Authors
Kevin P Dyer, Scott E Coull, Thomas Ristenpart, Thomas Shrimpton
Publication date
2012/5/20
Conference
2012 IEEE symposium on security and privacy
Pages
332-346
Publisher
IEEE
Description
We consider the setting of HTTP traffic over encrypted tunnels, as used to conceal the identity of websites visited by a user. It is well known that traffic analysis (TA) attacks can accurately identify the website a user visits despite the use of encryption, and previous work has looked at specific attack/countermeasure pairings. We provide the first comprehensive analysis of general-purpose TA countermeasures. We show that nine known countermeasures are vulnerable to simple attacks that exploit coarse features of traffic (e.g., total time and bandwidth). The considered countermeasures include ones like those standardized by TLS, SSH, and IPsec, and even more complex ones like the traffic morphing scheme of Wright et al. As just one of our results, we show that despite the use of traffic morphing, one can use only total upstream and downstream bandwidth to identify -- with 98% accuracy - which of two websites was …
Total citations
201220132014201520162017201820192020202120222023202410183833495349466381746513
Scholar articles
KP Dyer, SE Coull, T Ristenpart, T Shrimpton - 2012 IEEE symposium on security and privacy, 2012