Applicability of Website Fingerprinting Attack on Tor Encrypted Traffic
Mohamad Amar Irsyad Mohd Aminuddin1, Zarul Fitri Zaaba2, Azham Hussain3
1Mohamad Amar Irsyad Mohd Aminuddin, School of Computer Sciences, University Sains Malaysia, Pulau Pinang, Malaysia.
2Zarul Fitri Zaaba, School of Computer Sciences, University Sains Malaysia, Pulau Pinang, Malaysia.
3Azham Hussain, School of Computing, University Utara Malaysia Sintok Kedah Darul Aman, Malaysia.
Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript Published on 19 June 2019 | PP: 386-391 | Volume-8 Issue-8S June 2019 | Retrieval Number: H10660688S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Tor is a famous anonymity tools that provide Internet user with capability of being anonymous in the Internet. By using the Tor network, a user can browser without anyone know the truth of the communication information. Numerous studies have been performed worldwide on deanonymizing the Tor user. One of popular study is the Website Fingerprinting (WF) attack, a subset of passive traffic analysis attack. WF consists of complex traffic analytical process with several limitations and assumptions on the Tor network. In this paper, we will discuss the fundamental principal of WF on Tor network, its assumptions and discussion on whether WF is considered as applicable on attacking the Tor user anonymity(especially in real-world scenario).As a result, the applicability discussion and establishment are presented. This study had found that with the advancement of WF attack, it is applicable to be utilized on Tor encrypted traffic and might become a serious threat to Tor’s user anonymity if no proper defense being proposed to prevent the improved WF attack.
Keywords: Website Fingerprinting; Tor; Machine Learning; Security; Survey.
Scope of the Article: Computer Science and Its Applications