DocumentCode :
3039273
Title :
Wireless/Website Traffic Analysis & Fingerprinting: A Survey of Attacking Techniques and Countermeasures
Author :
Ghaleb, Taher Ahmed
Author_Institution :
Inf. & Comput. Sci., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
fYear :
2015
fDate :
26-29 April 2015
Firstpage :
1
Lastpage :
7
Abstract :
Throughout browsing the web or running applications on a wireless network, user´s private information should be hidden from other users. Private information may include the visited websites, downloaded files, chatting messages or any other web or network activities. Therefore, several encrypting protocols (such as: IPsec, TLS, SSL, etc.) and privacy mechanisms (such as: SSH and Tor) have been introduced in order to protect user privacy by concealing the content of data being transmitted. However, the traffic behavior may reveal some information that cannot be encrypted; like packet size, direction, and inter- packet times, etc. Consequently, traffic analysis techniques take advantage of such information to infer the identities of the websites visited by Internet users, or the applications being running on a wireless network. On the other hand, several defense schemes have been proposed to provide more secure traffic against those kinds of attacks. In this paper, a taxonomy is introduced to categorize fingerprinting attacks and defenses against both websites and wireless traffic is introduced. Attacks and countermeasures are then qualitatively compared according to several attributes that distinguish their main characteristics. Eventually, we recommend a set of advanced settings that can be taken into account in order to enhance the success rates of fingerprinting techniques.
Keywords :
Internet; Web sites; computer network security; data protection; telecommunication traffic; Internet; Website traffic analysis; attack countermeasures; fingerprinting attacks; user privacy protection; wireless traffic analysis; Accuracy; Bandwidth; Communication system security; Cryptography; Fingerprint recognition; Protocols; Wireless communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Computing (ICCC), 2015 International Conference on
Conference_Location :
Riyadh
Print_ISBN :
978-1-4673-6617-5
Type :
conf
DOI :
10.1109/CLOUDCOMP.2015.7149665
Filename :
7149665
Link To Document :
بازگشت