Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/88435/dsp01f4752k82t
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorRexford, Jennifer-
dc.contributor.authorSebaali, Jana-
dc.date.accessioned2021-07-19T18:20:22Z-
dc.date.available2021-07-19T18:20:22Z-
dc.date.created2021-04-21-
dc.date.issued2021-07-19-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/dsp01f4752k82t-
dc.description.abstractWebsite fingerprinting (WF) attacks attempt to identify a visited webpage from a network communication trace by comparing it to previously collected samples of known webpages. MIMIQ (Masking IPs with Migration In QUIC) is a privacy-enhancing system that leverages the transport protocol QUIC’s connection migration capability to allow clients to change IP addresses frequently within individual connections and split a connection into multiple smaller flows. A smaller flow reduces the amount of information an adversary can learn and defends against WF attacks. In this thesis, we present an adversary that attempts to regroup the smaller flows belonging to the same connection based on their packet timing in order to recreate the original trace and extract more features from it. It uses a k-fingerprinting classifier (k-FP) composed of a random forest and nearest neighbor algorithm to label its recreated trace. To defend against this website fingerprinting attack, we present three strategic connection migration strategies that decrease the success of the adversary’s grouping strategy. We simulated the migration and grouping strategies using CAIDA traces and calculated the probability of correctly grouping p consecutive packets from each connection, where p is 200, 500, or 1000 packets. We show that clients can migrate at high frequency every 20 packets or at every pause in the packet exchange between the two endpoints to defeat the grouping attack at least 88% of the time. Clients can also migrate at low frequency and prolong the pauses in the connections by 2.5-7.5 milliseconds in order to defeat the grouping attack at least 87% of the time.en_US
dc.format.mimetypeapplication/pdf
dc.language.isoenen_US
dc.titleStrategic Connection Migration to Thwart Website Fingerprinting Attacksen_US
dc.typePrinceton University Senior Theses
pu.date.classyear2021en_US
pu.departmentElectrical Engineeringen_US
pu.pdf.coverpageSeniorThesisCoverPage
pu.contributor.authorid920148979
pu.certificateCenter for Statistics and Machine Learningen_US
pu.mudd.walkinNoen_US
Appears in Collections:Electrical and Computer Engineering, 1932-2023

Files in This Item:
File Description SizeFormat 
SEBAALI-JANA-THESIS.pdf583.68 kBAdobe PDF    Request a copy


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.