Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    In recent years, awareness of information security and the importance of protecting user privacy has grown significantly among Internet users. As a result, substantial effort is being invested to developing and deploying new protocols aimed at enhancing privacy and preventing the leakage of sensitive personal data. One of the most sensitive pieces of information at risk is the domain name, whose exposure can reveal a user's browsing history and habits. To address this privacy concern, various technologies have been introduced, including DNS over TLS, DNS over HTTPS, DNS over QUIC, Encrypted Client Hello, and Protected QUIC Initial Packets. However, despite these advancements, studies have demonstrated that these mechanisms do not provide a fully comprehensive solution, as attackers can still infer users' browsing activity under certain conditions. This is due to the fact that web pages are highly dynamic, with their content frequently changing. In this research, we propose an adaptive website fingerprinting attack based on a Siamese network model. We evaluate the effectiveness of the attack on both TLS and QUIC protocols and show that it can accurately infer domain names associated IP addresses using only a few traffic samples. Moreover, we demonstrate that the model maintains strong performance over time, enabling near real-time classification even several months after model training. The success of the attack and model's robustness over time highlight the ongoing privacy risks faced by users, as our attack provides adversaries with a novel tool to uncover users' browsing history and identify visited domain names.

    Original languageEnglish
    Title of host publicationDetection of Intrusions and Malware, and Vulnerability Assessment - 22nd International Conference, DIMVA 2025, Proceedings
    EditorsManuel Egele, Daniel Gruss, Veelasha Moonsamy, Michele Carminati
    PublisherSpringer Science and Business Media Deutschland GmbH
    Pages26-45
    Number of pages20
    ISBN (Print)9783031976193
    DOIs
    StatePublished - 1 Jan 2025
    Event22nd International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, DIMVA 2025 - Graz, Austria
    Duration: 9 Jul 202511 Jul 2025

    Publication series

    NameLecture Notes in Computer Science
    Volume15747 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference22nd International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, DIMVA 2025
    Country/TerritoryAustria
    CityGraz
    Period9/07/2511/07/25

    Keywords

    • Encryption
    • Machine learning
    • Website fingerprinting

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network'. Together they form a unique fingerprint.

    Cite this