论文标题
迈向有效,高效的填充机
Towards Effective and Efficient Padding Machines for Tor
论文作者
论文摘要
TOR最近集成了一个用于创建填充机的电路填充框架:通过定义注射虚假流量的状态机,以防止流量分析攻击(例如网站指纹(WF)攻击)来进行防御。在本文中,我们探讨了有效有效的填充机的设计,以防御WF攻击。通过使用精心制作的数据集,电路填充模拟器,遗传编程以及填充机的手动调整,我们探索了使填充机有效,有效防御的不同方面。我们的最终机器名为Interspace,在效率和有效性之间对针对最先进的深度学习的WF攻击深度攻击深刻的深层指纹在效率和有效性之间进行了可调整的权衡。我们表明,与Juarez等人的WTF-PAD相比,间空间既可以更有效,更有效。启发Tor电路填充框架设计的填充机。我们结束了本文,展示了如何使空间的效率降低,从而确定了概率定义的填充机的有前途的策略,并强调了在更复杂的防御措施中进一步探索这种策略的必要性。
Tor recently integrated a circuit padding framework for creating padding machines: defenses that work by defining state machines that inject dummy traffic to protect against traffic analysis attacks like Website Fingerprinting (WF) attacks. In this paper, we explore the design of effective and efficient padding machines to defend against WF attacks. Through the use of carefully crafted datasets, a circuit padding simulator, genetic programming, and manual tuning of padding machines we explore different aspects of what makes padding machines effective and efficient defenses. Our final machine, named Interspace, is probabilistically-defined with a tweakable trade-off between efficiency and effectiveness against the state-of-the-art deep-learning WF attack Deep Fingerprinting by Sirinam et al. We show that Interspace can be both more effective and efficient than WTF-PAD by Juarez et al. the padding machine that inspired the design of Tor's circuit padding framework. We end this paper by showing how Interspace can be made less effective, identifying the promising tactic of probabilistically defined padding machines, and highlighting the need to further explore this tactic in more complex defenses.