Defence against side-channel attacks for encrypted network communication using multiple paths

Gregor Tamati Haywood, Saleem Bhatti*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

10 Downloads (Pure)

Abstract

As more network communication is encrypted to provide data privacy for users, attackers are focussing their attention on traffic analysis methods for side-channel attacks on user privacy. These attacks exploit patterns in particular features of communication flows such as inter-packet timings and packet sizes. Unsupervised machine learning approaches, such as Hidden Markov Models (HMMs), can be trained on unlabelled data to estimate these flow attributes from an exposed packet flow, even one that is encrypted, so it is highly feasible for an eavesdropper to perform this attack. Traditional defences try to protect specific side-channels by modifying the packet transmission for the flow, e.g. by adding redundant information (padding of packets, or use of junk packets) and perturbing packet timings (e.g. artificially delaying packet transmission at the sender). Such defences incur significant overhead and impact application-level performance metrics, such as latency, throughput, end-to-end delay, and jitter. Further, these mechanisms can be complex, often ineffective, and are not general solutions – a new profile must be created for every application, which is an infeasible expectation to place on software developers. We show that an approach exploiting multipath communication can be effective against HMM-based traffic analysis. After presenting the core analytical background, we demonstrate the efficacy of this approach with a number of diverse, simulated traffic flows. Based on the results, we define some simple design rules for software developers to adopt in order to exploit the mechanism we describe, including a critical examination of existing communication protocol behaviour.
Original languageEnglish
Article number22
Number of pages26
JournalCryptography
Volume8
Issue number2
DOIs
Publication statusPublished - 28 May 2024

Keywords

  • Side-channel
  • Privacy
  • Multipath communication
  • Hidden Markov Model (HMM)
  • Identifier Locator Network Protocol (ILNP)
  • Internet Protocol v6 (IPv6)

Fingerprint

Dive into the research topics of 'Defence against side-channel attacks for encrypted network communication using multiple paths'. Together they form a unique fingerprint.

Cite this