TY - GEN
T1 - Website fingerprinting attack on Psiphon and its forensic analysis
AU - Ejeta, Tekachew Gobena
AU - Kim, Hyong Joong
PY - 2017
Y1 - 2017
N2 - Internet circumvention applications – such as Psiphon – are widely used to bypass control mechanisms, and each of such anti-censorship application uses a unique mechanism to bypass internet censorship. Although anti-censorship applications provide a unique means to ensure internet freedom, some applications severely degrade network performance and possibly open the door for network security breaches. Anti-censorship applications such as Psiphon can be used as cover for hacking attempts and can assist in many criminal activities. In this paper, we analyze the Psiphon service and perform a passive traffic analysis to detect Psiphon traffic. Moreover, we profile the top 100 websites based on their Alexa rankings according to five different categories under Psiphon and perform an effective website fingerprinting attack. Our analysis uses the well-known k-nearest neighbors for website fingerprinting and support vector machine classifier to detect Psiphon traffic.
AB - Internet circumvention applications – such as Psiphon – are widely used to bypass control mechanisms, and each of such anti-censorship application uses a unique mechanism to bypass internet censorship. Although anti-censorship applications provide a unique means to ensure internet freedom, some applications severely degrade network performance and possibly open the door for network security breaches. Anti-censorship applications such as Psiphon can be used as cover for hacking attempts and can assist in many criminal activities. In this paper, we analyze the Psiphon service and perform a passive traffic analysis to detect Psiphon traffic. Moreover, we profile the top 100 websites based on their Alexa rankings according to five different categories under Psiphon and perform an effective website fingerprinting attack. Our analysis uses the well-known k-nearest neighbors for website fingerprinting and support vector machine classifier to detect Psiphon traffic.
KW - Digital forensics
KW - Fingerprinting attack
KW - Internet censorship
KW - Psiphon
UR - http://www.scopus.com/inward/record.url?scp=85028453336&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85028453336&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-64185-0_4
DO - 10.1007/978-3-319-64185-0_4
M3 - Conference contribution
AN - SCOPUS:85028453336
SN - 9783319641843
VL - 10431 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 42
EP - 51
BT - Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Proceedings
PB - Springer Verlag
T2 - 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017
Y2 - 23 August 2017 through 25 August 2017
ER -