Hybrid scheme of public-key encryption

Hybrid scheme of public-key encryption We introduce a hybrid homomorphic encryption that combines public-key encryption (PKE) and som...