Abstract
As more network communication is encrypted to provide data privacy for users, attackers are focussing their attention on traffic analysis methods for side-channel attacks on user privacy. These attacks exploit patterns in particular features of communication flows such as inter-packet timings and packet sizes. Unsupervised machine learning approaches, such as Hidden Markov Models (HMMs), can be trained on unlabelled data to estimate these flow attributes from an exposed packet flow, even one that is encrypted, so it is highly feasible for an eavesdropper to perform this attack. Traditional defences try to protect specific side-channels by modifying the packet transmission for the flow, e.g. by adding redundant information (padding of packets, or use of junk packets) and perturbing packet timings (e.g. artificially delaying packet transmission at the sender). Such defences incur significant overhead and impact application-level performance metrics, such as latency, throughput, end-to-end delay, and jitter. Further, these mechanisms can be complex, often ineffective, and are not general solutions – a new profile must be created for every application, which is an infeasible expectation to place on software developers. We show that an approach exploiting multipath communication can be effective against HMM-based traffic analysis. After presenting the core analytical background, we demonstrate the efficacy of this approach with a number of diverse, simulated traffic flows. Based on the results, we define some simple design rules for software developers to adopt in order to exploit the mechanism we describe, including a critical examination of existing communication protocol behaviour.
Original language | English |
---|---|
Article number | 22 |
Number of pages | 26 |
Journal | Cryptography |
Volume | 8 |
Issue number | 2 |
DOIs | |
Publication status | Published - 28 May 2024 |
Keywords
- Side-channel
- Privacy
- Multipath communication
- Hidden Markov Model (HMM)
- Identifier Locator Network Protocol (ILNP)
- Internet Protocol v6 (IPv6)
Fingerprint
Dive into the research topics of 'Defence against side-channel attacks for encrypted network communication using multiple paths'. Together they form a unique fingerprint.Datasets
-
Defence against side-channel attacks for encrypted network communication using multiple paths (dataset)
Haywood, G. T. (Creator) & Bhatti, S. (Creator), University of St Andrews, 22 May 2024
DOI: 10.17630/bf2ffcc2-8663-42a8-b019-ca18005236ba, https://doi.org/10.3390/cryptography8020022
Dataset
File