Website Fingerprinting Attack Mitigation Using Traffic Morphing Conference Paper uri icon


  • © 2018 IEEE. Website fingerprinting attacks attempt to identify the website visited in anonymized and encrypted network traffic, that is, even if a user is using Tor and HTTPS. These attacks have been shown to be effective. Mitigations have been proposed which decreased the accuracy of the attacks from about 90% to about 20%. We propose a new mitigation technique based on traffic morphing and clustering. The intuition is that a lot of websites, by nature, are similar and can be clustered together. It is then easier and more efficient to make that whole cluster look exactly the same by using traffic morphing, rather than adding noise to make all websites look similar. All the websites in a cluster, thus, would become indistinguishable. There are many ways to perform traffic morphing. As a proof of concept, we used biggest, which means that all websites in a cluster will look exactly like the biggest website (in terms of network packet size) of that cluster. In simulating our proposed approach, the fingerprinting accuracy dropped from 70% to less than 1%.

name of conference

  • 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)

published proceedings

  • 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)

author list (cited authors)

  • Chan-Tin, E., Kim, T., & Kim, J.

publication date

  • January 1, 2018 11:11 AM