Yong Shao, K. Hernandez, Kia-Min Yang, Eric Chan-Tin, M. Abuhamad
{"title":"Lightweight and Effective Website Fingerprinting Over Encrypted DNS","authors":"Yong Shao, K. Hernandez, Kia-Min Yang, Eric Chan-Tin, M. Abuhamad","doi":"10.1109/SVCC56964.2023.10165086","DOIUrl":null,"url":null,"abstract":"The DNS over HTTPS (DoH) protocol is implemented to improve the original DNS protocol that uses unencrypted DNS queries and responses. With the DNS traffic, an eavesdropper can easily identify websites that a user is visiting. In order to address this concern of web privacy, encryption is used by performing a DNS lookup over HTTPS. In this paper, we studied whether the encrypted DoH traffic could be exploited to identify websites that a user has visited. This is a different type of website fingerprinting by analyzing encrypted DNS network traffic rather than the network traffic between the client and the web server. DNS typically uses fewer network packets than a website download. Our model and algorithm can accurately predict one out of 10, 000 websites with a 95% accuracy using the first 50 DoH packets. In the open-world environment with 100, 000 websites, our model achieves an F1-score of 93%.","PeriodicalId":243155,"journal":{"name":"2023 Silicon Valley Cybersecurity Conference (SVCC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Silicon Valley Cybersecurity Conference (SVCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SVCC56964.2023.10165086","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The DNS over HTTPS (DoH) protocol is implemented to improve the original DNS protocol that uses unencrypted DNS queries and responses. With the DNS traffic, an eavesdropper can easily identify websites that a user is visiting. In order to address this concern of web privacy, encryption is used by performing a DNS lookup over HTTPS. In this paper, we studied whether the encrypted DoH traffic could be exploited to identify websites that a user has visited. This is a different type of website fingerprinting by analyzing encrypted DNS network traffic rather than the network traffic between the client and the web server. DNS typically uses fewer network packets than a website download. Our model and algorithm can accurately predict one out of 10, 000 websites with a 95% accuracy using the first 50 DoH packets. In the open-world environment with 100, 000 websites, our model achieves an F1-score of 93%.
DoH (DNS over HTTPS)协议是为了改进原DNS协议使用未加密的DNS查询和响应。利用DNS流量,窃听者可以很容易地识别出用户正在访问的网站。为了解决对网络隐私的担忧,加密是通过在HTTPS上执行DNS查找来使用的。在本文中,我们研究了加密的DoH流量是否可以被利用来识别用户访问过的网站。这是一种不同类型的网站指纹,通过分析加密的DNS网络流量,而不是分析客户端和web服务器之间的网络流量。DNS通常比网站下载使用更少的网络数据包。我们的模型和算法可以使用前50个DoH数据包准确预测10000个网站中的一个,准确率为95%。在拥有10万个网站的开放世界环境中,我们的模型达到了93%的f1得分。