{"title":"PEZD: A practical and effective zero-delay defense against website fingerprinting","authors":"Hengheng Xiong, Dapeng Man, Huanran Wang, Jingwen Tan, Jiguang Lv, Wu Yang","doi":"10.1016/j.comnet.2025.111716","DOIUrl":null,"url":null,"abstract":"<div><div>Website Fingerprinting (WF) enables an attacker to infer which website a user is visiting by analyzing the side-channel information of network traffic, posing a serious threat to anonymous systems such as Tor. To mitigate this issue, numerous defenses have been proposed to resist WF attacks. However, many defenses incur high overhead, impeding their deployment. Moreover, some defenses rely on the impractical assumption that the defender knows prior knowledge of which website the user visits. In this paper, we propose a practical and effective lightweight WF defense, named PEZD. It hinders attackers from recognizing a website’s unique patterns by adding dummy packets with diverse distributions into traffic traces. In particular, PEZD is a website-agnostic defense that does not require knowledge of the website users are visiting and incurs only moderate overhead to effectively prevent attacks. Extensive experiments demonstrate that PEZD reduces the accuracy of state-of-the-art attacks from 97 % to 19 %–38 % while introducing zero latency overhead and only 48 % bandwidth overhead. Moreover, we show that PEZD remains effective for injecting dummy packets only on the client-side, simplifying the implementation of the defense.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111716"},"PeriodicalIF":4.6000,"publicationDate":"2025-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625006826","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Website Fingerprinting (WF) enables an attacker to infer which website a user is visiting by analyzing the side-channel information of network traffic, posing a serious threat to anonymous systems such as Tor. To mitigate this issue, numerous defenses have been proposed to resist WF attacks. However, many defenses incur high overhead, impeding their deployment. Moreover, some defenses rely on the impractical assumption that the defender knows prior knowledge of which website the user visits. In this paper, we propose a practical and effective lightweight WF defense, named PEZD. It hinders attackers from recognizing a website’s unique patterns by adding dummy packets with diverse distributions into traffic traces. In particular, PEZD is a website-agnostic defense that does not require knowledge of the website users are visiting and incurs only moderate overhead to effectively prevent attacks. Extensive experiments demonstrate that PEZD reduces the accuracy of state-of-the-art attacks from 97 % to 19 %–38 % while introducing zero latency overhead and only 48 % bandwidth overhead. Moreover, we show that PEZD remains effective for injecting dummy packets only on the client-side, simplifying the implementation of the defense.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.