FedFingerprinting: A Federated Learning Approach to Website Fingerprinting Attacks in Tor Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bang, Juneseok | - |
dc.contributor.author | Jeong, Jaewon | - |
dc.contributor.author | Lee, Joohyung | - |
dc.date.accessioned | 2023-08-25T08:41:06Z | - |
dc.date.available | 2023-08-25T08:41:06Z | - |
dc.date.created | 2023-08-25 | - |
dc.date.issued | 2023-07 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/88847 | - |
dc.description.abstract | Various website fingerprinting attacks (WF) have been developed to detect anonymous users accessing illegal websites in Tor networks by analyzing Tor traffic. These attacks consider several traffic features, such as packet length, number of packets, and time, to identify users who attempt to access prohibited content. Due to the advance of artificial intelligence (AI) technologies, machine learning or deep learning techniques have been widely adopted for WF to generate an accurate model to break the privacy of illegal users. Nevertheless, such state-of-the-art approaches to WF assumed that entire data from various Tor nodes are collected and trained in a centralized way to generate the model: However, training data sets from Tor nodes may contain sensitive information that the Tor nodes may not want to share. In addition, significant computing and network bottleneck at the centralized server is inevitable in collecting and training various data in a centralized manner. Correspondingly, this paper proposes a novel framework using federated learning (FL) for WF in the Tor network (denoted as FedFingerprinting), enabling Tor nodes to generate the global model collaboratively without exposing their local data sets. Specifically, to alleviate the burden for local training of selected Tor nodes in the FL process, the importance of various handcrafting features used for WF is firstly evaluated through the analysis of the accuracy of features under the ensemble of tree machine learning methods. Then, to balance the accuracy and training time, the combination of selected top-ranked features is trained using FL approaches rather than raw data in the model. Moreover, considering the local model accuracy of each Tor node, effective Tor node selection for the FL process is also designed. Finally, under closed-world settings with the real-world Tor data sets, we empirically demonstrate the comparisons of the proposed FedFingerprinting with raw data and feature selection compared to various benchmarks in terms of the training time and accuracy. Then, the superior performance of the FedFingerprinting with Tor node selection is evaluated in terms of convergence speed. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.title | FedFingerprinting: A Federated Learning Approach to Website Fingerprinting Attacks in Tor Networks | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 001041981200001 | - |
dc.identifier.doi | 10.1109/ACCESS.2023.3299174 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.11, pp.78431 - 78444 | - |
dc.description.isOpenAccess | Y | - |
dc.identifier.scopusid | 2-s2.0-85165884240 | - |
dc.citation.endPage | 78444 | - |
dc.citation.startPage | 78431 | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 11 | - |
dc.contributor.affiliatedAuthor | Bang, Juneseok | - |
dc.contributor.affiliatedAuthor | Jeong, Jaewon | - |
dc.contributor.affiliatedAuthor | Lee, Joohyung | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Tor networks | - |
dc.subject.keywordAuthor | website fingerprinting attacks | - |
dc.subject.keywordAuthor | federated learning | - |
dc.subject.keywordAuthor | feature analysis | - |
dc.subject.keywordAuthor | deep learning | - |
dc.subject.keywordAuthor | machine learning | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.