TOR NETWORK VIDEO FINGERPRINTING OVER RESIDENTIAL WI-FI AND CONGESTED NETWORK INTERFACES
Loading...
Authors
Falk, Theodore B.
Subjects
TOR
onion routing
machine learning
onion routing
machine learning
Advisors
Barton, Armon C.
Walsh, Timothy C.
Date of Issue
2024-12
Date
Publisher
Monterey, CA; Naval Postgraduate School
Language
Abstract
Both ordinary, concerned citizens and malicious actors, such as extremist groups, use the Onion Router (Tor) to encrypt their web traffic and protect their online anonymity. This usage has led to an interest in attacks on Tor, such as video fingerprinting, which seeks to identify what video is being streamed solely by analyzing features in the encrypted traffic trace. This thesis seeks to continue a previous line of work in "Exploring the Capabilities and Limitations of Video Stream Fingerprinting" to use Convolutional Neural Networks to conduct video fingerprinting attacks on network traffic transmitted over Tor in an open-world environment. It will expand upon previous research using a realistic vantage point to collect data utilizing Wi-Fi and traffic over the network interface. The end goal of this line of research is to increase the Department of Defense's understanding of how much risk exists to the privacy of the users of the Tor network. While performance suffers compared to models trained on data sets collected under ideal conditions, we show that video fingerprinting is still viable in typical network conditions, including robustness to traffic congestion in all but the most extreme cases.
Type
Thesis
Description
Series/Report No
Department
Organization
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Distribution Statement
Distribution Statement A. Approved for public release: Distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
