DTLF: Deep Transfer Learning for Website Fingerprinting

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In anonymous networks, users can be tracked by implementing website fingerprinting (WF) attacks, which can prevent users from browsing illegal websites or performing illegal actions. With deep learning technologies, WF attacks achieve higher than 98% accuracy against powerful anonymity Tor network. However, these attacks rely on enormous encrypted traffic data, which are time-consuming to collect. Moreover, the large-scale encrypted traffic data collected also needs to be updated frequently to adapt for changes in website content. This paper proposes a new method, Deep Transfer Learning For Website Fingerprinting (DTLF), which combines the deep transfer learning framework with model DResNet. This method obtains useful and rich feature representations by training on a large number of existing labeled datasets to apply to few encrypted traffic. The results over multiple datasets show that the DTLF can achieve 96.5% accuracy with 5 labeled samples. In the 56-day experimental setting against concept drift, the accuracy is only 2.6% lower. In addition, the DTLF can consume less time overhead to perform WF attack. When training on the target dataset, it often only takes tens of seconds which is less than 0.1 times of other methods.

Cite

CITATION STYLE

APA

Li, Z., Song, Q., Mao, B., & Zhu, Z. (2022). DTLF: Deep Transfer Learning for Website Fingerprinting. In Lecture Notes in Electrical Engineering (Vol. 961 LNEE, pp. 1310–1319). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-19-6901-0_138

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free