Please use this identifier to cite or link to this item:
http://arks.princeton.edu/ark:/88435/dsp01f4752k82t
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Rexford, Jennifer | - |
dc.contributor.author | Sebaali, Jana | - |
dc.date.accessioned | 2021-07-19T18:20:22Z | - |
dc.date.available | 2021-07-19T18:20:22Z | - |
dc.date.created | 2021-04-21 | - |
dc.date.issued | 2021-07-19 | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/dsp01f4752k82t | - |
dc.description.abstract | Website fingerprinting (WF) attacks attempt to identify a visited webpage from a network communication trace by comparing it to previously collected samples of known webpages. MIMIQ (Masking IPs with Migration In QUIC) is a privacy-enhancing system that leverages the transport protocol QUIC’s connection migration capability to allow clients to change IP addresses frequently within individual connections and split a connection into multiple smaller flows. A smaller flow reduces the amount of information an adversary can learn and defends against WF attacks. In this thesis, we present an adversary that attempts to regroup the smaller flows belonging to the same connection based on their packet timing in order to recreate the original trace and extract more features from it. It uses a k-fingerprinting classifier (k-FP) composed of a random forest and nearest neighbor algorithm to label its recreated trace. To defend against this website fingerprinting attack, we present three strategic connection migration strategies that decrease the success of the adversary’s grouping strategy. We simulated the migration and grouping strategies using CAIDA traces and calculated the probability of correctly grouping p consecutive packets from each connection, where p is 200, 500, or 1000 packets. We show that clients can migrate at high frequency every 20 packets or at every pause in the packet exchange between the two endpoints to defeat the grouping attack at least 88% of the time. Clients can also migrate at low frequency and prolong the pauses in the connections by 2.5-7.5 milliseconds in order to defeat the grouping attack at least 87% of the time. | en_US |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | en_US |
dc.title | Strategic Connection Migration to Thwart Website Fingerprinting Attacks | en_US |
dc.type | Princeton University Senior Theses | |
pu.date.classyear | 2021 | en_US |
pu.department | Electrical Engineering | en_US |
pu.pdf.coverpage | SeniorThesisCoverPage | |
pu.contributor.authorid | 920148979 | |
pu.certificate | Center for Statistics and Machine Learning | en_US |
pu.mudd.walkin | No | en_US |
Appears in Collections: | Electrical and Computer Engineering, 1932-2023 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
SEBAALI-JANA-THESIS.pdf | 583.68 kB | Adobe PDF | Request a copy |
Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.