DeTorrent: An Adversarial Padding-only Traffic Analysis Defense

Authors: James K Holland (University of Minnesota), Jason Carpenter (University of Minnesota), Se Eun Oh (Ewha Womans University), Nicholas Hopper (University of Minnesota)

Volume: 2024
Issue: 1
Pages: 98–115
DOI: https://doi.org/10.56553/popets-2024-0007

Artifact: Available

Download PDF

Abstract: While anonymity networks like Tor aim to protect the privacy of their users, they are vulnerable to traffic analysis attacks such as Website Fingerprinting (WF) and Flow Correlation (FC). Recent implementations of WF and FC attacks, such as Tik-Tok and DeepCoFFEA, have shown that the attacks can be effectively carried out, threatening user privacy. Consequently, there is a need for effective traffic analysis defense. There are a variety of existing defenses, but most are either ineffective, incur high latency and bandwidth overhead, or require additional infrastructure. As a result, we aim to design a traffic analysis defense that is efficient and highly resistant to both WF and FC attacks. We propose DeTorrent, which uses competing neural networks to generate and evaluate traffic analysis defenses that insert 'dummy' traffic into real traffic flows. DeTorrent operates with moderate overhead and without delaying traffic. In a closed-world WF setting, it reduces an attacker's accuracy by 61.5%, a reduction 10.5% better than the next-best padding-only defense. Against the state-of-the-art FC attacker, DeTorrent reduces the true positive rate for a .00001 false positive rate to about .12, which is less than half that of the next-best defense. We also demonstrate DeTorrent's practicality by deploying it alongside the Tor network and find that it maintains its performance when applied to live traffic.

Keywords: website fingerprinting, traffic analysis, deep learning

Copyright in PoPETs articles are held by their authors. This article is published under a Creative Commons Attribution 4.0 license.