4.7 Article

Few-shot website fingerprinting attack

期刊

COMPUTER NETWORKS
卷 198, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.comnet.2021.108298

关键词

User privacy; Internet anonymity; Data traffic patterns; Website fingerprinting; Deep learning; Embedding; Few-shot learning; Fine-tuning

资金

  1. National Key Research and Development Program of China [2018YFB0204301]
  2. National Natural Science Foundation of China [61472439]

向作者/读者索取更多资源

Transfer Learning Fingerprinting Attack (TLFA) is a novel attack method that transfers knowledge from training data collected from non-target websites and fine-tunes it on a small set of labeled training data with a specific task classifier model. Experimental results validate the superiority of TLFA over state-of-the-art methods.
Website fingerprinting (WF) attack stands opposite against privacy protection in using the Internet, even when the content details are encrypted, such as Tor networks. Whilst existing difficulty in the preparation of many training samples, we study a more realistic problem - few-shot website fingerprinting attack where only a few training samples per website are available. We introduce a novel Transfer Learning Fingerprinting Attack (TLFA) that can transfer knowledge from the labeled training data of websites disjoint and independent to the target websites. Specifically, TLFA trains a stronger embedding model with the training data collected from non-target websites, which is then leveraged in a task-agnostic manner with a task-specific classifier model fine-tuned on a small set of labeled training data from target websites. We conduct expensive experiments to validate the superiority of our TLFA over the state-of-the-art methods in both closed-world and open-world attacking scenarios, at the absence and presence of strong defense.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据