Beyond a Single Perspective: Towards a Realistic Evaluation of Website Fingerprinting Attacks
- URL: http://arxiv.org/abs/2510.14283v1
- Date: Thu, 16 Oct 2025 04:14:17 GMT
- Title: Beyond a Single Perspective: Towards a Realistic Evaluation of Website Fingerprinting Attacks
- Authors: Xinhao Deng, Jingyou Chen, Linxiao Yu, Yixiang Zhang, Zhongyi Gu, Changhao Qiu, Xiyuan Zhao, Ke Xu, Qi Li,
- Abstract summary: Website Fingerprinting (WF) attacks exploit patterns in encrypted traffic to infer the websites visited by users.<n>WF techniques achieve over 90% accuracy in controlled experimental settings.<n>This paper presents the first systematic and comprehensive evaluation of existing WF attacks under diverse realistic conditions.
- Score: 12.990922744613293
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Website Fingerprinting (WF) attacks exploit patterns in encrypted traffic to infer the websites visited by users, posing a serious threat to anonymous communication systems. Although recent WF techniques achieve over 90% accuracy in controlled experimental settings, most studies remain confined to single scenarios, overlooking the complexity of real-world environments. This paper presents the first systematic and comprehensive evaluation of existing WF attacks under diverse realistic conditions, including defense mechanisms, traffic drift, multi-tab browsing, early-stage detection, open-world settings, and few-shot scenarios. Experimental results show that many WF techniques with strong performance in isolated settings degrade significantly when facing other conditions. Since real-world environments often combine multiple challenges, current WF attacks are difficult to apply directly in practice. This study highlights the limitations of WF attacks and introduces a multidimensional evaluation framework, offering critical insights for developing more robust and practical WF attacks.
Related papers
- DeepShield: Fortifying Deepfake Video Detection with Local and Global Forgery Analysis [59.8324489002129]
We introduce DeepShield, a deepfake detection framework that balances local sensitivity and global generalization to improve robustness across unseen forgeries.<n>DeepShield appliestemporal artifact modeling and patch-wise supervision to capture fine-grained inconsistencies often overlooked by global models.
arXiv Detail & Related papers (2025-10-29T07:35:29Z) - Universal Camouflage Attack on Vision-Language Models for Autonomous Driving [67.34987318443761]
Visual language modeling for automated driving is emerging as a promising research direction.<n>VLM-AD remains vulnerable to serious security threats from adversarial attacks.<n>We propose the first Universal Camouflage Attack framework for VLM-AD.
arXiv Detail & Related papers (2025-09-24T14:52:01Z) - MFFI: Multi-Dimensional Face Forgery Image Dataset for Real-World Scenarios [56.87612820699948]
We propose the Multi-dimensional Face Forgery Image (textbfMFFI) dataset, tailored for real-world scenarios.<n>MFFI enhances realism based on four strategic dimensions: 1) Wider Forgery Methods; 2) Varied Facial Scenes; 3) Diversified Authentic Data; 4) Multi-level Degradation Operations.<n> Benchmark evaluations show that MFFI outperforms existing public datasets in terms of scene complexity, cross-domain generalization capability, and detection difficulty gradients.
arXiv Detail & Related papers (2025-09-06T04:36:41Z) - BackFed: An Efficient & Standardized Benchmark Suite for Backdoor Attacks in Federated Learning [5.924780594614676]
Federated Learning (FL) systems are vulnerable to backdoor attacks.<n>BackFed is a benchmark suite designed to standardize, streamline, and reliably evaluate backdoor attacks and defenses in FL.<n>BackFed is a plug-and-play environment for researchers to comprehensively and reliably evaluate new attacks and defenses.
arXiv Detail & Related papers (2025-07-07T11:40:45Z) - Towards Robust Multi-tab Website Fingerprinting [31.78904724694232]
Website fingerprinting enables an eavesdropper to determine which websites a user is visiting over an encrypted connection.<n>Existing WF attacks have critical limitations on accurately identifying websites in multi-tab browsing sessions.<n>We propose ARES, a novel WF framework designed for multi-tab WF attacks.
arXiv Detail & Related papers (2025-01-22T04:10:53Z) - Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective [53.24281798458074]
Face Recognition Systems (FRS) have increasingly integrated into critical applications, including surveillance and user authentication.
Recent studies have revealed vulnerabilities in FRS to adversarial (e.g., adversarial patch attacks) and backdoor attacks (e.g., training data poisoning)
arXiv Detail & Related papers (2024-05-21T13:34:23Z) - Attention-Based Real-Time Defenses for Physical Adversarial Attacks in
Vision Applications [58.06882713631082]
Deep neural networks exhibit excellent performance in computer vision tasks, but their vulnerability to real-world adversarial attacks raises serious security concerns.
This paper proposes an efficient attention-based defense mechanism that exploits adversarial channel-attention to quickly identify and track malicious objects in shallow network layers.
It also introduces an efficient multi-frame defense framework, validating its efficacy through extensive experiments aimed at evaluating both defense performance and computational cost.
arXiv Detail & Related papers (2023-11-19T00:47:17Z) - Realistic Website Fingerprinting By Augmenting Network Trace [17.590363320978415]
Website Fingerprinting (WF) is considered a major threat to the anonymity of Tor users.
We show that augmenting network traces can enhance the performance of WF classifiers in unobserved network conditions.
arXiv Detail & Related papers (2023-09-18T20:57:52Z) - Detecting Unknown Attacks in IoT Environments: An Open Set Classifier
for Enhanced Network Intrusion Detection [5.787704156827843]
In this paper, we introduce a framework aimed at mitigating the open set recognition (OSR) problem in the realm of Network Intrusion Detection Systems (NIDS) tailored for IoT environments.
Our framework capitalizes on image-based representations of packet-level data, extracting spatial and temporal patterns from network traffic.
The empirical results prominently underscore the framework's efficacy, boasting an impressive 88% detection rate for previously unseen attacks.
arXiv Detail & Related papers (2023-09-14T06:41:45Z) - Robust Physical-World Attacks on Face Recognition [52.403564953848544]
Face recognition has been greatly facilitated by the development of deep neural networks (DNNs)
Recent studies have shown that DNNs are very vulnerable to adversarial examples, raising serious concerns on the security of real-world face recognition.
We study sticker-based physical attacks on face recognition for better understanding its adversarial robustness.
arXiv Detail & Related papers (2021-09-20T06:49:52Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.