DocumentCode :
2017239
Title :
A novel network delay based side-channel attack: Modeling and defense
Author :
Ling, Zhen ; Luo, Junzhou ; Zhang, Yang ; Yang, Ming ; Fu, Xinwen ; Yu, Wei
Author_Institution :
Southeast Univ., Nanjing, China
fYear :
2012
fDate :
25-30 March 2012
Firstpage :
2390
Lastpage :
2398
Abstract :
Information leakage via side channels has become a primary security threat to encrypted web traffic. Existing side channel attacks and corresponding countermeasures focus primarily on packet length, packet timing, web object size and web flow size. However, we found that encrypted web traffic can also leak information via network delay between a user and the web sites that she visits. Motivated by this observation, we investigate a novel network-delay based side-channel attack to infer web sites visited by a user. The adversary can utilize pattern recognition techniques to differentiate web sites by measuring sample mean and sample variance of the round-trip time (RTT) between a victim user and web sites. We theoretically analyzed the damage caused by such an adversary and derived closed-form formulae for detection rate, the probability that the adversary correctly recognizes a web site. To defeat this side-channel attack, we proposed several countermeasures. The basic idea is to shape traffic from different web sites so that they have similar RTT statistics. We proposed the strategies based on the k-means clustering and K-Anonymity to ensure that traffic shaping will not cause excessive delay while providing a predictable degree of anonymity. We conducted extensive experiments and our empirical results match our theory very well.
Keywords :
Web sites; cryptography; pattern clustering; probability; sampling methods; telecommunication security; telecommunication traffic; K-anonymity; RTT statistics; Web flow size; Web object size; Web site; defense; detection rate; encrypted Web traffic; information leakage; k-means clustering; network delay based side-channel attack; packet length; packet timing; pattern recognition; probability; round-trip time; sample mean; sample variance; security threat; traffic shaping; Cryptography; Delay; Equations; Feature extraction; Mathematical model; Web sites; Countermeasures; Information Leak; Network Delay; Side Channel;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM, 2012 Proceedings IEEE
Conference_Location :
Orlando, FL
ISSN :
0743-166X
Print_ISBN :
978-1-4673-0773-4
Type :
conf
DOI :
10.1109/INFCOM.2012.6195628
Filename :
6195628
Link To Document :
بازگشت